A simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μm and the length with 2 cm.
Crystalline silicon (c-Si) has low optical absorption due to its high surface reflection of incident light. Nanotexturing of c-Si which produces black silicon (b-Si) offers a promising solution. In this work, effect of H2O2 concentrations towards surface morphological and optical properties of b-Si fabricated by two-step silver-assisted wet chemical etching (Ag-based two-step MACE) for potential photovoltaic (PV) applications is presented. The method involves a 30 s deposition of silver nanoparticles (Ag NPs) in an aqueous solution of AgNO3:HF (5:6) and an optimized etching in HF:H2O2:DI H2O solution under 0.62 M, 1.85 M, 2.47 M, and 3.7 M concentrations of H2O<
... Show MoreThis study was conducted in the field of the Poultry Research Station of the animal resources Department / office of Agricultural Research / Ministry of Agriculture from the period 4th April to16th May2021.This study was aimed to investigate the effect of using avocado and chia oil and their mixture in broiler diets on the final productive performance and meat cholesterol concentration and measuring meat oxidation indicators after storing it for 60 days. 300 one-day-old (Ross308) chicks were fed on diets that used avocado oil and chia with percentages of 0, 0.2, 0.4, 0.6%, respectively, and their mixture consisting of 0.0, 0.1, 0.2, 0.3 each of avocado and chia oil (50% avocado + 50% chia oil). The experiment included 10 treatments
... Show MoreAbstract
The current research aims to identify the effect of using a model of generative learning in the achievement of first-middle students of chemical concepts in science. The researcher adopted the null hypothesis, which is there is no statistically significant difference at the level (0.05) between the mean scores of the experimental group who study using the generative learning model and the average scores of the control group who study using the traditional method in the chemical concepts achievement test. The research consisted of (200) students of the first intermediate at Al-Farqadin Intermediate School for Boys affiliated with the Directorate of General Education in Baghdad Governorate / Al-Karkh 3 wit
... Show MoreThe research aims to identify the level of functional engagement and hope-based thinking of kindergarten teachers, identify if there is a significant difference in functional engagement and hope-based thinking in terms of specialization and years of service for kindergarten teachers, identify if there is a significant correlation between functional engagement and hope-based thinking of kindergarten teachers. The current research is determined by kindergarten teachers in the Second Rusafa Baghdad Education Directorate for the academic year (2022-2023). In order to achieve the objectives of the research, the researcher prepared a functional engagement scale, which consists of (45) items in three areas: Perceptual and functional engagement
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Leishmaniasis is one of the important parasitic diseases, affecting mainly low social class people indeveloping countries, and is more prevalent and endemic in the tropical and subtropical regions of old worldand new world. Despite ofbroad distribution in Iraq,little known about the geneticcharacteristics of thecausative agents. So this study was aimed to evaluate the genetic varietyoftwo IraqiLeishmaniatropicaisolatesbased on heat shock protein gene sequence 70 (HSP70) in comparison with universal isolates recordedsequences data. After amplification and sequencing of HSP70 gene,the obtainedresults were alignment alongwith homologous Leishmania sequences retrieved from NCBI by using BLAST. The analysis results showedpresence of particular g
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show More