Preferred Language
Articles
/
ijp-125
Refractive index sensor based on a solid-core photonic crystal fiber interferometer
...Show More Authors

Photonic crystal fiber interferometers are widely used for sensing applications. In this work, solid core-Photonic crystal fiber based on Mach-Zehnder modal interferometer for sensing refractive index was presented. The general structure of sensor applied by splicing short lengths of PCF in both sides with conventional single mode fiber (SMF-28). To apply modal interferometer theory; collapsing technique based on fusion splicing used to excite higher order modes (LP01 and LP11). Laser diode (1550 nm) has been used as a pump light source. Where a high sensitive optical spectrum analyzer (OSA) was used to monitor and record the transmitted. The experimental work shows that the interference spectrum of Photonic crystal fiber interferometer exhibits good sensitivity to refractive index variations. The response of the PCFI is observed for a range of refractive index values from (1.33 to 1.38), the position of the interference peaks is found to be shifted to longer wavelength with refractive index increasing. A different length of PCFs (2, 3, 4) cm were used, and the maximum refractive index sensitivity of (7.5 pm / RIU) is achieved with a PCF length of 4 cm. This refractive index sensor has distinguished properties as that it small size, high sensitivity, fast response time, design flexibility, and immunity to electromagnetic interference.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Study of Forward Osmosis Using Various Drawing Agent
...Show More Authors

This research was aimed to study the osmotic efficiency of the draw solutions and the factors affecting the performance of forward osmosis process : The draw solutions used were magnesium sulfate hydrate (MgSO4.7H2O) pojtassium chloride (KCL), calcium chloride (CaCl2) and ammonium bicarbonate (NH4HCO3). It was found that water flux increases with increasing draw solution concentration, and feed solution flow rate and decreases with increasing draw solution flow rate and feed solution concentration. And also found that the efficiency of the draw solutions is in the following order:

CaCl2> KCI > NH4HCO3> MgSO4.7H

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Composite Materials
Fabrication and characterization of bioactive composite: A pilot study
...Show More Authors

The increasing requirement and use of dental implant treatments has rendered dental implantology indispensable in dentistry. The aim of this study is to determine the optimum concentration of calcium silicate to be incorporated into a polyetherketoneketone (PEKK) matrix used as an implant material to enhance the bioactivity and mechanical properties of the composite compared with unmodified PEKK. In this study, different weight percentage (wt%) of micro-calcium silicate (m-CS) is incorporated into PEKK with ethanol as a binder. Subsequently, the mixture is dried in a forced convection oven at 120°C and poured into customized molds to fabricate a bioactive composite via compression molding (310°C, 15 MPa, and 20 min holding time

... Show More
View Publication
Scopus (6)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Aluminum Rubbish as a Coagulant for Oily Wastewater Treatment
...Show More Authors

In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Water Treatment With Conventional and Alternative Coagulants: A Review
...Show More Authors

There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (65)
Crossref (59)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
The Use of Lightweight Aggregate in Concrete: A Review
...Show More Authors

One of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied.

... Show More
View Publication Preview PDF
Crossref (15)
Crossref