This paper presents comprehensive analysis and investigation for 1550nm and 1310nm ring optical modulators employing an electro-optic polymer infiltrated silicon-plasmonic hybrid phase shifter. The paper falls into two parts which introduce a theoretical modeling framework and performance assessment of these advanced modulators, respectively. In this part, analytical expressions are derived to characterize the coupling effect in the hybrid phase shifter, transmission function of the modulator, and modulator performance parameters. The results can be used as a guideline to design compact and wideband optical modulators using plasmonic technology
This research investigated the effect of adding two groups of reinforcement materials, including bioactive materials Hydroxyapatite (HA) and halloysite nanoclay and bioinert materials Alumina (AL2O3) and Zirconia (ZrO2), each of them with various weight ratios (1,2,3,4 &5)% to the polymer matrix PMMA. The best ratios were selected, and then a hybrid was preparing Composite red from the best ratios from each group. Thermal properties, including thermal conductivity and Thermomechanical Analysis (TMA) technology, have been studied. The results showed that adding 3% Hydroxyapatite (HA) and 5% halloysite nanoclay to the polymethacrylate (PMMA) mer leads to an increase in thermal conductivity. It was also found from the Thermomechanical Analysis
... Show More<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the imensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.The research started from the problem of exposure of the Iraqi tax system to several changes, as this led to a reflection on the technical organization of taxes, in terms of the tax rate.The descriptive analytical approach was chosen to study the actual reality of th
... Show MoreSingle phase capacitor-run induction motors (IMs) are used in various applications such as home appliances and machine tools; they are affected by the sags or swells and any fault that can lead to disturb the supply and make it produce rms voltage below or above the rated motor voltage, which is 220V. A control system is designed to regulate the output voltage of the converter irrespective to the variation of the load and within a specific range of supply voltage variation. The steady-state equivalent circuit of the Buck-Boost chopper type AC voltage regulator, as well as the analysis of this circuit are presented in this paper. Switching device for the regulator is an IGBT Module. The proposed chopper uses pulse width modulation (PWM) c
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreAl-Rustamiyah plant is the oldest and biggest sewage treatment plant in Iraq; it locates in the south of Baghdad city. The plant suffers from serious problems associated with overflow and low capacity. The present work aims to upgrade the heart of biological treatment process through suggesting the use of membrane bioreactor; (MBR). In this work, fouling of membrane during sewage treatment has been analyzed experimentally and theoretically by fouling mechanisms. Aeration has been applied in order to control fouling through producing effective diameters of air bubbles close to the membrane walls. Effect of air flow rate on flux decline was investigated. Hermia's models were used to investigate the fouling mechanisms. The results showed th
... Show MoreThe complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra
... Show More