A tunable band pass filter based on fiber Bragg grating sensor using an in-fiber Mach-Zender interferometer with dual micro-cavities is presented. The micro-cavity was formed by splicing together a conventional single-mode fiber and a solid core photonic crystal fiber (SCPCF) with simple arc discharge technique. Different parameters such as arc power, length of the SCPCF and the overlap gap between samples were considered to control the fabrication process. The ellipsoidal air-cavity between the two fibers forms Fabry-Perot cavity. The diffraction loss was very low due to short cavity length. Ellipsoidal shape micro-cavities were experimentally achieved parallel to the propagation axis having dimensions of (24.92 – 62.32) μm of width and (3.82 – 18.2) μm of length. The maximum tunability 0.73nm was achieved at minimum length of (SCPCF) in the range (1545.673-1545.546) nm. A micro- cavity with width and length as high as 62.32 um and 18.3 um have higher sensitivity 0.31 nm/cm than temperature sensitivities of 18 pm/°C.
The synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThe change in the size of the droplets during the pesticide application process could have a negative impact on the percentage of drift or the losses of pesticides to the environment. One of the factors that could affect the droplet size produced from a single nozzle is the internal design of the nozzle itself, in addition to the wear of the nozzle orifice as a result of the usage time. In this research, three types of nozzles with different internal designs were used (Turbo TeeJet (TT), Turbo TwinJet (TTj 6011003), and Drift Guard (DG 11003)). The nozzles were subjected to an accelerated wear test for one hundred hours, and different droplet size parameters (Dv 0.1, Dv 0.5, Dv 0.9),
The concept of social graphic design is one of the most critical areas that highlight the designer's knowledge of social responsibility by employing design skills in community awareness. This study focused on defining social graphic design, the meaning, practices, and strategies for designing awareness posters. This study reviewed two examples of awareness posters that reflect the Saudi designer's practices. The results summarized that social graphic design is a concept not taught directly but gained from permanent practice in designing awareness posters that interact with community issues. The designer's understanding of his social events and their sensing in the visual form of a poster reflects the designer's social awareness. Social g
... Show MoreThe drug promethazine hydrochloride (PRZH) forms with rhodium (II) a colored chelate (?max = 472 nm) complex at (pH = 2.1) which is extractable with benzyl alcohol as organic solvent. Under the appropriate experimental conditions a calibration plot was set up from which some analytical parameter were derived and deduced by regression. Standard addition procedure was also adopted. It has been estimated that the concentration of the drug PRZH to be 24.89 mg per unit and 24.19 mg per unit for both calibrations. Under optimal conditions, the developed method has been achieved the following characteristics: LDR (30 – 150 µg ml-1 ) PRZH , RSD % ( 0.6 – 2.47 ) , sandell sensitivity( 0.0844 µg. cm -2 ) , LOD ( 1.66 µgml-1 ) , recovery
... Show More