Abstract: Recently, there is increasing interest in using mode-division multipelexing (MDM) technique to enhace data rate transmission over multimode fibers. In this technique, each fiber mode is treated as a separate optical carrier to transfer its own data. This paper presents a broadband, compact, and low loss three-mode (de)multiplexer designed for C+L band using subwavelength grating (SWG) technology and built-in silicon-on-insulator SOI platform. SWG offers refractive index engineering for wider operating bandwidth and compact devices compared to conventional ones. The designed (de)multiplex deals with three modes (TE0, TE1, and TE2) and has a loss > -1 dB and crosstalk < −15 dB, and its operation cover 160 nm (1490 to 1650) nm wavelength span. The overall size of the designed device is 80 × 4 μm2.
The laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.
Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm
The most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThis study aims to evaluate the influence of the air abrasion of dentin on the shear bond strength of lithium disilicate using three different types of luting cements. Sixty cylindrical specimens were milled from lithium disilicate CAD/CAM blocks (IPSe.max CAD). Sixty sound human maxillary premolar teeth were decoronated to the level of peripheral dentin, then randomly divided into three groups according to the type of luting cement used for the cementation of the lithium disilicate specimens (n = 20); Group A: Glass ionomer cement (Riva Self- Cure); Group B: Adhesive resin cement (Rely X Ultimate); Group C: Self-adhesive resin cement (Rely X U200). Each group was then further subdivided into two subgroups (n=10); Subgroups AI, BI, and CI,
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
We must live in an era dominated by the call for equality between men and women, in which the voices of advocates of gender integration were heard. After women opened their doors to compete with their brother, Knowledge, and culture in the various forms of life, language as a science of the time and knowledge of the other had to match this reality and express the most accurate expression of this task
Java is a high-level , third generation programming language were introduced Javaoptics Open Source Physics (OSP) as a new simulation for design one of the most important interference optical coating called antireflection coating. It is recent developments in deign thin-film coatings. (OSP) shows multiple beam interferences from a parallel dielectric thin film and the evolution of reflection factors. It is simple to use and efficiently also can serve educational purposes. The obtained results have been compared with needle method