Preferred Language
Articles
/
hhddLJEBVTCNdQwCBpOY
5G passive optical network employing all optical-OFDM_Hybrid SSMF/FSO
...Show More Authors

In this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations of dB. Moreover, the center wavelength of the generated OFG can be tuned from 1300 nm for upstream transmission to 1577 nm for downstream transmission in the proposed 5G-PON. The proposed network achieves 960 Gbps and 10 Gbps for the downstream and upstream directions, respectively, under different turbulence effects. Furthermore, when 32 AO-OFDM channels are used, the simulation results show that the proposed model can achieve a SSMF length and FSO propagation ranges of 20 km and 2 km, respectively, with bit error rate (BER) ( ).

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 31 2022
Journal Name
International Journal On “technical And Physical Problems Of Engineering”
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes

... Show More
Scopus (10)
Scopus
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Migration Letters
Employing the Teleological-Causal Presumption between Al-Khwarizmi and Ibn Yaish’s Explanations of Al-Mufasal (even) as a Model
...Show More Authors

It is a moral presumption that includes the object for its sake, and it is called the object for it or the object for its sake, which is the present tense after (lam, ki, fa, willn, and then), and it is not an excuse for the occurrence of the matter (1), and it requires a connection between the two sides of (a cause with a cause) united by a reason for a specific purpose (2). The object has a reason or an excuse, because it is an explanation of what came before it, of the cause. The reason for the occurrence of the action, being the motive for causing the action and the bearer of it (3), indicates that the infinitive is restricted to a special reason. So if I said: (I came to you with the hope of honoring you), then I attributed the coming

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Employing electronic supervision applications in developing the teaching performance of teachers in the Sultanate of Oman: a suggested vision
...Show More Authors

The study aimed to investigate the employment of electronic supervision applications in developing the teaching performance of teachers in Oman. Based on the qualitative method and the study population consisted of all the teachers of the first cycle in the Governorate of Muscat. The study sample amounted to 24 female teachers. The interview was used as a tool for data collection. The study reached several results, including: There are difficulties in employing electronic supervision applications, which are weak network, density of curricula, lack of experience in applying technology, and the large number of tasks assigned to the teacher. These difficulties can also be overcome by strengthening the network, training teachers, reducing th

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetics of employing the Cap Cut program in the montage and effects of digital content on the Internet
...Show More Authors

Traditional programs and the tedious and financially costly processes they require are no longer the best choice for content makers. The continuous development and development have led to the emergence of competitive software that offers capabilities that are more suitable for aesthetic needs, as it breaks down stereotypical frameworks from the familiar to the unfamiliar to be more suitable for graphic subjects in terms of dealing with the requirements of the digital content industry. Video for communication platforms, as it has more advantages than traditional software and the flexibility and high quality it offers at the level of the final product, All of this contributed to supplementing the image with aesthetic employments with data

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Reduction of the error in the hardware neural network
...Show More Authors

Specialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give

... Show More
View Publication Preview PDF