This paper presents comprehensive analysis and investigation for 1550nm and 1310nm ring optical modulators employing an electro-optic polymer infiltrated silicon-plasmonic hybrid phase shifter. The paper falls into two parts which introduce a theoretical modeling framework and performance assessment of these advanced modulators, respectively. In this part, analytical expressions are derived to characterize the coupling effect in the hybrid phase shifter, transmission function of the modulator, and modulator performance parameters. The results can be used as a guideline to design compact and wideband optical modulators using plasmonic technology
Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine
... Show MoreNi2O3 nanomaterial, a phase of nickel oxide, is synthesized by a simple chemical process. The pure raw materials used in the present process were nickel chloride hexahydrate NiCl2.6H2O and potassium hydroxide KOH by utilizing temperature at 250 oC for 2 hour. The structural, morphological and optical properties of the synthesized specimens of Ni2O3 were investigated employing diverse techniques such as XRD, AFM, SEM and UV-Vis, respectively. The XRD technique confirms the presence of Ni2O3 nanomaterial with crystal size of 57.083 nm which indexing to the (2θ) of 31.82; this results revealed the Ni2O3 was a phase of nickel oxide with Nano structure. The synthesized Ni2O3 will be useful in manufacturng electrodes materials f
... Show MoreGypseous soils represented one of the most complex salty soils that faced the geotechnical engineers. Structures that built on gypsum soil will undergo unexpected distortions that will eventually contribute to catastrophic failure. The purpose of this article is to understand the durability of gypsum soil against wetting drying cycles after improvement with polyurethane polymer especially investigate the effect of the wetting-drying cycle on collapsibility. The soil was brought from Sawa lake in AL-Muthanna Governorate in Iraq, with gypsum content 65.5%, A set of Odometer tests were performed to determine the collapsibility potential (CP) for treated and untreated gypsum soil. The result shows that adding a different per
... Show MorePurpose: studying and analyzing the nature of uncertainty as part of strategy formulation, through analyzing the uncertainty faced by managers in the modern business environment characterized by high complexity and dynamism, though developing of an idea about the uncertainty cases and how enable the mind to understand these cases.
Methodology: It was the use of inductive and analytical approach, in order to study the accumulation of knowledge towards development areas that could contribute to strengthening the strategy formulation.
Findings: Mentoring the future will not make the success for business organization but thought business organization ability to developing share mental
... Show MoreThe association of phytoplasma was investigated in symptomatic tomato (
In this work, a simulated study was carried out for designing a novel spiral rectangular patch of microstrip antenna that is used in ultra-wideband applications by using a high frequency structure simulator software (HFSS). A substrate with dielectric constant of 4.4 and height 2.10 mm (commercial substrate height available is about 0.8-1.575 mm) has been used for the design of the proposed antenna. The design basis for enhancing bandwidth in the frequency range 6.63 - 10.93 GHz is based on increasing the edge areas that positively affect the antenna's efficiency. This design makes the designed antenna cost less by reducing the area of the patch. It has been noticed that the bandwidth of the antenna under this study is increasing to 4.30
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreBoth traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a
... Show More