Based on nonlinear self- diffraction technique, the nonlinear optical properties of thin slice of matter can be obtained. Here, nonlinear characterization of nano-fluids consist of hybrid Single Wall Carbon Nanotubes and Silver Nanoparticles (SWCNTs/Ag-NPs) dispersed in acetone at volume fraction of 6x10-6, 9x10-6, 18x10-6 have been investigated experimentally. Therefore, CW DPSS laser at 473 nm focused into a quartz cuvette contains the previous nano-fluid was utilized. The number of diffraction ring patterns (N) has been counted using Charge - Coupled- Device (CCD) camera and Pc with a certain software, in order to find the maximum change of refractive index ( of fluids. Our result show that the fraction volume of 18x10-6 is more nonlinearity than others.
Abstract: The increased interest in developing new photonic devices that can support high data rates, high sensitivity and fast processing capabilities for all optical communications, motivates a pre stage pulse compressor research. The pre-stage research was based on cascading single mode fiber and polarization maintaining fiber to get pulse compression with compression factor of 1.105. The demand for obtaining more précised photonic devices; this work experimentally studied the behavior of Polarization maintaining fiber PMF that is sandwiched between two cascaded singe mode fiber SMF and fiber Bragg gratings FBG. Therefore; the introduced interferometer performed hybrid interference of both Mach-Zehnder
... Show MoreComplexes reaction of Fe+2, Cd+2, Hg+2 and Ag+ with the 2-thiotolylurea were prepared in ethanolic medium with the (1:1) M:L ratio yielded a series of neutral complexes. The prepared complexes were characterized using flame atomic absorption, micoelemental analysis (C.H.N), chloride content (Mohr Method) , FT.IR and UV-Vis spectroscopic, as well as magnetic susceptibility and conductivity measurement. From the above data, the proposed molecular structure for Fe+2, Cd+2 and Hg+2 complexes are tetrahedral geometry while Ag+ complex is trigonal structure.
In this work, polyvinylpyrrolidone (PVP), Multi-walled carbon nanotubes (MWCNTs) nanocomposite was prepared and hybrid with Graphene (Gr) by casting method. The morphological and optical properties were investigated. Fourier Transformer-Infrared (FT-IR) indicates the presence of primary distinctive peaks belonging to vibration groups that describe the prepared samples. Scanning Electron Microscopy (SEM) images showed a uniform dispersion of graphene within the PVP-MWCNT nanocomposite. The results of the optical study show decrease in the energy gap with increasing MWCNT and graphene concentration. The absorption coefficient spectra indicate the presence of two absorption peaks at 282 and 287 nm attributed to the π-π* electronic tr
... Show MoreRapid worldwide urbanization and drastic population growth have increased the demand for new road construction, which will cause a substantial amount of natural resources such as aggregates to be consumed. The use of recycled concrete aggregate could be one of the possible ways to offset the aggregate shortage problem and reduce environmental pollution. This paper reports an experimental study of unbound granular material using recycled concrete aggregate for pavement subbase construction. Five percentages of recycled concrete aggregate obtained from two different sources with an originally designed compressive strength of 20–30 MPa as well as 31–40 MPa at three particle size levels, i.e., coarse, fine, and extra fine, were test
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreLead selenide PbSe thin films of different thicknesses (300, 500, and 700 nm) were deposited under vacuum using thermal evaporation method on glass substrates. X-ray diffraction measurements showed that increasing of thickness lead to well crystallize the prepared samples, such that the crystallite size increases while the dislocation density decreases with thickness increasing. A.C conductivity, dielectric constants, and loss tangent are studied as function to thickness, frequency (10kHz-10MHz) and temperatures (293K-493K). The conductivity measurements confirm confirmed that hopping is the mechanism responsible for the conduction process. Increasing of thickness decreases the thermal activation energy estimated from Arhinus equation is
... Show MoreIn vivo study revealed that ZnO nanoparticles treatment of Streptococcus SPP contaminated injured skin showed good prognosis and good healing process include complete regeneration of the epithelial cells of the epidermis and increase of cellulartiy of the dermal content compared with untreated group. In conclusion, treatment of S. pyogenes infected skin with Zinc oxide nanoparticles concentration (2 mg/ml) limit the skin damage and localized the lesion to the incision site with good healing process
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More