Focusing of Gaussian laser beam through nonlinear media can induce spatial self- phase modulation which forms a far field intensity pattern of concentric rings. The nonlinear refractive index change of material depends on the number of pattern rings. In this paper, a formation of tunable nonlinear refractive index change of hybrid functionalized carbon nanotubes/silver nanoparticles acetone suspensions (F-MWCNTs/Ag-NPs) at weight mixing ratio of 1:3 and volume fraction of 6x10-6 , 9x10-6 , and 18x10-6 using laser beam at wavelength of 473nm was investigated experimentally. The results showed that tunable nonlinear refractive indices were obtained and increasing of incident laser power density led to increase the nonlinear refractive index changes of suspension at each volume fraction. Moreover, the nonlinear refractive index changes ( Δnnl,max ) at volume fraction of 18x 10-6 irradiated by various laser intensities (137.31, 200, 228, 268, and 366.61 W/cm2) have higher value than others.
Abstract
In this work, the plasma parameters (electron temperature (Te), electron density( ne), plasma frequency (fp) and Debye length (λD)) have been studied by using the spectrometer that collect the spectrum of Laser produce CdTe(X):S(1-X) plasma at X=0.5 with different energies. The results of electron temperature for CdTe range 0.758-0.768 eV also the electron density 3.648 1018 – 4.560 1018 cm-3 have been measured under vacuum reaching 2.5 10-2 mbar .Optical properties of CdTe:S were determined through the optical transmission method using ultraviolet visible spectrophotometer within the r
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continued development and widespread deployment of web journalism. This research belongs to descriptive studies which depends on sample survey approach adopted by five-meter design measuring trends. It contains 28 items having applied honesty and reliability transaction and the scale form is distributed to the sample studied of about 110 professors and then the researcher collects them and then applying the appropriate statistical program to get the results. This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continu
... Show MorePiroxicam (PIR) is a nonsteroidal anti-inflammatory drug of oxicam category, used in gout, arthritis, as well as other inflammatory conditions (topically and orally). PIR is practically insoluble in water, therefore the aim is prepare and evaluate piroxicam as liquid self-nanoemulsifying drug delivery system to enhance its dispersibility and stability. The Dispersibilty and Stability study have been conducted in Oil, Surfactant and Co-surfactant for choosing the best materials to dissolve piroxicam. The pseudo ternary phase diagrams have been set at 1:1, 2:1, 3:1 as well as 4:1 ratio of surfactants and co-surfactants, also there are 4 formulations were prepared by using various concentrations of transcutol HP, cremophore EL and triacetin
... Show MoreThe aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.
The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f
... Show MoreThe products of the surrealist school since its inception to this day have greatly influenced art in the world, so we find many artists around the world invested in their visual texts the forms generated by surrealism, and here the researcher raises several questions: What are the formal vocabulary that directly or indirectly refers to Self-used by the surrealist painter? Was the surrealist form understood as intended by the movement? In these questions, the research problem is summarized. The importance of it lies in identifying the references to the form of the human self, which are related to the psychological field in the works of the surrealists, especially Salvador Dali. Then the researcher chose his research community from the wor
... Show More