Preferred Language
Articles
/
2BfWSpABVTCNdQwCY4Xx
Performance Analysis of xPON Network for Different Queuing Models
...Show More Authors

Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay mathematically for single OLT and multiOLT EPON system, and average delay and throughput for single OLT GPON system. A comparison of average delay and throughput between EPON and GPON is introduced with the same number of ONUs. The results show that the proposed multi-OLT EPON system can supports existing bandwidth allocation schemes with better performance than the single-OLT EPON. Cycle delay and average delay is decreased with multi-OLT system than in single OLT system, while throughput of multi-OLT system is higher than throughput of single OLT system. Splitting ratio and throughput in GPON is much higher than in EPON.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Hybrid Method of Linguistic and Statistical Features for Arabic Sentiment Analysis
...Show More Authors

          Sentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
Comparative Analysis of Two Robust Strategies for an Angular Velocity Control System
...Show More Authors

In this paper, a novel flow control strategy which is the inlet throttled pump was used to design an angular velocity control system for rotary actuator. Inlet throttled systems have good performance in addition to their high efficiency compared to traditional valve controlled systems. The flow in the proposed system is adjusted by a valve that is positioned at the pump inlet with the purpose of reducing the energy loses across the valve. This regulated flow is used then to control the actuator angular velocity. The system was modeled and the open loop stability and performance were studied. In order to improve the system performance, Robust-Proportional-Integral-Derivative (RPID) and structured singular value (M@#@) controllers have been d

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Nov 12 2025
Journal Name
2025 7th International Conference On Control Systems, Mathematical Modeling, Automation And Energy Efficiency (summa)
Comparative Analysis of Robust Strategies for an Electro-hydraulic Servo Valve System
...Show More Authors

PID (proportional-integral-derivative) and Mu controllers are widely used in electro-hydraulic servo systems due to their effectiveness and ease of implementation. This paper explores using particle swarm optimization (PSO) for tuning traditional and robust PID controllers, along with D-K iteration for Mu controller tuning. Three controller types: conventional PID (CPID), robust PID (RPID), and structured singular value controllers are developed, while analyzing multiplicative uncertainty with six uncertain coefficients. Their findings indicated that both PID (CPID and RPID) and Mu controllers maintained system stability. Notably, the Mu controller can handle coefficient uncertainty without a pure integral term, while the RPID controller de

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Finite Element Analysis for The Response of URM Walls Supporting RC Slab
...Show More Authors

The aim for this research is to investigate the effect of inclusion of crack incidence into the 2D numerical model of the masonry units and bonding mortar on the behavior of unreinforced masonry walls supporting a loaded reinforced concrete slab. The finite element method was implemented for the modeling and analysis of unreinforced masonry walls. In this paper, ABAQUS, FE software with implicit solver was used to model and analyze unreinforced masonry walls which are subjected to a vertical load. Detailed Micro Modeling technique was used to model the masonry units, mortar and unit-mortar interface separately. It was found that considering potential pure tensional cracks located vertically in the middle of the mortar and units show

... Show More
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayes Estimators for the Parameter of the Inverted Exponential Distribution Under different Double informative priors
...Show More Authors

In this paper, we present a comparison of double informative priors which are assumed for the parameter of inverted exponential distribution.To estimate the parameter of inverted exponential distribution by using Bayes estimation ,will be  used two different kind of information in the Bayes estimation; two different priors have been selected for the parameter of inverted exponential distribution. Also assumed Chi-squared - Gamma distribution, Chi-squared - Erlang distribution, and- Gamma- Erlang distribution as double priors. The results are the derivations of these estimators under the squared error loss function with three different double priors.

Additionally Maximum likelihood estimation method

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 15 2015
Journal Name
International Journal Of Computer Applications
Experimental Investigation for Small Horizontal Portable Wind Turbine of Different Blades Profiles under Laboratory Conditions
...Show More Authors

Experimental investigation for small horizontal portable wind turbine (SHPWT) of NACA-44, BP-44, and NACA-63, BP-63 profiles under laboratory conditions at different wind velocity range of (3.7-5.8 m/s) achieved in present work. Experimental data tabulated for 2, 3, 4, and 6- bladed rotor of both profiles within range of blade pitch angles . A mathematical model formulated and computer Code for MATLAB software developed. The least-squares regression is used to fit experimental data. As the majority of previous works have been presented for large scale wind turbines, the aims were to present the performance of (SHPWT) and also to make a comparisons between both profiles to conclude which is the best performance. The overall efficiency and el

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
International Journal On “technical And Physical Problems Of Engineering”
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes

... Show More
Scopus (13)
Scopus
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF