Preferred Language
Articles
/
ijl-17
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode with maximum responsivity at wavelength of 820 nm as a detector. Practical tests were carried out on the laser diode showed that the output characteristics and spectral characteristics of the laser diode depend largely on the drive current. The maximum separation distance between successive stations in the ring was 5.4 km. From the performance tests, it was concluded that the maximum throughput and maximum access delay are directly proportional to length of the transmitted information. A trade off between the transmitted information length and the maximum access delay is needed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Application Or Innovation In Engineering & Management
Far Infrared Photoconductive Detector Based on Multi-Wall Carbon Nanotubes
...Show More Authors

Far infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 􀀀m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
African Journal Of Hospitality, Tourism And Leisure
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus (9)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Agricultural Engineering
The Effect of Design and the Accelerated Wear Test of Agricultural Nozzles on the Resulting Droplet Size
...Show More Authors
Abstract<p>The change in the size of the droplets during the pesticide application process could have a negative impact on the percentage of drift or the losses of pesticides to the environment. One of the factors that could affect the droplet size produced from a single nozzle is the internal design of the nozzle itself, in addition to the wear of the nozzle orifice as a result of the usage time. In this research, three types of nozzles with different internal designs were used (Turbo TeeJet (TT), Turbo TwinJet (TTj 6011003), and Drift Guard (DG 11003)). The nozzles were subjected to an accelerated wear test for one hundred hours, and different droplet size parameters (Dv 0.1, Dv 0.5, Dv 0.9), </p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Electrochemical Science
Effect of Electrolysis Parameters on the Specific Surface Area of Nickel Powder: Optimization using Box-Behnken Design
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Synthesis of Six and Seven-membered Heterocyclic Molecules Containing an Adamantyl Fragment and an X-ray Crystal Structure of (E)-N-(adamantan-1-yl)-1-(3-nitrophenyl)methanimine
...Show More Authors

       Our work included a synthesis of three new imine derivatives—1,3-thiazinan-4-one, 1,3-oxazinan-6-one and 1,3-oxazepin-4,7-dione—which contained an adamantyl fragment. These were produced via the condensation of the Schiff`s base (E)-N-(adamantan-1-yl)-1-(3-aryl)methanimine with 3-mercaptopropanoic acid; 3-chloropropanoic acid; and maleic, citraconic anhydride, respectively. These new imines were prepared via the condensation of adamantan-1-ylamine and 3-nitro-, 3-bromobenzaldehyde in n-BuOH. We obtained a good yield of products. FTIR, 1H NMR spectroscopy and C.H.N.S analysis were used to diagnostic the products. The molecular structure of (E)-N-(adamantan-1-yl

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref