Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Design and implementation of silicon single-photon avalanche photodiode modeling tool for QKD systems
...Show More Authors

Single-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant perform

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 13 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.: Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.
...Show More Authors

This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Partial Substitution of Ge-S-Cd Alloys on the Density of Energy States
...Show More Authors

Five samples of the ternary alloy Ge-S-Cd were created using the melting point method, and the effects of partially substituting cadmium for germanium were determined. and partial substitution of germanium by cadmium was used to study the change in electrical conductivity. Electrical experiments were performed on Ge35-xS65Cdxternary alloy with x = 0, 5, 10, 15, and 20. It was discovered that the conductivity (σdc) rises with rising temperature in all samples under experiment. This confirms that the samples have semiconductor behavior. It has been observed that there are three regions of electrical conductivity in the electrical conductivity curve at low, moderate, and high temperatures. The pr

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Design of Achromatic Combined Quadrupole Lens Using the Modified Bell-Shaped Field Distribution Model
...Show More Authors

The optimization calculations are made to find the optimum properties of combined quadrupole lens consist of electrostatic and magnetic lenses to produce achromatic lens. The modified bell-shaped model is used and the calculation is made by solving the equation of motion and finding the transfer matrices in convergence and divergence planes, these matrices are used to find the properties of lens as the magnification and aberrations coefficients. To find the optimum values of chromatic and spherical aberrations coefficients, the effect of both the excitation parameter of the lens (n) and the effective length of the lens into account as effective parameters in the optimization processing

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Https://www.researchgate.net/journal/journal-of-physics-conference-series-1742-6596
The management of water distribution network using GIS application case study: AL-Karada area
...Show More Authors
Abstract<p>Clean water supply is one of the major factors contributing significantly to society’s socio-economic transformation by improving living standards, health, and increasing productivity. It is imperative to plan and construct appropriate water supply systems in modern society, which supply various segments of society with safe drinking water according to their requirements to ensure adequate and quality water supply. In the current study, here was an attempt to develop a model for geographic information systems to manage the assets of the water distribution networks in the Karrada region and to evaluate the network geometrically, and from the results of the engineering analysis of the</p> ... Show More
Crossref (2)
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (26)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Difference in distribution of the labor force by occupation for Sulaymaniyah governorate residents for the year 2013
...Show More Authors

The study aims to elucidation Difference distribution of the labor force by occupation in Sulaymaniyah governorate for the year 2013 by result field study to governorate and explain different Spatially for labor force by career. and The study reaches That Executive staff and Scribes and who join their high ratio from Total the labor force And the second Grade to Specialists and Technicians and who join their While Occupied career Production workers and who join their and Operators Transport Equipment and Engaged the third Grade from the total labor force and Continued Height in career Executive staff and who join their on the male labor force too . while Production workers in second Grade for male labor force , while the female labor for

... Show More
View Publication Preview PDF