Preferred Language
Articles
/
Khcu9I8BVTCNdQwCp4F7
Integrated gallium phosphide-waveguide polarization rotator based on rotating a horizontal slot by 45 degree for 700 nm wavelength
...Show More Authors

Polarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomenon in the waveguide. The simulation results demonstrate a polarization conversion efciency of 99.99% (99.98%) for TE0-to-TM0 (TM0-to-TE0) mode conversion, with an extinction ratio of 46.14 (39.62) dB and insertion loss below 1.6 dB at the specifed wavelength. Additionally, the fabrication tolerance with regard to the width, height, and half-beat length of the proposed structure is investigated

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 30 2021
Journal Name
Iraqi Journal Of Science
Identification of Vulnerable Zones for Groundwater Using a GIS-based DRASTIC Technique in Shwan Sub-basin/North-Iraq
...Show More Authors

Groundwater is considered as one of the most important sources of fresh-water, on which many regions around the world depend, especially in semi-arid and arid regions. Protecting and maintaining groundwater is a difficult process, but it is very important to maintain an important source of water. The current study aims to assess the susceptibility of groundwater to pollution using the DRASTIC model along with the GIS environments and its tool boxes. A vulnerability map was created by relying on data collected from 55 wells surveyed by the researchers as well as archived records from governmental institutions and some international organizations. The results indicate that the region falls into three vulnerability functional zones , namely

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 06 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Impact of a Scenario-Based Learning Model in Mathematics Achievement and Mental Motivation for High School Students
...Show More Authors

Crossref (3)
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Evaluation of English Language Textbooks for Fifth and Sixth Graders Based on the American Council Criteria for Teaching Foreign Languages (ACTFL)
...Show More Authors

Abstract

This study aims to identify the extent to which the criteria of the American Council for Teaching Foreign Languages (ACTFL) are included in the English language books for the fifth and sixth graders. To achieve the objective of the study, a content analysis card was prepared, where the classification of language proficiencies was divided into five main levels (beginner, intermediate, advanced, superior, and distinguished) of the four language skills (listening, speaking, reading, and writing), The content analysis card consisted of (89) indicators distributed at the four levels of language skills as follows: Listening (17), speaking (33), reading (15), and writing (26). The study sample consisted of Engl

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Availability of Moral Values in the Arabic Language Textbook (Al-Mu’nes) For Grades Eleven and Twelve For Post-Basic Education in The Sultanate of Oman
...Show More Authors

          The current study aimed to reveal the moral values available in the Arabic language textbook (Al-Mu’nes) for   grades eleven and twelve for post-basic education in the Sultanate of Oman. The researcher adopted the descriptive approach using the sentence as measuring unit in the analysis process. The five fields of moral values and their subcategories values represented the categories of the analysis. Iterations of values and the percentages of iteration were calculated in those textbooks. Moreover and the analysis and stability of the process were confirmed.

         After referring to previous studies, it was possible to de

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Application of Box-Behnken Method Based ANN-GA to Prediction of wt.% of Doping Elements for Incoloy 800H Coated by Aluminizing-Chromizing
...Show More Authors

In this work , an effective procedure of Box-Behnken based-ANN (Artificial Neural Network) and GA (Genetic Algorithm) has been utilized for finding the optimum conditions of wt.% of doping elements (Ce,Y, and Ge) doped-aluminizing-chromizing of Incoloy 800H . ANN and Box-Behnken design method have been implanted for minimizing hot corrosion rate kp (10-12g2.cm-4.s-1) in Incoloy 800H at 900oC . ANN was used for estimating the predicted values of hot corrosion rate kp (10-12g2.cm-4.s-1) . The optimal wt.% of doping elements combination to obtain minimum hot corrosion rate was calculated using genetic alg

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Feb 03 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref