This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode with maximum responsivity at wavelength of 820 nm as a detector. Practical tests were carried out on the laser diode showed that the output characteristics and spectral characteristics of the laser diode depend largely on the drive current. The maximum separation distance between successive stations in the ring was 5.4 km. From the performance tests, it was concluded that the maximum throughput and maximum access delay are directly proportional to length of the transmitted information. A trade off between the transmitted information length and the maximum access delay is needed.
Research title: Ruling on abortion in Sharia and law.
The importance of research: Projection is of great importance because it touches the life of a living being who enjoys human qualities. However, this organism often wastes its rights and does not protect its human beings. These souls are lost in millions by the sake of casual desire or hidden desire.
The research plan: The research dealt with an introductory topic, four topics, and in each topic there are demands, branches, and a conclusion.
The most important findings of the study: The ruling on aborting the fetus in the Sharia is only permissible (and the necessity is valued at its va
... Show MoreThe present study aimed to asspssment the nutrition a program to sample of student from internal departments of Baghdad University (AL-Jadiriya Complex) and the University of AL-MustanSiriya four grades and aged (19-24) year study included 150 male and female students by (75) male and (75) of female register height, weight nd body mass index were study habits and food pattern of the same sample (150) and by aspecial form and take the personal information interviews and record information on food intake during 24 hour .noted adifference practie in the weights and longths of male and female (sample).
BMI rates were within the normal weight as the value of BMI for males aged (19- 21)and (22-24) and (22.21) and (23,37),respectively and th
At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin
... Show MoreThe crude aqueous extract of menthespicata , the objective of this study was to investigate the effects of this extraction , on the histological changes of the ovares and levels of sex hormone , ( FSH , LH , Estradiol ) in albino female mice . the extract was given orally for( 45 ) days . fourty mature female mice were used in this study , the animals divided into four major groups . each group was include ten mice . the first three groups was given different concentration )) (21 , 14 , 7 %) . While the fourth group considered as control group which had been administrated tab water . For ( 45 ) days each group had been killed for hormonal assay in blood
... Show MoreThis work was conducted to study the oxidation of phenol in aqueous solution using copper based catalyst with zinc as promoter and different carrier, i.e. γ-Alumina and silica. These catalysts were prepared by impregnation method.
The effect of catalyst composition, pH (5.6-9), phenol to catalyst concentration ratio (2-0.5), air feed rate (30-50) ml/s, stirring speed (400-800) rpm, and temperature (80-100) °C were examined in order to find the best conditions for phenol conversion.
The best operating conditions which lead to maximum phenol conversion (73.1%) are : 7.5 pH, 4/6 phenol to catalyst concentration, 40 ml/s air feed rate, 600 rpm stirring speed, and 100 °C reaction temperature. The reaction involved an induction period
Financial inclusion refers to the access of financial services at low cost and high-quality from the formal financial sector to all segments of society, especially marginalized groups, and then use and benefit from them. Financial inclusion is also associated with banking stability, as well as with financial integrity and financial protection for the consumer, therefore, it achieves a number of objectives, the most important of which is to support and enhance banking stability. This is what made it attract the attention of many countries and central banks recently.
The study aims to show the impact of financial inclusion indicators on ban
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More