Fiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving process are clearly explained here. Our obtained images demonstrated that these precision cleavers have great potential to cut various fibers at one time with high speed, good efficiency, and accuracy. We also found that this cleavage technique produced the greatest laser intensity and the best light dispersion pattern, while the scribe pen resulted in undesirable levels of laser intensity and light dispersion pattern.
This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.
The Internet makes the world like a small village. It has the ability to make groups of the same ideas, thoughts, and identity close to each other by gathering them in one place. It is a way to communicate and share information and opinion; shaping and sharing of comprising individuals with common interests and the participation of individuals in a fruitful dialogue results in achieving a set of goals promote ideas and mobilizing people about issues and events of common interests.
To address the relationship of the internet via interactive communication and its ability to achieve social capital and discuss issues and various social events, the study sees that the problem of the study could be formulated as follows:
Consid
... Show MoreThe interlaminar fracture toughness of polymer blends reinforced by glass fiber has
been investigated. Epoxy (EP), unsaturated polyester(UPE), polystyrene (PS),
polyurethane (PU) and their blends with different ratios (10%PS/90%EP),
(20%PS/80%EP), (20%PU/80%EP) and (20%PU/80%UPE) were chosen as a matrices A
sheet of composites were prepared using hand lay -up method, these sheet were cut as the
double cantilever beam (DCB) specimen to determine interlaminar fracture toughness of
these composites .Its found that, blending of EP,UPE with 20% of PU will improve the
interlaminar fracture toughness ,but the adding of 10% PS, 20%PS to EP will decrease
the interlaminar toughness of these composites.
Big developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological.The research aims to Find the use of advanced manufacturing technologies that lead to customized production and quality appropriate whether they are low quality and low cost or low cost and suitable quality or high quality and high cost to win customer satisfaction.While the important conclusions is that the application of advanced manufacturing technology is not limited to techn
... Show MorePhotonic crystal fiber interferometers are used in many sensing applications. In this work, an in-reflection photonic crystal fiber (PCF) based on Mach-Zehnder (micro-holes collapsing) (MZ) interferometer, which exhibits high sensitivity to different volatile organic compounds (VOCs), without the needing of any permeable material. The interferometer is robust, compact, and consists of a stub photonic crystal fiber of large-mode area, photonic crystal fiber spliced to standard single mode fiber (SMF) (corning-28), this splicing occurs with optimized splice loss 0.19 dB In the splice regions the voids of the holey fiber are completely collapsed, which allows the excitation and recombination of core and cladding modes. The device reflection
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More