This work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respectively. A PIN photodetector (HFCT-5208M) is used. Calculations of Signal to Noise Ratio (SNR) and Bit Error Rate (BER) for coherent detection were measured at different length of the optical fiber. Result show that high SNR and low BER for heterodyne detection than for homodyne detection.
The aim of this research is to study the influence of additives on the properties of soap greases, such as lithium, calcium, sodium, lithium-calcium grease, by adding varies additives, such as graphite, molybdenum disulfide, carbon black, corrosion inhibitor, and extreme pressure.
These additives have been added to grease to obtain the best percentages that improve the properties of grease such as load carrying, wear resistance, corrosion resistance, drop point, and penetration.
The results showed the best weight percentages to all types of grease which give good properties are 1.5% extreme pressure additive, 3% graphite, 1% molybdenum disulfide, 2.5% carbon black.
The other hand, the best weight percentage for corrosion inhibit
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Is the subject of the financial structure of the most important topics for which she received the interests of scientific research in the field of financial management , as it emerged several theories about choosing a financial structure appropriate for the facility and behavior change funding them , and in spite of that there is no agreement on a specific theory answer various questions in this regard , and a special issue of the financial structure optimization.
The objective of the research was to identify the most important theories of the structure of modern financial theory has been to focus on the capture of financial firms in two different stages of their life cycle , so-called growth and ma
... Show MoreThe aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca
... Show MoreA study were conducted to examinate the effect of organic and aqueous (Hot, Cold) Extracts from leaves of Duranta repens on the growth and activities of the following types of Bacteria:- Staphylococcus aureus,Streptococcus pyogens ,Escherichia coli,Klebsilla pneumonia, in addition to the yeast Candida albicans and the fungi Aspergullis niger ,Aspergulls flavus.The result showed that gram Positive Bacteria is more sensitive to the extracts than gram negative bacteria with Minimum inhibitory concentration (MIC) value (50,25,50,100)% and Minimum Bactericidal Concentration (MBC) value (100,50,200,100)% for all types Bacteria respectively . The most active extract against A.niger ,A,flavus was cold and hot aqueous extract from the leaves with d
... Show MoreThe issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show MoreThe increasing efficiency of the telecommunications network in the city contributes to the increase in spatial interaction between activities (to influence and mutual influence) This study is based on the idea that the upgrading of telephone services provided to citizens are done exclusively through the growth and development of all levels of the service using advanced technologies to know the problems and appropriate solutions in short time and less cost. Thus, crystallized the objectives of the study which was built for the importance of GIS in the planning of services in general, and infrastructure services, in particular, including telephone services, which is represent a point of contact between individuals on the one hand a
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThis experiment was conducted to study the effect of injecting hatching eggs into a flock of broiler aged mothers with different concentrations of the alcoholic extract of Moringa oleifera powder on productive performance of broilers during the period of rearing of 35 days. The study included two experiments for a period at 2/10/2021 to 28/11/2021, where eggs were injected into the Mustafa Poultry Hatchery/ Wasit Governorate- Aziziyah District. A 400 hatching eggs of 308 Ross mothers of modern broilers used at age of 48 week, eggs of average weight 66 ± 1 g/egg were collected in same day then stored for two days. A quarter of treatments were randomly distributed with 100 eggs for each treatment.
... Show MoreApplications of quantitative methods, which had been explicit attention during previous period (the last two centuries) is the method of application sales man or traveling salesman method. According to this interest by the actual need for a lot of the production sectors and companies that distribute their products, whether locally made or the imported for customers or other industry sectors where most of the productive sectors and companies distributed always aspired to (increase profits, imports, the production quantity, quantity of exports. etc. ...) this is the part of the other hand, want to behave during the process of distribution routes that achieve the best or the least or most appropriate.
... Show More