Preferred Language
Articles
/
ijl-17
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode with maximum responsivity at wavelength of 820 nm as a detector. Practical tests were carried out on the laser diode showed that the output characteristics and spectral characteristics of the laser diode depend largely on the drive current. The maximum separation distance between successive stations in the ring was 5.4 km. From the performance tests, it was concluded that the maximum throughput and maximum access delay are directly proportional to length of the transmitted information. A trade off between the transmitted information length and the maximum access delay is needed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Eurasian Journalof History, Geography And Economics
Effect of Oil Prices Fluctuations on Agricultural Gross Domestic Product in Iraq: Autoregressive Distributed Lag (ARDL) Approach
...Show More Authors

The research dealt with the analysis of the relations between the GDP of the agricultural sector in Iraq, oil prices, the exchange rate and the GDP both on the short term and long term. The research adopted data analysis for the period from 1980-2019 using the ARDL model. the results indicate the existence of long-term relationships between oil prices and the prices of each agricultural commodity at a significance level of 5%. Also, oil prices have a negative consequence on agricultural production in Iraq, and the Iraqi economy is a rentier economy that depends mainly on oil as a source of income and budget financing.

Publication Date
Sat Mar 01 2025
Journal Name
Iraqi Journal Of Physics
Design an Efficient Neural Network to Determine the Rate of Contamination in the Tigris River in Baghdad City
...Show More Authors

This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Controversy between Mask and Text in the Literary Books Covers Design: عبدالحسين عبدالواحد
...Show More Authors

The reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Formal Diversity In The Structure Design Arabic Magazine Covers: نور أحمد حاجم الربيعي
...Show More Authors

The magazine is one of the print media , which represents an important gateway to the wider world , due for its intellectual and cultural fun for the recipient affecting the everyday needs him in various directions . The cover of the magazine is the owner of appearance and impact of the first look the magazine , including the magnitude of the value of the functional and aesthetic pay the reader to the acquisition, as it seeks designed to attract the receiver and achieve better grades optical communication enabled this diversity vocabulary construction for the cover of the magazine and consistent with the idea of design .Ensure Current search four chapters , first chapter of which , the research problem and was questioning following what

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Int. J. Adv. Appl. Math. Andmech.
The effect of external source of disease on the epidemic model
...Show More Authors

Publication Date
Wed Mar 01 2017
Journal Name
Diyala Journal Of Engineering Sciences
NFLUENCE OF WATER SOURCE ON COMPRESSIVE STRENGTH OF HIGH STRENGTH CONCRETE
...Show More Authors

This research studies the influence of water source on the compressive strength of high strength concrete. Four types of water source were adopted in both mixing and curing process these are river, tap, well and drainage water (all from Iraq-Diyala governorate). Chemical analysis was carried out for all types of the used water including (pH, total dissolved solids (TDS), Turbidity, chloride, total suspended solid (TSS), and sulfates). Depending on the chemical analysis results, it was found that for all adopted sources the chemical compositions was within the ASTM C 1602/C 1602M-04 limits and can be satisfactorily used in concrete mixtures. Mixture of high strength concrete for compressive strength of (60 MPa) was designed and checked using

... Show More
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (28)
Scopus Clarivate Crossref