Abstract: Two different shapes of offset optical fiber was studied based on coreless fiber for refractive index (RI)/concentration (con.) measurement, and compare them. These shapes are U and S-shapes, both shapes structures were formed by one segment of coreless fiber (CF) was joined between two single mode (SMF) lead in /lead out with the same displacement (12.268µm) at both sides, the results shows the high sensitive was achieved in a novel S-shape equal 98.768nm/RIU, to our knowledge, no one has ever mentioned or experienced it, it’s the best shape rather than the U-shape which equal 85.628nm/RIU. In this research, it was proved that the offset form has a significant effect on the sensitivity of the sensor. Additionally, the sensor is produced using a low-cost fabrication technique. Therefore, the suggested structure is advantageous for RI/ (con.) sensing applications.
The research aims to study the importance of applying lean accounting techniques and the tools and methods they contain, the most important of which is the “value path costs” technique and its impact on rationalizing and controlling costs, as well as reducing production costs in general and reducing quality costs in a way Special by reducing or eliminating waste and waste in both time and resources and meeting customer requirements. In order to achieve this goal, the researcher relied on the application of lean accounting tools by obtaining data related to the mill, in addition to that, the information obtained as a result of field coexistence in the mill and being able to view the records of the mill in the research sample. From the
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIt is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological
... Show MoreService companies always working to increase their competitiveness and efficiency of the survival, growth and development in the present and the future, including insurance companies, so as to increase competition, especially after the emergence of the civil companies dramatically after 2003, has become the goal of recent studies carried out by the organizations is the human capital, because its success and excellence and achievement its objectives depends on the human, and this does not mean that the other components are not important, but also rely on the rights which has increased interest in the search for the way in which they can guide the behaviors and values and their own language in line with the organization's strategy an
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreAtheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references
The research aims to study strategic training and its impact on improving the performance of the inspectors general offices in Iraqi ministries, through two variables strategic training Which include Four Dimensions ( Strategic analysis , Formulation of Training Strategy , Implement the Training Strategy , Evaluation ) and Performance included Three dimensions ( Efficiency , Effectiveness , Added-Value).
This research problem is that the Offices of Inspectors rely on pre-made training Programs received from training centers without designing the training programs that provide the employees with the skills and abilities that lead to the implementation of the current and future goals of the orga
... Show MoreThe research dealt with the effect of the tax examiner's efficiency in detecting tax evasion, as the research problem dealt with tax evasion, especially in Iraq, for many reasons and factors, including those related to tax administration represented in administrative corruption and the complexity of procedures in the tax accounting process and failure to achieve justice in the tax treatment, including the taxpayer himself, as he tries to evade for reasons Related to the level of tax awareness, loss of confidence in the tax administration, and reasons related to the state's inability to manage the services file well and its ability to achieve the set goals, This reflected negatively on the emergence of some of the consequences of
... Show MoreThe Strait of Malacca is one of the waterways of strategic, political, and economic importance. This strait has an increasing importance to its neighboring countries. The Strait of Malacca is very important for China, especially in the field of energy supply security, as the vast ma jority of energy supplies come to China through this strait. China seeks to ensure its security, especially in light of the cooperation of countries that look forward to this strait as well as the United States, and what the United States may cause to China, as many of them are at war with China over the China Sea, not to mention the countries that overlook it. The importance of the research emerges from the basic idea that the strategic importance of the Strait
... Show More