Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The power consumption comes from Complex Digital Signal Processing (DSP) due to mathematical operations such as addition and multiplication which consume more FPGA power when compared with other parts of NOMA. The multiplication operation consumes more FPGA power than the additional operation. The article's goal is to propose low FPGA power consumption algorithms called recursive IFFT/FFT which reduce the FPGA power consumption by more than 45% compared with the model without the proposed algorithm using AMD Xilinx Kintex-7 with high-speed analogue card.
The cinematographer mediates through the means of cinema and television a set of elements complementing each other in the light of developments in various sciences, culture and arts for the purpose of conveying the meaning to the recipient and achieve aesthetic taste. Despite the diversity of cinematographic media with its multiple forms, The researcher started from the principle of definition and knowledge of a technical phenomenon that emerged in the cinematographic medium through the treatment of dramatic events through the solutions of the exit line depends on the narrative of events in one place contributes to attract Mam spectator since this interesting phenomenon in the mediator, there .van question arises the adoption of that vis
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe nature of the dark sector of the Universe remains one of the outstanding problems in modern cosmology, with the search for new observational probes guiding the development of the next generation of observational facilities. Clues come from tension between the predictions from Λ cold dark matter (ΛCDM) and observations of gravitationally lensed galaxies. Previous studies showed that galaxy clusters in the ΛCDM are not strong enough to reproduce the observed number of lensed arcs. This work aims to constrain the warm dark matter (WDM) cosmologies by means of the lensing efficiency of galaxy clusters drawn from these alternative models. The lensing characteristics of two samples of simulated clusters in the Λ warm dark matter and ΛCDM
... Show MoreWireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l
... Show MoreA Factorial Study for separation anxiety in students, of Baghdad City
Shehadt 683 fish of different fish present in the tank Haditha Dam during the period of February 1993 and the end Maes 1994 to identify the nutritional content of the digestive tract or the stomach for these fish and their impact on the environment of the tank and found that Fish fine linen and Alhalg animal feeding predators feed on small fish, mainly the fish brown plantnutrition
The goal of current research to know the according of scientific values in the curriculum of chemistry sixth - grade science To achieve this goal wasa to build aalistaofa scientifica values toa be included in the curriculum of chemistry sixth - grade science after seeing a group of literature and previous studies, the list presented to a group of arbitrators and specialists in educational and psychological sciences and methods of teaching science, and curricula and teaching methods , Arbitrators and specialists have expressed their views and comments on the tool, and that the list was formed in final form (9) values Head of scientific includes ( 35) sub - value, then the researcher analyzed the chemistry curriculum for sixth grade Scient
... Show MoreMany carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system
Background: The first and second choice for vascular access in patients with end stage renal disease (ESRD) is radio cephalic and brachio cephalic arteriovenous fistula (AVF).In patients with failed previous AVF e or poorly visualized or impalpable cephalic veins, the basilic vein can be mobilized and superficialized to create an AVF with the brachial artery.Objective: The aim of this study is to report our experience at the Vascular Surgery Department/ Surgical Specialty Hospital in brachio-basilic (BB) vascular access for hemodialysis.Methods: From January 2006 to December 2009, 31 patients with ESRD whose cephalic veins were thrombosed or impalpable or had previous unsuccessful vascular access procedures were referred to the Vascular
... Show More