In this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations of dB. Moreover, the center wavelength of the generated OFG can be tuned from 1300 nm for upstream transmission to 1577 nm for downstream transmission in the proposed 5G-PON. The proposed network achieves 960 Gbps and 10 Gbps for the downstream and upstream directions, respectively, under different turbulence effects. Furthermore, when 32 AO-OFDM channels are used, the simulation results show that the proposed model can achieve a SSMF length and FSO propagation ranges of 20 km and 2 km, respectively, with bit error rate (BER) ( ).
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
The study aims to identify the effectiveness of employing microteaching in acquiring teaching skills of students teaching basic stage in Al-Aqsa University. The two researchers used the experimental method and a quota sample consisted of a group of (80) students who were distributed on the university two branches in Gaza and Khan younis and on males and females equally, and on four teaching courses counted (20) students for each. The study tool represented in an observation card ,and the results showed statistically significant differences between the level of all the skills of teaching and between the standard rate (75%) in favor of teaching skills, also showed statistically significant differences attributed to the variable of the univ
... Show MoreThe study aimed to reveal the impact of employing the strategy of the talk-ative groups on the achievement and academic tendencies of chemistry forstudents of the fifth grade of applied science for the academic year (2018 -2019), and to achieve this goal the researcher used the experimental methodon the sample of the study consisting of (50) students, prepared achievementtest falls Under (60) paragraphs, and the scale of tendencies for chemistryfalls under (30) paragraphs, and after the researcher completed the researchexperiment according to what was planned:The superiority of the experimental group studied according to the strate-gy of the talkative groups was found in the post-application of the test ofachievement and attitudes of chemis
... Show MoreResearch Summary
Praise be to God, and may blessings and peace be upon the Messenger of God. As for:
The Noble Qur’an is the constitution of life, and a comprehensive educational approach that deals with individuals comprehensively, as it organizes worldly and eschatological life, and it is a curriculum concerned with organizing life starting with individuals and the family until the establishment of states, and from its comprehensiveness is reform, guidance and establishing boundaries. They have a disease in their hearts. They are exposed to this and are trying, by falsehood, to subjugate the Islamic world with man-made laws set by the West. Their aim is to distance people from
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreThe Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show More