Preferred Language
Articles
/
bhgBlJQBVTCNdQwCvR3c
Good cleavers for fiber-optic communication technology
...Show More Authors

Fiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving process are clearly explained here. Our obtained images demonstrated that these precision cleavers have great potential to cut various fibers at one time with high speed, good efficiency, and accuracy. We also found that this cleavage technique produced the greatest laser intensity and the best light dispersion pattern, while the scribe pen resulted in undesirable levels of laser intensity and light dispersion pattern.

Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Oct 19 2021
Journal Name
Big Data Summit 2: Hpc & Ai Empowering Data Analytics 2018 | Conference Paper
Deep Bayesian for Opinion-target identification
...Show More Authors

The use of deep learning.

View Publication
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Result for the group SL(2,172)
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Manufacturing electrolysis cell for hydrogen production
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Mar 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Computer Aided Design for Spray Driers
...Show More Authors

The aim of this work is to develop an axi-symmetric two dimensional model based on a coupled simplified computational fluid dynamics (CFD) and Lagrangian method to predict the air flow patterns and drying of particles.  Then using this predictive tool to design more efficient spray dryers. The approach to this is to model what particles experience in the drying chamber with respect to air temperature and humidity. These histories can be obtained by combining the particles trajectories with the air temperature/humidity pattern in the spray dryer. Results are presented and discussed in terms of the air velocity, temperature, and humidity profiles within the chambers and compared for drying of a 42.5% solids solution in a spray chamber

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Optical Properties for SeTe Thin Films
...Show More Authors

Chalcogenide glasses SeTe have been prepared from the high purity constituent elements .Thin films of SeTe compound have been deposited by thermal evaporation onto glass substrates for different values of film thickness . The effect of varying thickness on the value of the optical gap is reported . The resultant films were in amorphous nature . The transmittance spectra was measured for that films in the wavelength range (400-1100) nm . The energy gap for such films was determined .

View Publication Preview PDF
Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the group 𝓢𝓛(2,38)
...Show More Authors

Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF