Fiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving process are clearly explained here. Our obtained images demonstrated that these precision cleavers have great potential to cut various fibers at one time with high speed, good efficiency, and accuracy. We also found that this cleavage technique produced the greatest laser intensity and the best light dispersion pattern, while the scribe pen resulted in undesirable levels of laser intensity and light dispersion pattern.
Nahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a
... Show MoreAbstract
In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.
A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between
... Show MoreThe she/teacher is considered one of the basics of the educational process for its essential role in education and teaching the kindergarten child, thus its lack to construct social relations in side the kindergarten environment working in it regarded one of the shortcoming factors she is suffering from which should be manipulated, because it could effect its enthusiasm to work in the kindergarten according to what has mentioned, the researcher presents the following objective:-
- Identifying level of social enhancement for the kindergarten teachers via the test of the following hypothesis:-
This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Chalcogenide glasses SeTe have been prepared from the high purity constituent elements .Thin films of SeTe compound have been deposited by thermal evaporation onto glass substrates for different values of film thickness . The effect of varying thickness on the value of the optical gap is reported . The resultant films were in amorphous nature . The transmittance spectra was measured for that films in the wavelength range (400-1100) nm . The energy gap for such films was determined .
The aim of this work is to develop an axi-symmetric two dimensional model based on a coupled simplified computational fluid dynamics (CFD) and Lagrangian method to predict the air flow patterns and drying of particles. Then using this predictive tool to design more efficient spray dryers. The approach to this is to model what particles experience in the drying chamber with respect to air temperature and humidity. These histories can be obtained by combining the particles trajectories with the air temperature/humidity pattern in the spray dryer. Results are presented and discussed in terms of the air velocity, temperature, and humidity profiles within the chambers and compared for drying of a 42.5% solids solution in a spray chamber
... Show More