Fiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving process are clearly explained here. Our obtained images demonstrated that these precision cleavers have great potential to cut various fibers at one time with high speed, good efficiency, and accuracy. We also found that this cleavage technique produced the greatest laser intensity and the best light dispersion pattern, while the scribe pen resulted in undesirable levels of laser intensity and light dispersion pattern.
Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used
... Show MoreThe present work evaluated the differences in mechanical properties of two athletic prosthetic feet samples when subjected to impact while running. Two feet samples designated as design A and B were manufactured using layers of different orientations of woven glass fiber reinforced with unsaturated polyester resin as bonding epoxy. The samples’ layers were fabricated with hand lay-up method. A theoretical study was carried out to calculate the mechanical properties of the composite material used in feet manufacturing, then experimental load-deflection test was applied at 0 degree position and 25 degree dorsiflexion feet position and impact test were applied for both feet designs to observe the behavior
... Show MoreObjective: The aim of the study is to assess the personal hygiene of adult patients with
diabetic foot.
Methodology: ٨ descriptive study was carried out in Baghdad teaching hospital, Al-Karama teaching hospital
and Al-Kindey teaching hospital for the period of 10/1/2006 to 1/9/2006. A purposive "non probability" sample
of (100) patient.
Questionnaire was constructed for achieving the purpose of the study. Data were collected through the
application of the questionnaire and interview technique. Data were analyzed through descriptive statistical
approach (frequency & percentage) and inferential statistical approach (chi-square ع correlation) by using of
SPSS.
Results: The study results indicated that the ra
Despite the vast areas occupied by deserts in the world, it is still far from the civilized development and development of the other regions, so they became semi-neglected areas that extend to the hand of urbanization only in specific places and for special purposes, due to the harsh natural conditions surrounding it and to the accuracy The ecological balance in it became the greatest enemy of human beings in the desert areas is the same person who paved the way for increased intervention in the exploitation of natural resources and increase the demand for them to drain seriously affect the impact and still on the environmental and climatic conditions and thus living for the inhabitants of these Areas. The main potential for deve
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MorePure nano Ferro fluid was synthesized by chemical co-precipitation method. The composite of polyaniline with nano sized Ferro fluid was prepared by In-situ–chemical oxidation polymerization method with ammonium per sulphate as an oxidant in aqueous hydrochloric acid under constant stirring at room temperature. The optical properties, absorption, transmission, optical energy gap (Eg) and optical constant refractive index (n) have been investigated. The value of the Eg decreased with increasing Ferro fluid concentration.
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More