<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but also played an important role in future communication networks. Some technical development of wireless access networks-optical and seamless coexistence of both techniques, this paper is a review of the State of the latest developments and advances in optical and wireless communications, major technical challenges to provide flawless communication in fiber- wireless (FiWi) access networks, places of interest important research issues to provide intelligence information, access and transport and the convergence of these networks in the future.</p>
The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreThis study examines the impact of different curing methods on the compressive strength of concrete. It investigates techniques such as air curing, periodic water spraying, full water submersion, and polyethylene encasement. Artificial neural network models were employed to evaluate the compressive strength under each curing condition. A model for calculating compressive strength that considers surrounding conditions was created using an artificial neural network. The current study’s figures were generated using this model. The research thoroughly examined the impact of curing environments and concrete mix components on strength properties, taking into account factors such as tempera
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreBackground: Medication reconciliation can include medication reviewing and providing counseling and a list of all the medications during every transition of care. Objectives: to explore in-depth the perspectives of Iraqi physicians and pharmacists regarding the necessity of medication reconciliation at hospital discharge and identify the possible benefits and challenges that could face its implementation. Subjects and Methods: A qualitative study included semi-structured interviews with pharmacists and physicians working at a public teaching hospital in Iraq. The interviews were conducted face-to-face from February to March 2023. Thematic analysis was used to analyze the qualitative data generated from the interviews. Results: In th
... Show MoreThis research seeks to shed light on what you add intangible assets of benefit to the company and this antagonize pause for consideration because it makes the company in a good competitive position stimulates the rest of the companies to acquire those assets.
That many companies have achieved competitive advantages in the market do not even achieved monopolies increased the value and reaped extraordinary profits as a result of those assets which requires the need to be measured to determine the extent to which contribution in the emergence of the value added to the value of the company on the one hand and to make the presentatio
... Show MoreSJ Mohammed, AA Noaimi, KE Sharquie, JM Karhoot, MS Jebur, JR Abood, A Al-Hamadani, Al-Qadisiyah Medical Journal, 2015 - Cited by 20