In this paper, a theoretical investigation was suggested to study underwater wireless optical communication (UWOC) system based on multiple input–multiple output (MIMO) technique. The modulation schemes such as RZ-OOK, NRZ-OOK, 32-PPM and 4-QAM applied under different coastal water types. MIMO technique enabled the system to transmit data rate with longer distance link. The performance of the proposed system examined by BER and data rate as a metrics. Several impairments such as the types of water by the attenuation of coastal water and the distance link were taken into account for the transmission of the optical signal to appreciate the reliability of the MIMO technique. The theoretical analysis shows the proposed of MIMO (4Tx/4Rx) technique get the better performance compared with the other techniques in terms of BER. When 32-PPM is applied as a modulation scheme. For the system with MIMO technique the maximum distance link arrive to 14.9 and 2.9 m for coastal water types JIC and J9C, respectively. While SISO (1Tx/1Rx) technique achieved the maximum distance link are 10 and 2.3 m for coastal water types JIC and J9C, respectively. Therefore, 32-PPM can outperform the other modulation schemes and consider the suitable option for obtaining a low BER with the best maximum distance link for LoS of MIMO technique.
oday deep ocean life has not been discovered by humans including many secret world things to be explored. The researcher has focused on underwater optical wireless communications using various kinds of complex digital Signal processing most of them used in air and starting applied in underwater communication. The Internet of Things (IoT) uses underwater called Internet of Underwater Things (IoUT) applications to explore the underwater world with other devices. However, the difference in concentration between air and water surfaces is not easy making wireless communication more complicated. Visible light passes the water's surface with scattering and distortion inside the water and each color of light has different attenuation the blue laser
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MorePriority of road maintenance can be viewed as a process influenced by decision-makers with varying decision-making power. Each decision-maker may have their view and judgment depending on their function and responsibilities. Therefore, determining the priority of road maintenance can be thought of as a process of MCDM. Regarding the priority of road maintenance, this is a difficult MCDM problem involving uncertainty, qualitative criteria, and possible causal relationships between choice criteria. This paper aims to examine the applicability of multiple MCDM techniques, which are used for assessing the priority of road maintenance, by adapting them to this sector. Priority of road maintenance problems subject to internal
... Show MoreMCA has gained a reputation for being a very useful statistical method for determining the association between two or more categorical variables and their graphical description. For performance this method, we must calculate the singular vectors through (SVD). Which is an important primary tool that allows user to construct a low-dimensional space to describe the association between the variables categories. As an alternative procedure to use (SVD), we can use the (BMD) method, which involves using orthogonal polynomials to reflect the structure of ordered categorical responses. When the features of BMD are combined with SVD, the (HD) is formed. The aim of study is to use alternative method of (MCA) that is appropriate with order
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
SCADA is the technology that allows the operator to gather data from one or more various facilities and to send control instructions to those facilities. This paper represents an adaptable and low cost SCADA system for a particular sugar manufacturing process, by using Programmable Logic Controls (Siemens s7-1200, 1214Dc/ Dc/ Rly). The system will control and monitor the laboratory production line chose from sugar industry. The project comprises of two sections the first one is the hardware section that has been designed, and built using components suitable for making it for laboratory purposes, and the second section was the software as the PLC programming, designing the HMI, creating alarms and trending system. The system will ha
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in
... Show More