In this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system at maximum fiber length at 61.2 km equal to 2.30551×10-12, 47.88526 dB respectively. The power budget for FSC system was calculated to be 29 dB. Results show that the BER increases when the received optical power decreases the due to increase of the optical fiber length61.2 km. while S/N decreases. The optical power budget increases as the transmitted optical power increases.
Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob
... Show MoreHuman interaction technology based on motion capture (MoCap) systems is a vital tool for human kinematics analysis, with applications in clinical settings, animations, and video games. We introduce a new method for analyzing and estimating dorsal spine movement using a MoCap system. The captured data by the MoCap system are processed and analyzed to estimate the motion kinematics of three primary regions; the shoulders, spine, and hips. This work contributes a non-invasive and anatomically guided framework that enables region-specific analysis of spinal motion which could be used as a clinical alternative to invasive measurement techniques. The hierarchy of our model consists of five main levels; motion capture system settings, marker data
... Show MoreThis paper aims to study the second-order geometric nonlinearity effects of P-Delta on the dynamic response of tall reinforced concrete buildings due to a wide range of earthquake ground motion forces, including minor earthquake up to moderate and strong earthquakes. The frequency domain dynamic analysis procedure was used for response assessment. Reinforced concrete building models with different heights up to 50 stories were analyzed. The finite element software ETABS (version 16.0.3) was used to analyze reinforced concrete building models.
The study reveals that the percentage increase in buildings' sway and drift due to P-Delta effects are nearly constant for specific building height irrespective of the seism
... Show MoreThis work aimed to estimate the frequency of mitochondrial inborn errors of metabolism (MIEMs) in patients presenting with family history and IEM-picture who referred for advance IEM assay in Mosul province and Kurdistan region. This study was observational study conducted on 364 cases referred from different general /or private pediatric clinics with unexplained sign and symptoms and suspension of mitochondrial dysfunction. The study included 364 children with an age ranging from 1 month to 1 year. Started from January 2018 to January 2020. All patients referred with their full history review, notes about their clinical examination, and laboratory investigations including blood ammonia, serum lactate/ pyruvate, arterial blood gases. In
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreObjectives This work presents laser coating of grade 1 pure titanium (Ti) dental implant surface with sintered biological apatite beta-tricalcium phosphate (β-TCP), which has a chemical composition close to bone. Materials and methods Pulsed Nd:YAG laser of single pulse capability up to 70 J/10 ms and pulse peak power of 8 kW was used to implement the task. Laser pulse peak power, pulse duration, repetition rate and scanning speed were modulated to achieve the most homogenous, cohesive and highly adherent coat layer. Scanning electron microscopy (SEM), energy dispersive X-ray microscopy (EDX), optical microscopy and nanoindentation analyses were conducted to characterise and evaluate the microstructure, phases, modulus of elasticity
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More