Preferred Language
Articles
/
ijp-588
Surface Plasmon Plastic Optical Fiber Resonance with Multi-Layer as Chemical Sensor
...Show More Authors

A chemical optical fiber sensor based on surface plasmon resonance (SPR) was developed and implemented using multimode plastic optical fiber. The sensor is used to detect and measure the refractive index and concentration of various chemical materials (Urea, Ammonia, Formaldehyde and Sulfuric acid) as well as to evaluate the performance parameters such as sensitivity, signal to noise ratio, resolution and figure of merit. It  was noticed that the value of the sensitivity of the optical fiber-based SPR sensor, with 60nm and 10 mm long, Aluminum(Al) and Gold (Au) metals film exposed sensing region, was 4.4 μm, while the SNR was 0.20, figure of merit was 20 and resolution 0.00045. In this work a multimode plastic optical fiber with a core diameter of 980 μm, fluorinated polymer cladding of 20 μm and a numerical aperture of 0.51 was used.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Optical Properties of PVA/K2CrO4 Composite
...Show More Authors

     The change in the optical properties for samples of pure PVA and PVA /K2CrO4composite have been studied .The samples were prepared with different percentage (1,3,5,and 7)%wt of K2CrO4 by casting method technique .In this work ,we are study the absorption ,reflectance spectra ,absorption  coefficient, energy gap ,extinction coefficient ,and transmittance spectra as a function of wavelength range (200-800)nm ,Also  real and imaginary part of dielectric constant have been studied in the range of wave length .The results exhibit the optical properties change by the increase of K2CrO4 concentration, and the values of energy gap for indirect transitions decrease by the increase of the concentration of  K2CrO4

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 27 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison of regional bond strength of post space of fiber-reinforced post luted with two types of cements at different testing times
...Show More Authors

Back ground: This in vitro study was carried out to investigate the effect of post space regions (coronal, middle and apical), Time and the mode of polymerization (dual, self-cured) of the cements used on the bond strength between translucent fiber post and root dentin by using push-out test. Materials and Methods: Forty eight extracted mandibular first premolars (single root) were instrumented with ProTaper Universal system files (for hand use) and obturated with gutta percha for ProTaper and AH26® root canal sealer following the manufacturer instructions, after 24 hours post space was prepared using FRC postec® plus drills no.3 creating 8 mm depth post space. The prepared samples were randomly divided into two main groups (24 samples ea

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
International Photonics And Optoelectronics
Canonical Logic Units using Bidirectional Four-Wave Mixing in Highly Nonlinear Fiber
...Show More Authors

All-optical canonical logic units at 40 Gb/s using bidirectional four-wave mixing (FWM) in highly nonlinear fiber are proposed and experimentally demonstrated. Clear temporal waveforms and correct pattern streams are successfully observed in the experiment. This scheme can reduce the amount of nonlinear devices and enlarge the computing capacity compared with general ones. The numerical simulations are made to analyze the relationship between the FWM efficiency and the position of two interactional signals. © 2015 Chinese Laser Press

View Publication
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Magnetic Resonance Imaging
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images
...Show More Authors

Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images

View Publication
Scopus (28)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Evaluation of Resonance Strengths and Reaction Rates of 22Ne (p, gamma) 23Na Nuclear Reaction at Thermonuclear Energies
...Show More Authors

At thermal energies near stellar conditions, nuclear reactions are sensitive to resonance strengths of the nuclear reaction cross-section. In this paper, the resonance strengths of  nuclear reaction were evaluated numerically by means of nuclear reaction rate calculations using a written Matlab code, at the energies of interest in stellar nuclear reactions. The results were compared with standard reaction before and after application of a statistical analyses, to select the best parameters that made theoretical results as close as possible to the standard values. Fitting was made for different temperature ranges up to 10 GK, 0.6 GK and 0.25 GK. The evaluated results showed that as the temperature range becomes narrower, more error is ad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Desalination And Water Treatment
Optimization of chemical oxygen demand removal from petroleum refinery wastewater by electrocoagulation using tubular electrochemical reactor with a novel design
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Recent Research On Geotechnical Engineering, Remote Sensing, Geophysics And Earthquake Seismology
Evaluating the Accuracy of iPhone Lidar Sensor for Building Façades Conservation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
3D Content Encryption Using Multi-Level Chaotic Maps
...Show More Authors

      Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref