It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.
Mode filtering technique is one of the most desired techniques in optical fiber communication systems, especially for multiple input multiple output (MIMO) coherent optical communications that have mode-dependent losses in communication channels. In this work, a special type of optical fiber sensing head was used, where it utilizes DCF13 that is made by Thorlabs and has two numerical apertures (NA’s). One is for core and 1st cladding region, while the 2nd relates the 1st cladding to the 2nd cladding. Etching process using 40 % hydro-fluoric (HF) acid was performed on the DCF13 with variable time in minutes. Investigation of the correlation between the degree of etching and the re
This work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective
... Show MoreThe primary purpose of this paper is to introduce the, N-coprobabilistic normed space, coprobabilistic dual space of N-coprobabilistic normed space and give some facts that are related of them.
In the drilling and production operations, the effectiveness of cementing jobs is crucial for efficient progress. The compressive strength of oil well cement is a key characteristic that reflects its ability to withstand forceful conditions over time. This study evaluates and improves the compressive strength and thickening time of Iraqi oil well cement class G from Babylon cement factory using two types of additives (Nano Alumina and Synthetic Fiber) to comply with the American Petroleum Institute (API) specifications. The additives were used in different proportions, and a set of samples was prepared under different conditions. Compressive strength and thickening time measurements were taken under different conditions. The amoun
... Show MoreIn :the _pr sent _paper we report ths. ynthesis ·of a new li:ga!!d..
[f4LJ [{'2 {1-'[(2-hyd•:0xy-.ben:zy1i.den·e)..,bxcJrazanci}:etby-l }benzerieÂ
J,5 t;rtiol .aad its complexes ·w-ith '('Mlif(1 J Fev 1 ), ed(J'l), and. :f.::I:g 01>-)
The ligand \VS preP..ated rin tWo steps' • fp I t}Je nrst stea -soJutiQil Qf
-saUcyla[deeyeq. ip methatt:oJ . re3ctcd lU1der reflux
... Show MoreThe current research aims to evaluate liquidity (as an independent variable) to improve the bank’s profitability (as a dependent variable ), by the bank’s ability to maximize its profits from its business results without excessive bank’s liquidity, so that may affect negatively affects the bank’s reputation and it’s dealers confidence in facing their financial obligations. and this may lead trying to come out among other recommendations including contributing to obtain, the bank’s ability to achieve liquidity balance to maximize its profits. This research has been applied to the sample induced intentionally by choosing three Iraqi private banks. The researcher used financial indicators to assess the bank’s liq
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper