This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode with maximum responsivity at wavelength of 820 nm as a detector. Practical tests were carried out on the laser diode showed that the output characteristics and spectral characteristics of the laser diode depend largely on the drive current. The maximum separation distance between successive stations in the ring was 5.4 km. From the performance tests, it was concluded that the maximum throughput and maximum access delay are directly proportional to length of the transmitted information. A trade off between the transmitted information length and the maximum access delay is needed.
In this work Polyynes was synthesized by pulse laser ablation of graphite target in ethanol solution. UV-Visible Spectrophotometer, Fourier Transform Infrared Spectroscopy (FTIR) and Transmission electron microscopy (TEM) were used to study the optical absorption, chemical bonding, particle size and the morphology. UV absorption peaks coincide with the electronic transitions corresponding to linear hydrogen – capped polyyne (Cn+1H2), the absorption peaks intensity increased when the polyynes were produced at different laser energies and the formation rats of polyynes increased with the increasing of laser pulse number. The FTIR absorption peak at 2368.4 cm-1, 1640.0 cm-1 and 1276.
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
oday deep ocean life has not been discovered by humans including many secret world things to be explored. The researcher has focused on underwater optical wireless communications using various kinds of complex digital Signal processing most of them used in air and starting applied in underwater communication. The Internet of Things (IoT) uses underwater called Internet of Underwater Things (IoUT) applications to explore the underwater world with other devices. However, the difference in concentration between air and water surfaces is not easy making wireless communication more complicated. Visible light passes the water's surface with scattering and distortion inside the water and each color of light has different attenuation the blue laser
... Show MoreThe massive growth of the automotive industry and the development of vehicles use lead to produce a huge amount of waste tire rubber. Rubber tires are non-biodegradable, resulting in environmental problems such as fire risks. In this search, the flexural behavior of steel fiber reinforced self-compacting concrete (SFRSCC) beams containing different percentages and sizes of waste tire rubbers were studied and compared them with the flexural behavior of SCC and SFRSCC. Micro steel fiber (straight type) with aspect ratio 65 was used in mixes. The replacement of coarse and fine aggregate was 20% and 10% with chip and crumb rubber. Also, the replacement of limestone dust and silica fume was 50%, 25%, and 12% with ground rubbe
... Show MoreMoisture damage is one of the most significant troubles that destroy asphaltic pavement and reduces road serviceability. Recently, academics have noticed a trend to utilize fibers to enhance the efficiency of asphalt pavement. This research explores the effect of low-cost ceramic fiber, which has high tensile strength and a very high thermal insulation coefficient, on the asphalt mixture's characteristics by adding three different proportions (0.75%, 1.5%, and 2.25%). The Marshall test and the Tensile Strength Ratio Test (TSR) were utilized to describe the impact of ceramic fiber on the characteristics of Marshall and the moisture susceptibility of the hot mix asphalt mixture. The Field Emission Scanning Electron Microsc
... Show MorePPSU hollow fiber nanofiltration membranes are prepared by applying two concentrations and various extrusion pressures according to the phase inversion method. Cross-sectional area and outer structures were characterized by using scanning electron microscope (SEM) and atomic force microscopy (AFM). In additional to the pore size distribution, either the mean roughness or the mean pore size of the PPSU hollow fiber surfaces was evaluated by AFM. It was found that the morphology of the PPSU fibers had both sponge-like and finger-like structures through different extrusion pressures and PPSU concentrations. The mean pore size and mean roughness for inner and outer surfaces were seen to be decreased with the increase of extrusion pressure at
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More يهدف البحث إلى تحضير سلسلة جديدة من معقدات العناصر الانتقالية ثنائية التكافؤ (الكوبلت, النيكل, النحاس, الخارصين ,الكادميوم والزئبق) مع المركبات الحلقية غير المتجانسة (L1) و(L2) والمشتقة من تفاعل 2,1- فينيلين ثنائي امين وسايكلوهكسان -2,1-ثنائي امين مع المركب الوسطي (Pr) على التوالي. شخصت المعقدات ذات الصيغة العامة :- [M(L1or L2)Cl2] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني وقيا
... Show More