Preferred Language
Articles
/
hhddLJEBVTCNdQwCBpOY
5G passive optical network employing all optical-OFDM_Hybrid SSMF/FSO
...Show More Authors

In this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations of dB. Moreover, the center wavelength of the generated OFG can be tuned from 1300 nm for upstream transmission to 1577 nm for downstream transmission in the proposed 5G-PON. The proposed network achieves 960 Gbps and 10 Gbps for the downstream and upstream directions, respectively, under different turbulence effects. Furthermore, when 32 AO-OFDM channels are used, the simulation results show that the proposed model can achieve a SSMF length and FSO propagation ranges of 20 km and 2 km, respectively, with bit error rate (BER) ( ).

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Lecture Notes In Civil Engineering
Evaluating the Performance of Flexible Passive Pile Group in Cohesionless Soil Under the Effect of a Nearby Embankment
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Mechanisms of Employing Secondary Event in Cinematographic Discourse: ماهر مجيد ابراهيم-شروق مالك حسن
...Show More Authors

  The cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Employing traditional symbols and popular beliefs in the designs of fabrics, clothing women's home
...Show More Authors

The woman's choice of clothing is no longer supported on the basis of the available forms of design in general. It is the interaction of design relationships with the receiver structure that reflects the character of integrated women with an emphasis on attractions pulling attention, all of these interventions reach us to the need to emphasize through this search Picking the perfect symbols of heritage in every sense of the popular beliefs of the employed in the designs of apparel fabrics women's home included a search of four chapters deal with the first problem of the research which you can employ the traditional symbols and popular beliefs in the designs of household apparel fabrics in order to raise the aesthetic value and utility of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Performance Enhancement of VLC-NOMA Employing Beamforming Function based vehicle-to-multivehicle Communication system
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2024
Journal Name
Energy Storage
Comprehensive Study of <scp>PAN</scp>‐<scp>NaBF<sub>4</sub></scp> Solid Polymer Electrolytes: Insights Into Optical, Structural, Thermal, Electrical, and Electrochemical Properties for Sodium‐Ion Batteries
...Show More Authors
ABSTRACT<p>This research explores the use of solid polymer electrolytes (SPEs) as a conductive medium for sodium ions in sodium‐ion batteries, presenting a possible alternative to traditional lithium‐ion battery technology. The researchers prepare SPEs with varying molecular weight ratios of polyacrylonitrile (PAN) and sodium tetrafluoroborate (NaBF<sub>4</sub>) using a solution casting method with dimethyl formamide as the solvent. Through optical absorbance measurements, we identified the PAN:NaBF<sub>4</sub> (80:20) SPE composition as having the lowest energy band gap value (4.48 eV). This composition also exhibits high thermal stability based on thermogravimetric analysis results. </p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Computer And Information Science 2009
The Stochastic Network Calculus Methodology
...Show More Authors

Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Mon Sep 25 2023
Journal Name
International Journal Of Energy Production And Management
Reducing Energy Consumption in Iraqi Campuses with Passive Building Strategies: A Case Study at Al-Khwarizmi College of Engineering
...Show More Authors

University campuses in Iraq are substantial energy consumers, with consumption increasing significantly during periods of high temperatures, underscoring the necessity to enhance their energy performance. Energy simulation tools offer valuable insights into evaluating and improving the energy efficiency of buildings. This study focuses on simulating passive architectural design for three selected buildings at Al-Khwarizmi College of Engineering (AKCOE) to examine the effectiveness of their cooling systems. DesignBuilder software was employed, and climatic data for a year in Baghdad was collected to assess the influence of passive architectural strategies on the thermal performance of the targeted buildings. The simulations revealed that the

... Show More
Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref