Preferred Language
Articles
/
hhddLJEBVTCNdQwCBpOY
5G passive optical network employing all optical-OFDM_Hybrid SSMF/FSO
...Show More Authors

In this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations of dB. Moreover, the center wavelength of the generated OFG can be tuned from 1300 nm for upstream transmission to 1577 nm for downstream transmission in the proposed 5G-PON. The proposed network achieves 960 Gbps and 10 Gbps for the downstream and upstream directions, respectively, under different turbulence effects. Furthermore, when 32 AO-OFDM channels are used, the simulation results show that the proposed model can achieve a SSMF length and FSO propagation ranges of 20 km and 2 km, respectively, with bit error rate (BER) ( ).

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Parallel Routing in Wireless Sensor Network
...Show More Authors

The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Spiking Neural Network in Precision Agriculture
...Show More Authors

In this paper, precision agriculture system is introduced based on Wireless Sensor Network (WSN). Soil moisture considered one of environment factors that effect on crop. The period of irrigation must be monitored. Neural network capable of learning the behavior of the agricultural soil in absence of mathematical model. This paper introduced modified type of neural network that is known as Spiking Neural Network (SNN). In this work, the precision agriculture system  is modeled, contains two SNNs which have been identified off-line based on logged data, one of these SNNs represents the monitor that located at sink where the period of irrigation is calculated and the other represents the soil. In addition, to reduce p

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (18)
Crossref (14)
Scopus Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Employing the references of Shariah Audit in supporting Governance of Iraqi Islamic Banks: An analytically study
...Show More Authors

The Islamic Banks including the Iraqi ones are often resorted to support their governance frameworks in order to improve its competitiveness in their communities. Where, those banks are looking for activities that enhance their governance; one of these activities is Shariah Audit that provided the auditing capabilities to face of developmental challenges and increase competitiveness. Therefore, the content of this paper, discusses know-how to use the Shariah Audit and its references in support of the Shariah Governance in the Iraqi Isla

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 05 2024
Journal Name
Scientific Reports
Mesoporous Ag@WO3 core–shell, an investigation at different concentrated environment employing laser ablation in liquid
...Show More Authors
Abstract<p>In this study, silver-tungsten oxide core–shell nanoparticles (Ag–WO<sub>3</sub> NPs) were synthesized by pulsed laser ablation in liquid employing a (1.06 µm) Q-switched Nd:YAG laser, at different Ag colloidal concentration environment (different core concentration). The produced Ag–WO<sub>3</sub> core–shell NPs were subjected to characterization using UV–visible spectrophotometry, X-ray diffraction (XRD), transmission electron microscopy (TEM), energy-dispersive spectroscopy, electrical analysis, and photoluminescence PL. The UV–visible spectra exhibited distinct absorption peaks at around 200 and 405 nm, which attributed to the occurrence of surface Plasmon reson</p> ... Show More
View Publication
Scopus (18)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Nov 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An evaluation of the influence of different finishing lines on the fracture strength of full contour zirconia CAD/CAM and heat press all-ceramic crowns
...Show More Authors

ABSTRACT Background: One of the major problems of all ceramic restorations is their probable fracture against the occlusal forces. The objective of this in vitro study was to evaluate the effect of two gingival finishing lines (90°shoulder and deep chamfer) on the fracture resistance of full contour CAD/CAM and heat press all-ceramic crowns. Materials and Methods: Thirty two maxillary first premolars were prepared to receive full contour CAD/CAM (zolid) and heat press (Cergo Kiss) ceramic crowns using a special paralleling device (Parallel-A-Prep). The teeth were divided into four groups according to the type of finishing line prepared. Each crown was cemented to its corresponding tooth using self-etch, self-adhesive dual cure resin ceme

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
The Role of the Passive Conditioning in Achieving Thermal Comfort in Temporary Hotel Units: سماح محمد طالب الدويك-سامي أبوطالب-محمد صابر
...Show More Authors

This research is based on monitoring the local and environmental technologies in the design of the temporary hotel units (nomadic tents) in the desert in the south of Jordan in order to air condition them in summer and winter, maintaining the Jordanian identity, that they are presented with the form and technologies of the age in order to get to the universality.
The research adopted the descriptive analytical method and the researcher conducted the analysis of SWOT specified for the analysis of the positive and negative aspects in the design of the temporary hotel units and comparing them with the case studies available in the chosen research area "the Jordanian golden triangle", through the elements of the case under study. The res

... Show More
View Publication Preview PDF
Crossref