Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sun Aug 01 2021
Journal Name
Sensors And Actuators B: Chemical
Sensitive and simple colorimetric methods for visual detection and quantitative determination of semicarbazide in flour products using colorimetric reagents
...Show More Authors

After baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Detection of Methamphetamine using Nanobentonite as a Novel Solid Phase Extraction Column Matrix Assisted with Gas Chromatography- Mass Spectroscopy
...Show More Authors

          This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Determination of hydroquinone in pure form and pharmaceutical preparations using Batch and FIA-Merging Zone techniques with spectrophotometric detection
...Show More Authors

In this study, a new, rapid and sensitive batch and flow injection-merging zones spectrophotometric methods for the determination of hydroquinone in a pure material and in pharmaceutical preparation were proposed. These methods were based on the oxidative-coupling reaction of HQ with 2,4-dinitrophenylhydazine (DNPH) in the presence of sodium periodate and sodium hydroxide to form a dark brown water slouble dye that is stable and has maximum absorption at 530 nm, graphs of absorbance versus concentration show that Beer's low is obeyed over the concentration rang of 1-40 and 3-300 μg.ml-1 of hydroquinone, with detection limits of 0.162 and 0.510 μg.ml-1 of hydroquinone for batch and FIA methods, respectively. The optimized FIA system is

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Ieee Photonics Journal
Di-Iron Trioxide Hydrate-Multi-Walled Carbon Nanotube Nanocomposite for Arsenite Detection Using Surface Plasmon Resonance Technique
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Quality of Audit Work Under Expert System
...Show More Authors

The research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.

The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Hydraulic Analysis of the Samarra-Al Tharthar System
...Show More Authors

Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 14 2019
Journal Name
Political Sciences Journal
The political system in North Korea
...Show More Authors

النظام السياسي في كوريا الشمالة

View Publication
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Polar structure in the international system
...Show More Authors

Conclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref