Preferred Language
Articles
/
TBa46YkBVTCNdQwCV47v
Modeling and Analysis of a Miniaturized Ring Modulator Using Silicon-Polymer-Metal Hybrid Plasmonic Phase Shifter. Part II: Performance Predictions
...Show More Authors

The ring modulator described in part I of this paper is designed here for two operating wavelengths 1550nm and 1310nm. For each wavelength, three structures are designed corresponding to three values of polymer slot widths (40, 50 and 60nm). The performance of these modulators are simulated using COMSOL software (version 4.3b) and the results are discussed and compared with theoretical predictions. The performance of intensity modulation/direct detection short range and long rang optical communication systems incorporating the designed modulators is simulated for 40 and 100Gb/s data rates using Optisystem software (version 12). The results reveal that an average energy per bit as low as 0.05fJ can be obtained when the 1550nm modulator is designed with a phase shifter length equals twice the coupling length.

View Publication
Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربويةوالنفسية
Preparing a teacher’s guide for computer books for the intermediate stage according to learning styles
...Show More Authors

Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Numerical investigation for Natural Convection in a square Enclosure with partially active thermal sides' wall
...Show More Authors

Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.

Scopus
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenographic space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

View Publication
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
What Bukhari shortened to a bug in its attribution: (Applied study in the correct mosque)
...Show More Authors

This study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The women at Al-Sakhaawi Book "A;-Dhau Al-Lami", Study in the social life
...Show More Authors

In our previous research , we study the method of women by ( al – sakhaawi " died 902
ah/1496a.c"book witch called ( al- dhau, al-lami) .
So in this paper , we will discuss the social life of women in the mamluk period through the
same book ,especially when the sakhaawi devoted a full part for women in the same book
called it (mhagam ,al –nessa)wich it translations a large number of women like wives
,daughters ,sisters ,and maids of mamluk sultans ,so that make my able to know a lot about
the social life of woman which we study it like a social aspects of women, here wealth,
business, professions ,and in the last we study the habits of them marriage .

View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
MHD Effect on Peristaltic Transport for Rabinowitsch Fluid through A Porous Medium in Cilia Channel
...Show More Authors

This paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.

View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Lying in Arthur Miller's The Crucible: A Pragmatic Study: هديل محمود إبراهيم , جمعه قادر حسين
...Show More Authors

Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref