Preferred Language
Articles
/
ijp-125
Refractive index sensor based on a solid-core photonic crystal fiber interferometer
...Show More Authors

Photonic crystal fiber interferometers are widely used for sensing applications. In this work, solid core-Photonic crystal fiber based on Mach-Zehnder modal interferometer for sensing refractive index was presented. The general structure of sensor applied by splicing short lengths of PCF in both sides with conventional single mode fiber (SMF-28). To apply modal interferometer theory; collapsing technique based on fusion splicing used to excite higher order modes (LP01 and LP11). Laser diode (1550 nm) has been used as a pump light source. Where a high sensitive optical spectrum analyzer (OSA) was used to monitor and record the transmitted. The experimental work shows that the interference spectrum of Photonic crystal fiber interferometer exhibits good sensitivity to refractive index variations. The response of the PCFI is observed for a range of refractive index values from (1.33 to 1.38), the position of the interference peaks is found to be shifted to longer wavelength with refractive index increasing. A different length of PCFs (2, 3, 4) cm were used, and the maximum refractive index sensitivity of (7.5 pm / RIU) is achieved with a PCF length of 4 cm. This refractive index sensor has distinguished properties as that it small size, high sensitivity, fast response time, design flexibility, and immunity to electromagnetic interference.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu Dec 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Trimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.

View Publication Preview PDF
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Tropical Journal Of Natural Product Research
Cytotoxic Potential of Neem (Azadirachta indica A. Juss) Oil
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 08 2019
Journal Name
International Journal Of Building Pathology And Adaptation
A scientometric analysis of BIM studies in facilities management
...Show More Authors
Purpose

The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.

Design/methodology/approach

This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.

Findings

The findi

... Show More
View Publication
Scopus (37)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Alexandria Engineering Journal
A new tilted aerial robotic platform: Modeling and control
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
A Survey Study and Comparison of Drones Communication Systems
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sat Oct 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors