Abstract: In this work we demonstrate and investigate the optical pulse propagation in a photonic band gap fiber Bragg grating (FBG). The light propagates in opposite direction in FBG is explained and discussed by a Coupled Mode Theory (CMT). The photonic band gap (stop band gap) is created by fabricated, a Bragg grating in optical fiber. The results show the pulse spectrum falls entirely within the stop band gap, the entire pulse is reflected by the grating, while when the pulse spectrum is outside the stop band gap the pulses will transmitted through the grating. The group velocity (VG) becomes zero at the edges of the stop band and group velocity dispersion β2 is anomalous on the shorter side of stop band gap whereas β2 for uniform fiber becomes anomalous for wavelengths lower than the zero dispersion.
The science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More
The aim of this research is to identify the Andalusia poet Abu Izac Al-Zauali , whose most of his poetry and biography had been lost, as well as many Andalusia poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry and to document his poetry as other writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .
Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreIt is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro
... Show MoreIt is very known how great is the role of the Jewish writers in the system of the Zionist movement. The movement relied on writers and writers to carry out their programs, especially those pertaining to the creation of a "national homeland" for Jews. Most Jewish writers sang of Palestine even though they were not born there.
On such a basis, we have followed closely the writings of writers, critics and others by the end of the nineteenth century and the beginning of the twentieth century. We found that these writings are based on one common question: What is the fate of the Jewish people?
Most of these writings were accompanied by Theodor Herzl's proj
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreAbstract
Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.
This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm
... Show More