: In modern optical communication system, noise rejection multiple access interference (MAI) must be rejected in dense access network (DAN). This paper will study the dual optical band pass and notch filters. They will be extracted with tunable FWHM using 10cm (PMF) with different cladding diameters formed with etching 125μm PMF after immersing it with 40% of hydrofluoric acid (HF). This fiber acts as assessing fiber to perform Sagnac interferometer with splicing regions that placed 12cm (SMF) for performing hybrid Sagnac interferometer that consists of Mach-Zehnder instead of Sagnac loop which is illuminated by using laser source with centroid wavelength of 1546.7nm and FWHM of 286 pm or 9 ns in the time domain. . Firstly, Three PMF with the same lengths but with different etching durations (10, 20 and 30) min. Secondly, each of these PMFs with different etching durations will affected under tunable stressing forces (10, 20, 50 and100) g applying on cross sectional area and two weights of (5, 10, 25 and 50) g putting on both micro splicing area separately. The minimum FWHM of dual optical band pass and notch filters at specific etching time with mechanical forces getting the best values equal to 123pm and 90pm, respectively. The study found that the HSI interferometer can be used efficiently as a narrow notch filter in integrated optical communication systems since it has high sensitivity in the pm range.
In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc
... Show MoreInterest has largely centered on the use of plant fibers to reinforce plastics, because these fibers are abundant and cheap. Carrot fibers (Curran) have been extracted from carrot, left over from carrot juice manufacture. The fibers of two sizes fine (50<µm) and coarse (100-150 µm) have been mixed with epoxy in four levels of loading (10, 20, 30, 40 wt %) respectively. Impact test, shore d hardness test and three point bending test of epoxy and carrot fiber-epoxy composites samples have been determined. The impact strength values of samples prepared with fine and coarse fibers increased as compared with pure epoxy sample. Hardness values increased, and the Young’s modulus values decreased with fiber content of both sizes.
Fiber optics technology has shown immense applications in the areas of medicine, telecommunication, and imaging. For these particular applications, it requires fibers with precise cleaving. In this paper, we will demonstrate a quick, simple and efficient cleaving method that can result in a high-quality fiber surface that works well for many fiber-optic applications. The smooth tip and good surface quality obtained on the cleaved surface of optical fiber is demonstrated by using a microscope imaging system and was flat surface with a 900 angle for perpendicular cleavages. The precision cleaver provides smooth and high-quality cleaves on single-fiber surfaces as opposed to the ruby scribe pen. The defects that may occur during the cleaving p
... Show MoreThe aim of this work is to study the influence of the type of fiber glass –mat on fatigue behavior of composite material which is manufactured from polyester and E-glass (woven roving, chopped strand mat (CSM)) as a laminate with a constant fiber volume fraction (VF) of 33%. The results showed that the laminates reinforced with E-glass (woven roving) [0/90, ±45.0/90] and [0/90, CSM, 0/90] have lower fatigue strength than the laminates reinforced with E-glass [0/90]3,[CSM]3 and [CSM, 0/90, CSM] although they had different tensile strength; the best laminate was [0/90]3 .
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThe main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation technique .. It was obse
... Show MoreThe main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi
... Show More