The result of a developed mathematical model for predicting the design
parameters of the fiber Raman amplifier (FRA) are demonstrated. The amplification
parameters are tested at different pump power with different fiber length. Recently,
the FRA employed in optical communication system to increase the repeater distance
as will as the capacity of the communication systems. The output results show, that
high Raman gain can be achieved by high pumping power, long effective area that
need to be small for high Raman gain. High-stimulated Raman gain coefficient is
recommended for high Raman amplifier gain, the low attenuation of the pump and the
transmitted signal in the fiber lead to high Raman gain.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph
Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built
This paper discusses reliability R of the (2+1) Cascade model of inverse Weibull distribution. Reliability is to be found when strength-stress distributed is inverse Weibull random variables with unknown scale parameter and known shape parameter. Six estimation methods (Maximum likelihood, Moment, Least Square, Weighted Least Square, Regression and Percentile) are used to estimate reliability. There is a comparison between six different estimation methods by the simulation study by MATLAB 2016, using two statistical criteria Mean square error and Mean Absolute Percentage Error, where it is found that best estimator between the six estimators is Maximum likelihood estimation method.
Static reservoir modeling is the interacting and analysis of the geological data to visualize the reservoir framework by three-dimensional model and distribute the static reservoir properties. The Petrel E&P software used to incorporate the data. The interpreted log data and core report used in distribution of petrophysical properties of porosity, water saturation and permeability for Zubair reservoir in Luhais oil field.
The reservoir discretized to 274968 cells in increments of 300, 200 and 1 meter in the direction of X, Y, and Z respectively. The geostatistical approach used in the distribution of the properties of porosity and water saturation overall the reservoir units. The permeability has been calculated
... Show MoreThe non-isothermal crystallization kinetics and crystalline properties of nanocomposites poly butyleneterephthalate, [PBT] /multiwalled-carbon nanotubes (MWCNTs) were tested by differential scanning calorimetry (DSC). PBT/(MWCNTs) nanocomposite was prepared by ultrasonicated of MWCNTs (0.5, 1, 2, 4 wt %) in dichloromethane (DCM) and after that the powdered PBT polymer was added to the MWCNTs solution. The non-isothermal crystallization results show that increasing the MWCNTs contents, decreased the melting temperature (Tm) of PBT/(MWCNTs) nanocomposite as compared with pure PBT, while resulting in improving the degree of crystallinity. These results indicated that a little amount of MWCNTs can be evident strong nucleating agent in PBT na
... Show MoreThe aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt
... Show MoreSimulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show More