Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical fiber links when the signal passes through all the components such as optical fiber, splitters, multiplexers then find a good quality of signal in all receivers. The system performance is presented through various parameters such as BER analyzer and the Eye Diagram.
Background: Invasion in oral cancer involves alterations in cell-cell and cell-matrix interactions that accompanied by loss of cell adhesion. Catenins stabilize cellular adherence junctions by binding to E-cadherin, which further mediates cell-cell adhesion and regulates proliferation and differentiation of epithelial cells. The Wnt/β-catenin pathway is one of the major signaling pathways in cell proliferation, oncogenesis, and epithelial-mesenchymal transition. Aims of the study: to detect immunohistochemical distribution pattern and different subcellular localization of β-catenin in oral squamous cell carcinoma and relate such expression to Bryne’s invasive grading system. Materials and Methods: This study included 30 paraffi
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreThis research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o
... Show MoreThis paper presents an experimental and theoretical analysis to investigate the two-phase flow boiling heat transfer coefficient and pressure drop of the refrigerant R-134a in the evaporator test section of the refrigeration system under different operating conditions. The test conditions considered are, for heat flux (13.7-36.6) kW/m2, mass flux (52-105) kg/m2.s, vapor quality (0.2-1) and saturation temperature (-15 to -3.7) ˚C. Experiments were carried out using a test rig for a 310W capacity refrigeration system, which is designed and constructed in the current work. Investigating of the experimental results has revealed that, the enhancement in local heat trans
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More