he Orthogonal Frequency Division Multiplexing is a promising technology for the Next Generation Networks. This technique was selected because of the flexibility for the various parameters, high spectral efficiency, and immunity to ISI. The OFDM technique suffers from significant digital signal processing, especially inside the Inverse/ Fast Fourier Transform IFFT/FFT. This part is used to perform the orthogonality/De-orthogonality between the subcarriers which the important part of the OFDM system. Therefore, it is important to understand the parameter effects on the increase or to decrease the FPGA power consumption for the IFFT/FFT. This thesis is focusing on the FPGA power consumption of the IFFT/FFT uses in the OFDM system. This research finds a various parameters effect on FPGA power of the IFFT/FFT. In addition, investigate the computer software used to measure and analyse the FPGA power consumption of OFDM transceivers, and selects the target hardware used in the computer software. The researched parameters include the number of bits used in calculating the phase factor precision; Cyclic Prefix length effected on IP core IFFT, Subcarrier modulation type, word length width, Real and Complex Value IFFT, IFFT length, and subcarriers sampling frequency. The real value IFFT is proposed in 1987 and implemented in this thesis. These parameters above are discussed by comparing the result between the Real and Complex value IFFT used inside the OFDM system.
Pathogenic microorganisms are becoming more and more resistant to antimicrobial agents. So the synthesis of new antimicrobial agents is very important. In this work, new 5-fluoroisatin-chalcone conjugates 5(a–g) were synthesized based on previous research that showed the modifications of the isatin moiety led to the synthesis of many derivatives that have antimicrobial activity. 4-aminoacetophenone reacts with 5-fluoroisatin to form Schiff base (3), which in turn reacts with two different groups of aromatic (carbocyclic and heterocyclic) aldehydes 4(a–g) separately to form the final compounds 5(a–g). Proton-nuclear magnetic resonance (¹H-NMR) and Fourier-transform infrared (FT-IR) spectroscopy were used to confirm the chemic
... Show MoreIsatin is a heterocyclic molecule that belongs to one of the most important classes of organic compounds known as indolines. Isatin, isatin analogs, and their Schiff bases have recently attracted a lot of attention in medicinal chemistry. Isatin, itself, shows various biological activities such as antiviral, anticancer, antimicrobial, anti-inflammatory, analgesic, antioxidant, and anticonvulsant. Bis- Schiff bases containing isatin moiety have been known to possess a wide spectrum of pharmacological activities. This review offers up-to-date information on the most active isatin bis-Schiff bases, which would include anticancer, antimicrobial, antiviral, anticonvulsant, anti-inflammatory, and analgesic activities. These observations c
... Show MoreA compact microstrip six-port reflectometer (SPR) with extended bandwidth is proposed in this paper. The design is based on using 16-dB multi-section coupled line directional couplers and a multi-section 3-dB Wilkinson power divider operating from 1 to 6 GHz. The proposed SPR employs only two calibration standards: a matched load and an open load. As compared to other dielectric substrates, fabricating the proposed SPR involves using a low-cost (FR4) substrate. A novel algorithm is also proposed to estimate the complex reflection coefficient over the frequency ranges at which the standard performance of the circuit components is not fully satisfied. The new algorithm is based on the circles’ intersection points, which have been de
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThin film solar cells are preferable to the researchers and in applications due to the minimum material usage and to the rising of their efficiencies. In particular, thin film solar cells, which are designed based one transition metal chalcogenide materials, paly an essential role in solar energy conversion market. In this paper, transition metals with chalcogenide Nickel selenide termed as (NiSe2/Si) are synthesized. To this end, polycrystalline NiSe2 thin films are deposited through the use of vacuum evaporation technique under vacuum of 2.1x10-5 mbar, which are supplied to different annealing temperatures. The results show that under an annealed temperature of 525 K,
... Show MoreQuality is one of the important criteria to determine the success of product. So quality control is required for all stages of production to ensure a good final product with lowest possible losses. Control charts are the most important means used to monitor the quality and its accuracy is measured by quickly detecting unusual changes in the quality to maintain the product and reduce the costs and losses that may result from the defective items. There are different types of quality control charts and new types appeases involving the concept of fuzziness named multinomial fuzzy quality control chart (FM) , dividing the product to accepted and not may not be accurate therefore adding fuzziness concept to quality charts confirm and a
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show More