Nowadays, most of the on-chip plasmonic single-photon sources emit an unpolarized stream of single photons that demand a subsequent polarizer stage in a practical quantum cryptography system. In this paper, we numerically demonstrated the coupling of the light emitted from a quantum emitter (QE) at 700 nm wavelength to the propagation mode supported by an on-chip hybrid plasmonic waveguide (HPW) polarization rotator. Our results proved that the light emitted is linearly polarized at 0º, 45º/−45º, and 90º with propagation lengths of 5 μm, 3.3 μm, and 3.9 μm, respectively. Moreover, high power-conversion efficiency was obtained from an applied transverse magnetic (TM) mode (0º-polarization) to a transverse electric (TE) (90º-polarization) and a linearly polarized light at 45º/−45º of 97% and a 98%, respectively. Furthermore, we obtained almost a 3-fold enhancement of the total decay rate of the QE with high emission coupling efficiency (β-factor) of 88%, 80%, and 87% to the corresponding waveguide mode for 0º, 45º/−45º, and 90º, respectively. Our work paves the way towards more efficient, compact, and less complicated on-chip plasmonic single-photon sources with a specified output polarization.
This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreReinforced concrete (RC) slabs strengthened with carbon fibre reinforced polymer (CFRP) and subjected to flexural actions may experience many types of failure, including FRP debonding, FRP rupture and concrete crushing. Of these different types of failure modes, FRP debonding stands out as the most predominant type of failure because of its dependence on the relatively weak bond interface between the soffit of the RC member and the FRP sheet attached to it. Many anchorage systems have been developed to enhance the performance of strengthened systems, one of which is the hybrid anchor, which combines the effects of patch anchors and spike anchors. Hybrid anchors have shown significant enhancement when used with RC members subjected to shear
... Show MoreLight naphtha treatment was achieved over 0.3wt%Pt loaded-alumina, HY-zeolite and Zr/W/HY-zeolite catalysts at temperature rang of 240-370°C, hydrogen to hydrocarbon mole ratio of 1-4 0.75-3 wt/wt/hr, liquid hourly space velocity (LHSV) and at atmospheric pressure. The hydroconversion of light naphtha over Pt loaded catalyst shows two main reactions; hydrocracking and hydroisomerization reactions. The catalytic conversion of a light naphtha is greatly influenced by reaction temperature, LHSV, and catalyst function. Naphtha transformation (hyroisomerization, cracking and aromatization) increases with decreasing LHSV and increasing temperature except hydroisomerization activity increases with increasing of temperature till 300°C then began
... Show MoreThe aim of the present study was to demonstrate the possible role of statins on the inflammatory biomarkers in patients with periodontal disease (PD) This cross-sectional study involved 74 patients with PD and/or dyslipidemia divided into Group A: 34 patients with PD (nonstatins users); Group B: 40 patients with PD (statins users); and Group C: 30 healthy controls. Total cholesterol (TC), triglyceride (TG) and high-density lipoprotein, C-reactive protein (CRP), interleukin-6 (IL-6), tumor necrosis factor alpha (TNF-α), and malondialdehyde (MDA) were measured . Blood pressure prolife and indices of PD were evaluated in each group. Statistical analysis was conducted by using SPSS version 20.0.
A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThe study aimed to determine the extent of market knowledge in the companies researched, as if market knowledge is qualified to lead the companies researched to achieve marketing performance , for this purpose, formulated hypotheses of the study in three hypotheses, the first major hypothesis "there is a correlation with significance of market knowledge to improve the marketing performance , "while the second major hypothesis, "there is a significant moral influence of market knowledge to improve the marketing performance " these hypotheses targeting to determine the role played by market knowledge in the leadership of companies researched to achieve improvement in marketing perfor
... Show More