Fiber Bragg Grating has many advantages where it can be used as a temperature sensor, pressure sensor or even as a refractive index sensor. Designing each of this fiber Bragg grating sensors should include some requirements. Fiber Bragg grating refractive index sensor is a very important application. In order to increase the sensing ability of fiber Bragg gratings, many methods were followed. In our proposed work, the fiber Bragg grating was written in a D-shaped optical fiber by using a phase mask method with KrFexcimer. The resultant fiber Bragg grating has a high reflectivity 99.99% with a Bragg wavelength of 1551.2 nm as a best result obtained from a phase mask with a grating period of 1057 nm. In this work it was found that the rotation of the core of the D-shaped optical fiber that faces the phase mask is very important in determining the quality of written fiber Bragg grating.
The current study presents an experimental investigation of heat transfer and flow characteristic for subcooled flow boiling of deionized water in the microchannel heat sink. The test section consisted of a single microchannel having 300μm wide nominal dimensions and 300μm height (hydraulic diameter of 300μm). The test section formed of oxygen-free copper with 72mm length and 12mm width. Experimental operation conditions spanned the heat flux (78-800) kW/m2, mass flux (1700 and 2100) kg/m2.s at 31˚C subcooled inlet temperature. The boiling heat transfer coefficient is measured and compared with existing correlations. Also, the experimental pressure drop is measured and compared with microscale p
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreA nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
Ionic liquids (ILs) have been recognized for their potential as environmentally friendly solvents when compared to traditional organic solvents. Additionally, their function goes beyond that of solvents, and cocatalysts, as they frequently act as stabilizing agents and ligands for the metal-active species and intermediates in catalytic systems. This comprehensive review primarily focuses on the application of Pd-incorporated ILs in catalyzing cross-coupling Suzuki reactions. The responses play a vital role in creating a wide range of structurally diverse and highly functionalized organic compounds, focusing specifically on nucleopalladation Suzuki coupling reactions. The review provides a detailed summary of the reaction conditions, stereos
... Show MoreThis research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MorePhotodynamic Action (PDA) by using appropriate wavelength of irradiation conjugated with porphyrin derivatives is a powerful mechanism of tumor destruction. Hematoporphyrin derivative has been shown to selectively localize in neoplastic cells and then cause destruction of them by generation of singlet oxygen when activated by low power He-Ne laser. Light which used in this study has been emitting from this laser has a wavelength equal to 632.8 nm (red light). Doses of laser had been varied from 3.6 J/cm2 to 14.4 J/cm2 . The beam of laser adjusted with a modified tissue culture plate. Cell lines had exposed to Hematoporphyrin D (HpD) for 24 hours before Laser exposure, their concentrations were varied from 5 µg/ml to 80 µg/ml. Resu
... Show More