he Orthogonal Frequency Division Multiplexing is a promising technology for the Next Generation Networks. This technique was selected because of the flexibility for the various parameters, high spectral efficiency, and immunity to ISI. The OFDM technique suffers from significant digital signal processing, especially inside the Inverse/ Fast Fourier Transform IFFT/FFT. This part is used to perform the orthogonality/De-orthogonality between the subcarriers which the important part of the OFDM system. Therefore, it is important to understand the parameter effects on the increase or to decrease the FPGA power consumption for the IFFT/FFT. This thesis is focusing on the FPGA power consumption of the IFFT/FFT uses in the OFDM system. This research finds a various parameters effect on FPGA power of the IFFT/FFT. In addition, investigate the computer software used to measure and analyse the FPGA power consumption of OFDM transceivers, and selects the target hardware used in the computer software. The researched parameters include the number of bits used in calculating the phase factor precision; Cyclic Prefix length effected on IP core IFFT, Subcarrier modulation type, word length width, Real and Complex Value IFFT, IFFT length, and subcarriers sampling frequency. The real value IFFT is proposed in 1987 and implemented in this thesis. These parameters above are discussed by comparing the result between the Real and Complex value IFFT used inside the OFDM system.
A field experiment was carried out in one of the agricultural fields in Thi Qar governorate in Nasiriyah during the winter season 2017-2018 The aim was to investigate the effect of foliar application of seaweed extract on yield and quality of four varieties of broad bean .The design of field experiment was (RCBD) in factorial experiments with three replications in two factors. .The first factor included four broad bean cultivars (Luz de otono – Grano Violtto -local - Aquadols. ( The second factor included four sprayed extracts of the seaweed extract (1, 2, 3 and 4 g L -1) In addition to the comparison treatment in which the plants were sprayed with distilled water only. . The plants of the broad bean that were sprayed with seaweed extract
... Show MoreTourism is one of the most important sources of income of economic key countries in the world so are imports of tourism for some countries a source of income is not significant of the total revenues of States. Making those countries, and those countries a destination for visitors, and here should be interest in the Wealth and cultural heritage that distinguishes Islamic countries in general, and Iraq in particular, must be placed specialist studies in all areas for the development of this area of tourism, especially religious tourism to achieve a desired and desired of such research.It is the most important ways to develop tourism in general and religious tourism is of particular publications, advertising, and is important for us in this
... Show MoreBACKGROUND: The degree of the development of coronary collaterals is long considered an alternate – that is, a collateral – source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty. OBJECTIVES: Our study explores the contribution of coronary collaterals – if any exist – while considering other potential predictors, including demographics and medical history, toward the left ventricular (LV) dysfunction measured through the LV ejection fraction (LVEF). METH
... Show MoreThe research aims to shed light on the importance of forensic accounting and its impact on the outcome of the activity of the Iraqi general insurance company by winning the lawsuits filed against the company because the forensic accountant (the judicial expert) possesses the ability to interpret and analyze the data. The research community represents the insurance companies in Iraq. Iraqi insurance, and the researchers adopted the descriptive approach in covering the theoretical aspect and the deductive approach in covering the practical side, depending on the financial statements of the Iraqi insurance company for the years of research.
One of the most important conclusions reached by the researchers was that forensic accounting
... Show MoreThe genus of Chrysobothris Eschscholtz, 1829 is one of the most diverse and widespread genera of the family Buprestidae of some 700 described species distributed throughout the world. In Iraq, particularly in the Kurdistan region, about 4 species had been recorded so far, many of these species are sympatric, share larval host plants, and are difficult to reliably separate morphologically. The current study investigates species limits and relationships among the recognized species occurring within the Erbil Province; mitochondrial cytochrome C oxidase (COX I) molecular analysis confirmed the monophyly of two Chrysobothris species, Ch. affinis (Fabricius, 1794) and Ch. chrysostigma (Linnaeus, 1758). Implications of the resultant larval mor
... Show MoreA thin CdS Films have been evaporated by thermal evaporation technique with different thicknesses (500, 1000, 1500 and 2000Å) and different duration times of annealing (60, 120 180 minutes) under 573 K annealing temperature, the vacuum was about 8 × 10-5 mbar and substrate temperature was 423 K. The structural properties of the films have been studied by X- ray diffraction technique (XRD). The crystal growth became stronger and more oriented as the film thickness (T) and duration time of annealing ( Ta) increases.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper