This research aims to design a high-speed laser diode driver and photodetector, the result is the
design of the high-speed laser diode driver with a short pulse of 10 ns at 30 KHz frequency and the
delivered maximum pulse voltage is 5.5 mV. Also, its optical output power of the laser diode driver is
about 2.529 mW for the centroied wavelength 1546.7 nm with FWHM of 286 pm and (1270-1610) nm.
The design of the circuit based on bipolar transistor where the input pulse signal is simply generated by
an arduino kit with 15 kHz frequency and then compensated to trigger to small signal amplifier which
was is simply NPN C3355 transistor and the output is a current driver to the laser diode. OptiSystem
software and Electronic Workbench tools were used for the design of high speed laser diode diver and its
simulation
The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThere are many events that took place in Al Mosul province between 2013 and 2018. These events led to many changes in the area under study. These changes involved a decrease in agricultural crops and water due to the population leaving the area. Therefore, it is imperative that planners, decision-makers, and development officials intervene in order to restore the region's activity in terms of environment and agriculture. The aim of this research is to use remote sensing (RS) technique and geographic information system (GIS) to detect the change that occurred in the mentioned period. This was achieved through the use of the ArcGIS software package for the purpose of assessing the state of lands of agricultural crops and
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimum err
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreAccountancy unit is looked is upon as unit that established for the purpose achieve it goals and programmers for unlimited time. Unless otherwise take place such as liquation whether voluntary or mandatory. Thus going concern logic is considered to be the logical foundation witch the familiar accounting principles are based upon. The future of a Company real its financial statues and position and the extent of it ability to face events in future. Hence the success and continuity its activities depend on the extent of the company activity to generate profits. And its ability to retain appropriate liquidity to serve its debts.
Therefore financial statements of the company consider to be on
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreBackground: Legionella pneumophila (L. pneumophila) is gram-negative bacterium, which causes Legionnaires’ disease as well as Pontiac fever. Objective: To determine the frequency of Legionella pneumophila in pneumonic patients, to determine the clinical utility of diagnosing Legionella pneumonia by urinary antigen testing (LPUAT) in terms of sensitivity and specificity, to compares the results obtained from patients by urinary antigen test with q Real Time PCR (RT PCR) using serum samples and to determine the frequency of serogroup 1 and other serogroups of L. pneumophila. Methods: A total of 100 pneumonic patients (community acquired pneumonia) were enrolled in this study during a period between October 2016 to April 2017; 92 sam
... Show MoreThe study aims to detect the presence of carbapenems genes and the prevalence of antibiotic-resistant E. coli in the Tigris River. Samples were collected from three sites of the Tigris River: S1Adhamiya, S2 Medical city hospital, and S3 Abu Nuwas. It diagnosed 40 isolates of E. coli out of 67 isolates of bacteria by Vitek2. The antibiotic sensitivity was determined by the disk diffusion method. E.coli isolates were tested against 7 antibiotics these belonged to β-lactam, Carbapenem. Also, the resistance genes) blaVIM and blaNDM) detected for these isolates of E. coli. The results appeared resistance of E.coli against AMC 82.5%, PRL 62.5%, AM 55%, and moderate resistance
... Show MoreWrong behavioral deviations among youth witnessed an obvious growing, some of these deviations are, robbery, drug and internet addiction, and smoking. Additionally, intellectual extremism and the disrespect of the traditions and genuine customs, In light of this issue, the research aims to shed light on the educational and preventative role of the woman in protecting and immunizing children from the wrong behavioral deviations. The woman has a significant and influential role in the society in general and in her family, in particular to the responsibility lies on her. The research shed light on the manifestations of behavioral deviation in children and the mechanisms of prevention and treatment. The research concluded with a set of recom
... Show More