In this research, analytical study for simulating a Fabry-Perot bistable etalon (F-P cavity) filled with a dispersive optimized nonlinear optical material (Kerr type) such as semiconductors Indium Antimonide (InSb). An optimization procedure using reflective (~85%) InSb etalon (~50µm) thick is described. For this etalon with a (50 µm) spot diameter beam, the minimum switching power is (~0.078 mW) and switching time is (~150 ns), leading to a switching energy of (~11.77 pJ) for this device. Also, the main role played by the temperature to change the etalon characteristic from nonlinear to linear dynamics.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various
... Show MoreI noticed a researcher while working in the kindergarten that there is a group of
parameters resort to the use of different methods may be some undesirable and some
undesirable So felt researcher detection methods used parameters Riyadh in the face of the
pressures of life, being engaged in kindergarten eligibility, governmental or being married or
unmarried, as well as educational attainment for this parameter.
To achieve the objectives of the research: -
The researcher prepare a scale methods face the pressures of life of the parameters
have been confirmed the veracity of the paragraphs of the scale of the presentation to a group
of experts in this area, and extracted power discriminatory clauses scale and extra
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show MoreFamily social institution mission in the community, if and repaired Magistrate society and often lead that institution a positive role in the socialization, but a variety of factors ailing infect system family Vtfkdh role effective and influential in society and stands at the forefront of those factors disintegration family, whether caused by the death of one or both parents, divorce or separation, or whether the result of domestic weakness and poor family behavioral practices. And gaining the study of great importance and that the scarcity of studies that address the problem of delinquency female, is no secret that stand on the fact the role of disintegration family in the events of that problem will help and a large degree in the devel
... Show MoreAThe Bridge Maintenance Management System (BMMS) is an application system that uses existing data from a Bridge Management System database for monitoring and analysis of current bridges performance, as well as for estimating the current and future maintenance and rehabilitation needs of the bridges. In a transportation context, the maintenance management is described as a cost-effective process to operate, construct, and maintain physical money. This needs analytical tools to support the allocation of resources, materials, equipment, including personnel, and supplies. Therefore, Geographic Information System (GIS) can be considered as one tool to develop the road and bridge maintenanc
Tigris River water that comes from Turkey represents the main water resource of this river in Iraq. The expansion in water river implementations has formed a source of trouble for the workers in the water resources management field in Iraqi. Unfortunately, there is no agreement between Iraq and Turkey till now to share the water of this international river. Consequently, the optimal operation of water resources systems, particularly a multi-objective, multi-reservoir, is of the most necessity at the present time.
In this research two approaches, were used the dynamic programming (DP) approach and simulation model to find the optimal monthly operation of Ilisu Dam (from an Iraqi point of view) through a comp
... Show More
