Photonic crystal fiber interferometers are widely used for sensing applications. In this work, solid core-Photonic crystal fiber based on Mach-Zehnder modal interferometer for sensing refractive index was presented. The general structure of sensor applied by splicing short lengths of PCF in both sides with conventional single mode fiber (SMF-28). To apply modal interferometer theory; collapsing technique based on fusion splicing used to excite higher order modes (LP01 and LP11). Laser diode (1550 nm) has been used as a pump light source. Where a high sensitive optical spectrum analyzer (OSA) was used to monitor and record the transmitted. The experimental work shows that the interference spectrum of Photonic crystal fiber interferometer exhibits good sensitivity to refractive index variations. The response of the PCFI is observed for a range of refractive index values from (1.33 to 1.38), the position of the interference peaks is found to be shifted to longer wavelength with refractive index increasing. A different length of PCFs (2, 3, 4) cm were used, and the maximum refractive index sensitivity of (7.5 pm / RIU) is achieved with a PCF length of 4 cm. This refractive index sensor has distinguished properties as that it small size, high sensitivity, fast response time, design flexibility, and immunity to electromagnetic interference.
In this study, the effects of blending the un-branched acrylate polymer known as Poly (n-decyl acrylate), and the branched acrylate polymer known as Poly (iso-octyl acrylate), on the viscosity index (VI), and the pour point of the Iraqi base stocks 40, and 60 respectively, were investigated. Toluene was used as a carrier solvent for both polymer types. The improvement level of oils (VI, & pour point) gained by blending the oil with the acrylate derived polymers was compared with the values of (VI, and pour point) gained by blending the oil with a commercial viscosity index, and pour point improver. The commercial lubricant additive was purchased and used by Al-Daura Refineries. It consisted of an un-known olefin copolymer dissolved i
... Show MoreThe aim of this research is to employ the roundhouse strategy to study its impact on the students achievement of the 10th grade in physics and their core thinking. After the application of the research experience and gaining data, which was processed statistically using the statistical packages program (SPSS). The results of the researcher revealed the superiority of the students of the experimental group who studied using the roundhouse strategy on the students of the control group who studied the usual method in the achievement test. As results showed that there were statistically significant differences between the average scores of the experimental group and the average scores of the control group students in the core thinking test and
... Show MoreIn this research, titanium dioxide nanoparticles (TiO2 NPs) were prepared through the sol-gel process at an acidic medium (pH3).TiO2 nanoparticles were prepared from titanium trichloride (TiCl3) as a precursor with Ammonium hydroxide (NH4OH) with 1:3 ratio at 50 °C. The resulting gel was dried at 70 °C to obtain the Nanocrystalline powder. The powder from the drying process was treated thermally at temperatures 500 °C and 700 °C. The crystalline structure, surface morphology, and particle size were studied by using X-ray diffraction (XRD), Atomic Force Microscopy (AFM), and Scanning Electron Microscope (SEM). The results showed (anatase) phase of titanium dioxide with the average grain size
... Show MoreVarious Hall Effects have been successfully observed in samples of n-type indium antimonide with values for conductivity, energy gap, Hall mobility and Hall coefficient all agreeing with theory. A particular interest in developing a method for obtaining accurate values of carrier concentrations in semiconductor samples has been fulfilled with an experimental result of (1.6×1016 cm-3 ±10.7%) giving a percentage difference of (6.7%) to a quoted value of (1.5×1016cm-3) at (77K) using an (80mW C.W. CO2) laser beam at (10.6μm) to illuminate a similar sample of n-type indium antimonide, an "Optical" Hall effect has been observed. Although some doubt has been raised as to the validity of effect i.e. "thermal" rather than "Optical", values o
... Show MoreSingle crystal of CsHSO4 component was grown by slow evaporation method of aqueous solution with normality N=1 . The study shows that the importance of the process of Recrystal growth of CsHSO4 crystals. The results show the improve of the characteristics of crystals (transparent, size, shape, number and quality) . By X-Ray diffraction, the crystal structure of these crystals have been confirmed by measurement constants of unit cell of crystal lattice. The vibration modes of crystals were studied by FTIR (Fourier Transform Infrared) technique. Finally, achieving the study of microstructure of crystals by polarization of microscopy that is supported with hot stage at different temperatures. The changes occur on these crystals by changing
... Show MoreAbstract: The development of highly sensitive sensors has become an efficient field of research. In this work, an ArF Excimer laser of 193 nm with a maximum pulse energy of 275 mJ, 15 ns pulse duration and a repetition rate of 1 Hz is utilized to form a Laser Induced Periodic Surface Structures (LIPSS) of three different morphologies (nanochains, contours, grooves) on surface of CR39 polymer at a fluence range above the ablation threshold (250 mJ/cm2). The laser ablated polymer surface is then Surface Enhanced Raman Scattering (SERS) activated by deposition of a gold layer of 30 nm thickness. The capability of the produced substrate for surface enhanced Raman scattering is evaluated through thiophenol as an analyte molecule. It is observ
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreAbstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More