In this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations of dB. Moreover, the center wavelength of the generated OFG can be tuned from 1300 nm for upstream transmission to 1577 nm for downstream transmission in the proposed 5G-PON. The proposed network achieves 960 Gbps and 10 Gbps for the downstream and upstream directions, respectively, under different turbulence effects. Furthermore, when 32 AO-OFDM channels are used, the simulation results show that the proposed model can achieve a SSMF length and FSO propagation ranges of 20 km and 2 km, respectively, with bit error rate (BER) ( ).
Water is an essential aspect of life and important in evolution. Recently the potable water quality topic has received much attention. The study aims to determine drinking water quality in Al-Najaf City by collecting samples throughout Al-Najaf city and comparing the results with the Iraqi guidelines (IQS 417) and World Health Organization (WHO) guidelines, as well as to calculate the WQI. Samples were tested in the laboratory between December 2021 and June 2022. The results showed that multiple parameters exceeded the allowable limits during both testing periods; during winter months, the results of TDS and turbidity exceeded the upper limits in multiple locations. Total hardness values also
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreThe study aimed to reveal the impact of employing the strategy of the talk-ative groups on the achievement and academic tendencies of chemistry forstudents of the fifth grade of applied science for the academic year (2018 -2019), and to achieve this goal the researcher used the experimental methodon the sample of the study consisting of (50) students, prepared achievementtest falls Under (60) paragraphs, and the scale of tendencies for chemistryfalls under (30) paragraphs, and after the researcher completed the researchexperiment according to what was planned:The superiority of the experimental group studied according to the strate-gy of the talkative groups was found in the post-application of the test ofachievement and attitudes of chemis
... Show MoreResearch Summary
Praise be to God, and may blessings and peace be upon the Messenger of God. As for:
The Noble Qur’an is the constitution of life, and a comprehensive educational approach that deals with individuals comprehensively, as it organizes worldly and eschatological life, and it is a curriculum concerned with organizing life starting with individuals and the family until the establishment of states, and from its comprehensiveness is reform, guidance and establishing boundaries. They have a disease in their hearts. They are exposed to this and are trying, by falsehood, to subjugate the Islamic world with man-made laws set by the West. Their aim is to distance people from
... Show MoreEstimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using
... Show MoreEchinococcosis is a zoonotic disease caused by the larval stage of the tapeworm Echinococcus granulosus. This disease is an important public health and a significant economic issue in Iraq, where the lungs and livers are the popular places of infection. The aim of the current study focused on using the molecular techniques in the detection of an E. granulosus strain that causes cystic echinococcosis to human, sheep and cattle in Thi-Qar province, Iraq. In the current study, thirty isolates of E. granulosus were collected from 10 human hydatid cysts through surgery done at Al-Hussein Imam Teaching Hospital in Thi-Qar province and 10 sheep with 10 cattle hydatid cysts were obtained from the slaughterhouse in Thi-
... Show MoreThe differential cross section for the Rhodium and Tantalum has been calculated by using the Cross Section Calculations (CSC) in range of energy(1keV-1MeV) . This calculations based on the programming of the Klein-Nashina and Rayleigh Equations. Atomic form factors as well as the coherent functions in Fortran90 language Machine proved very fast an accurate results and the possibility of application of such model to obtain the total coefficient for any elements or compounds.
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show More