This document provides an examination of research, on combining orthogonal frequency division multiplexing (OFDM) and optical fibers in communication networks. With the increasing need for data speeds and efficient use of bandwidth experts have been exploring the connection between OFDM, valued for its ability to handle multipath interference and optimize spectral usage and optical fiber technology which provides superior data transmission capabilities with low signal loss and strong protection, against electromagnetic disturbances. The review summarizes discoveries from studies examining the pros and cons of using OFDM, in optical communication networks. It discusses obstacles like fiber nonlinearity, chromatic dispersion and the effects of phase noise while also assessing solutions suggested in research. Furthermore, the paper contrasts performance measures such as bit error rate signal, to noise ratio and usage to show how OFDM can improve the efficiency and dependability of optical fiber systems. Through combining findings from theoretical and simulation driven studies this analysis showcases the progress and existing hurdles in merging OFDM with optical fiber technologies. It serves as a reference, for endeavors, in cutting edge communication networks.
The study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.
The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d
... Show MoreThis study deals with the elimination of methyl orange (MO) from an aqueous solution by utilizing the 3D electroFenton process in a batch reactor with an anode of porous graphite and a cathode of copper foam in the presence of granular activated carbon (GAC) as a third pole, besides, employing response surface methodology (RSM) in combination with Box-Behnk Design (BBD) for studying the effects of operational conditions, such as current density (3–8 mA/cm2), electrolysis time (10–20 min), and the amount of GAC (1–3 g) on the removal efficiency beside to their interaction. The model was veiled since the value of R2 was high (>0.98) and the current density had the greatest influence on the response. The best removal efficiency (MO Re%)
... Show MoreThree-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreCognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show MoreThe design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Ar
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn this paper, the effects of subsurface water retention technology (SWRT) on crop coefficient (kc) and crop evapotranspiration (ETc) of eggplant were investigated in sandy loam soil. For this purpose, two treatments plot (with SWRT and without using SWRT) were adopted during 93 days of cultivation. The study was conducted in open field within Al-Fahamah Township, Baghdad, Iraq during summer growing season 2017. The accumulated ETc of eggplant was 403.3 and 515.2 mm for SWRT treatment and control plot, respectively by reduction percentage 21.7 %. The average values of ETc during the growing season were 4.3 and 5.5 mm/day, respectively. The crop coefficients value during the gro
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained