The result of a developed mathematical model for predicting the design
parameters of the fiber Raman amplifier (FRA) are demonstrated. The amplification
parameters are tested at different pump power with different fiber length. Recently,
the FRA employed in optical communication system to increase the repeater distance
as will as the capacity of the communication systems. The output results show, that
high Raman gain can be achieved by high pumping power, long effective area that
need to be small for high Raman gain. High-stimulated Raman gain coefficient is
recommended for high Raman amplifier gain, the low attenuation of the pump and the
transmitted signal in the fiber lead to high Raman gain.
The research aims at integrating the disclosure of the business models with the qualitative characteristics of accounting information. To achieve this, the elements of the business model should be identified and disclosed, and then study the possibility of integrating the disclosure of the business model with the qualitative characteristics of accounting information.
To achieve this objective, the research was based on the indicators of disclosure of the business model of the International Accounting Standards Board to measure the disclosure of the business model.
The research reached a number of conclusions, the most important of which were as follows:
Fi
... Show MoreThe IGRF model is the empirical representation of the Earth magnetic field recommended for scientific use by the International Association of Geomagnetism and Aeronomy(IAGA).
Since the Geomagnetic field has the abi lity to change the orientation of satellite, the strength of Geomagnetic field and its horizontal component have been studied.
This paper discusses the phenomenon of the Geomagnetic field intensity and its horizontal component at diferent altitudes and at certain latitudes, the geomagnetic field data is obtained by using IGRF2000 model at Baghdad (44.7 degree East longitude) .
The fluctuation properties of energy spectrum, electromagnetic transition intensities and electromagnetic moments in nucleus are investigated with realistic shell model calculations. We find that the spectral fluctuations of are consistent with the Gaussian orthogonal ensemble of random matrices. Besides, we observe a transition from an order to chaos when the excitation energy is increased and a clear quantum signature of the breaking of chaoticity when the single-particle energies are increased. The distributions of the transition intensities and of the electromagnetic moments are well described by a Porter-Thomas distribution. The statistics of electromagnetic transition intensities clearly deviate from a Porter-Thomas distribution (i
... Show MoreThis study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela
... Show MoreThe aim of this study was to propose and evaluate an eco-epidemiological model with Allee effect and nonlinear harvesting in predators. It was assumed that there is an SI-type of disease in prey, and only portion of the prey would be attacked by the predator due to the fleeing of the remainder of the prey to a safe area. It was also assumed that the predator consumed the prey according to modified Holling type-II functional response. All possible equilibrium points were determined, and the local and global stabilities were investigated. The possibility of occurrence of local bifurcation was also studied. Numerical simulation was used to further evaluate the global dynamics and the effects of varying parameters on the asymptotic behavior of
... Show MoreSince the emergence of the science of international relations as an independent academic scientific field, various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories, which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination
... Show MoreQuality of e-service is one of the critical factors that decide the success or failure of organizations. It may increase competitive advantages as well as enhance the relationships with the customers. Achieving high e-service quality and user satisfaction are challenging since they depend fundamentally on user perception and expectation which can be tricky at times. To date, there is no agreement as to what service quality is, and how it should be measured, whether it is a function of statistical measures of quality including physical defects or managerial judgment, or it is a function of customer perception about the services. This paper deep-dived the quality of e-services offered b
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More