Preferred Language
Articles
/
ijp-56
Enhancement the sensitivity of humidity sensor based on an agarose infiltration reflection-type photonic crystal fiber interferometer
...Show More Authors

Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected power and the position of the interference peaks is found to be shifted that the interference pattern with a 100 nm span can be observed with high humidity sensitivity of (8.49 pm / %RH) is achieved with compact (4mm) PCF length . The sensor has the advantages for suitable for monitoring humidity in microenvironments. The repeatability, long-term stability, measurement accuracy. Wide humidity range. The response time of the sensor is found to be 1.4 sec for a change in RH of 50 %RH. The fast response time suggests that the sensor can potentially be used as a human breath rate monitor in a clinical situation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Gray-Scale Image Compression Method Based on a Pixel-Based Adaptive Technique
...Show More Authors

     Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of Robotics
Real-Time SLAM Mobile Robot and Navigation Based on Cloud-Based Implementation
...Show More Authors

This study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database

... Show More
View Publication
Scopus (21)
Crossref (13)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (25)
Crossref (13)
Scopus Crossref
Publication Date
Thu Dec 24 2020
Journal Name
Advances In Civil Engineering
Analytical study on torsional behavior of concrete beams strengthened with fiber reinforced polymer laminates using softened truss model
...Show More Authors

This study aimed at evaluating the torsional capacity of reinforced concrete (RC) beams externally wrapped with fiber reinforced polymer (FRP) materials. An analytical model was described and used as a new computational procedure based on the softened truss model (STM) to predict the torsional behavior of RC beams strengthened with FRP. The proposed analytical model was validated with the existing experimental data for rectangular sections strengthened with FRP materials and considering torque-twist relationship and crack pattern at failure. The confined concrete behavior, in the case of FRP wrapping, was considered in the constitutive laws of concrete in the model. Then, an efficient algorithm was developed in MATLAB environment t

... Show More
Scopus (22)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
The Arts of Media Writing / An Empirical Study on the Privacy of Media Writing
...Show More Authors

Media writing is accuracy writing. Clarity and concision are its predominant features. It is a writing that goes straight to the essence because it has no time to waste. Furthermore, it must be as accurate as scientific writing. It is destined for the average reader and has to be understood by everyone. However, it can be as elegant as literary writing. The variety in its forms of expression does not prevent media writing from having its own amplitude.

In short, this study is a practical approach that aims at studying different kinds of writing styles and identifying the specificity of media writing using some patterns and examples

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 20 2022
Journal Name
Journal Of Optics
Good cleavers for fiber-optic communication technology
...Show More Authors

Fiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving p

... Show More
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Al-qadisiyah Journal For Engineering Sciences
Improving the Moisture Damage Resistance of HMA by Using Ceramic Fiber and Hydrated Lime
...Show More Authors

The Moisture damage is considered as one of the main challenge for the experts in the field of asphalt pavement design. The aims of the present study is to modify moisture resistance of the asphalt concrete by utilizing ceramic fibers as a type of reinforcement incorporated with hydrated lime. For this purpose, a penetration grade of the asphalt cement (40-50) was utilized as a binder with an aggregate of the maximum nominal size of 12.5mm and mineral filler limestone dust. A series of specimens has been fabricated by utilizing 0.50, 1.0, 1.5, and 2.0 percentages of ceramic fibers. For each of these contents, another subsequent group of specimens with hydrated lime with 0.0, 1.0, 1.5, and 2.0 percentages were moulded. For the additi

... Show More
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
International Journal Of Mechanical Engineering And Technology (ijmet)
INVESTIGATION THE PROPERTIES OF SILICONE RUBBER BLEND REINFORCED BY NATURAL NANOPARTICLES AND UHMWPE FIBER
...Show More Authors

Many faces are exposed to degradation, discoloration, changes in humidity. The primary objective has improved some properties of hybrid nanocomposites materials that used for restoring of the function maxillofacial prosthesis and improving the esthetic. In the present research different lengths chopped and continuous of ultrahigh molecular weight polyethylene (UHMWPE) fiber was added at selected percentage (0.0, 0.2% and 1%) to polymer blend composite (95%SR /5%PMMA: 0.2% Pomegranate Peels Powder (PPP)) for developing the properties of silicone rubber used for the maxillofacial prosthesis applications. Some mechanical and physical properties were done on the all prepared samples. The results showed that all properties have improved when add

... Show More
View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref