We demonstrate a behavior of laser pulse grows through fiber laser inside and output cavity with a soliton fiber laser based on the multi-wall carbon nanotube saturable absorber (SA), we investigate the effects of a saturable absorber parameter on the mode-locking of a realistic Erbium fiber ring laser. Generalized nonlinear Schrodinger equation including the nonlinear effects as gain dispersion, second anomalous group velocity dispersion (GVD), self phase modulation (SPM), and two photon absorption used to describe pulse evolution. An analytical method has been used to understand and to quantify the role of the SA parameter on the propagation dynamics of pulse laser. We compute the chirp, power, width and phase of the soliton for range of SA parameters and we studied stability against nonlinear effects at different SA parameter ranges.
In this paper, the species of the genus of Chlaenius Bonelli, 1810 (Coleoptera, Carabidae) were reviewed, and it was revealed that there are 21 confirmed species in Iraq; among them, the species of Chlaenius hamifer Chaudoir, 1856 was recorded for the first time in Iraq.
Diagnostic characters, a redescription of some of the morphological features, photographs and illustrations are provided for the new record species in this investigation.
To demonstrate the effect of changing cavity length for FM mode locked on pulse parameters and make comparison for both dispersion regime , a plot for each pulse parameter as Lr function are presented for normal and anomalous dispersion regimes . The analysis is based on the theoretical study and the results of numerical simulation using MATLAB. The effect of both normal and anomalous dispersion regimes on output pulses is investigate Fiber length effects on pulse parameters are investigated by driving the modulator into different values. A numerical solution for model equations using fourth-fifth order, Runge-Kutta method is performed through MATLAB 7.0 program. Fiber length effect on pulse parameters is investigated by driving th
... Show MoreBiogas is one of the most important sources of renewable energy and is considered as an environment friendly energy source. The major goal of this research is to see if rice husk (Rh) waste and pomegranate peels (PP) waste are suitable for anaerobic digestion and what effect NaOH pre-treatment has on biogas generation. Rice husk and pomegranate peels were tested in anaerobic digestion under patch anaerobic conditions as separate wastes as well as blended together in equal proportions. The cumulative biogas output for the blank test (no pretreatment) was 1923 and 2526 ml, respectively using a single rice husk (Rh) and pomegranate peel (PP) substrates. The 50% rice husk digestion and 50% of pomegranate peels for blank test gave the result 224
... Show MoreStabilization of phenol trapped by agricultural waste: a study of the influence of ambient temperature on the adsorbed phenol
Aspartate aminotransferase was purified from urine and serum of patients with type 2 diabetes in a 2 steps procedure involving dialysis bag and sephadex G-25 gel filtration (column chromatography). The enzyme was purified 346.23 fold with 1467% yield and 3.46 fold with 142.85% yield in urine and serum of patients with type 2 diabetes respectively. The purified enzyme showed single peak. The results of this study revealed that AST activity of type 2 diabetes urine and serum increased significantly (p<0.001) compared with control group.
There are still areas around the world suffer from severe shortage of freshwater supplies. Desalination technologies are not widely used due to their high energy usage, cost, and environmental damaging effects. In this study, a mathematical model of single-bed adsorption desalination system using silica gel-water as working pair is developed and validated via earlier experiments. A very good match between the model predictions and the experimental results is recorded. The objective is to reveal the factors affecting the productivity of fresh water and cooling effect in the solar adsorption system. The proposed model is setup for solving within the commercially-available software (Engineering Equation Solver). It is implemented to so
... Show MoreAim of the present study is Identification of specific gene for GPCR using specific primers .and identification of difference in PCR analysis in patients with heart thrombosis and compared with healthy, Sequencing of PCR product regarding GPCR compared for all three subject, Identification the similarity of human GPCR with local strain of yeast fifty healthy control and fifty patients with thrombosis which diagnosed medically with cardiac specific troponin t, troponin 1 levels and electro myocardiogram ECG. The aged for all subjects ranged (39-75) years patients were lying in cardiac care unit at Ibn- al- Nafees teaching hospital and Sheikh Zayed teaching hospital. Genomic DNA of whole blood was extracted from buffy coat and cell cu
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More