The refractive index sensors based on tapered optical fiber are attractive for many industries due to sensing capability in a variety of application. In this paper, we proposed a refractive index sensor based on multicore fiber (MCF) sandwiched between two standard single mode fibers (SMF). The sensor consisting of three sections, SMF- MCF-SMF is structurally simple and can be easily produced by joining these parts. The MFC contains seven cores and these cores are surrounded by a single cladding. The sensing region is obtained by tapering the MCF section where the evanescent field is generated. The single mode propagating along the SMF is stimulated at the first joint and is coupled to the cladding modes. These modes interfere with the core mode after passing the second joint. The transmission spectrum of the output light at the end of the third section is sensitive to the refractive index (RI) of the environment surrounding the cladding. In this study, the RI sensitivity of the proposed sensor was analyzed numerically and the RI sensing characteristic was investigated for different measurement ranges and different structural configurations. The results show that the refractive index sensitivity is extremely high in the range of about 1.44 to 1.45 RIU. In addition, the developed sensor has many advantages such as compact construction, low cost, small size and easy fabrication. It also has the potential to perform high precision measurements in fields such as biochemistry, health care and biological applications.
CuInSe2 (CIS)thin films have been prepared by use vacuum thermal evaporation technique, of 750 nm thickness, with rate of deposition 1.8±0.1 nm/sec on glass substrate at room temperature and pressure (10-5) mbar. Heat treatment has been carried out in the range (400-600) K for all samples. The optical properties of the CIS thin films are been studied such as (absorption coefficient, refractive index, extinction coefficient, real and imaginary dielectric constant)by determined using Measurement absorption and transmission spectra. Results showed that through the optical constants we can made to control it is wide applications as an optoelectronic devices and photovoltaic applications.
Study was made on the optical properties of Ge2oSe8othinfilms prepared by vac-uum evaporation as radiated by (0,34,69) Gy of 13 ray.The optical band gab Eg and tailing band A.Et were studied in the photon energy range ( 1 to 3)eV. The a-Ge20Se8o film was found to be indirect gap with energy gap of (1.965,1.9 , 1.82) eV at radiated by B ray with absorption doses of (0,34,69)Gy respectively.The Ea and AEt of Ge20Se80 films showed adecrease in E8 and an increase in AEt with radiation. This be-havior may be related to structural defects and dangling bonds.
The splicing design of the existing road and the new road in the expansion project is an important part of the design work. Based on the analysis of the characteristics and the load effect of pavement structure on splicing, this paper points out that tensile crack or shear failure may occur at the splicing under the repeated action of the traffic load on the new/old pavement. According to the current structure design code of asphalt pavement in China, it is proposed that the horizontal tensile stress at the bottom of the splicing layer and the vertical shear stress at other layers of the splicing line should be controlled by adjusting the position and size of the excavated steps in addition to the conventional design ind
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More