Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Relationship Between Nusselt and Reynolds Number in Direct Contact Heat Transfer by Condensation of Light Hydrocarbons in Water
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jul 04 2025
Journal Name
Computational And Theoretical Chemistry
Coronene and BN isosters of coronene: Revealing the electron density distribution using magnetic shielding maps
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Position of the United States from Britain in the discussions of British Evacuation from Egypt (1946-1952)
...Show More Authors

Many reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The influence of temperature and size on the absorption coefficient of CdSe quantum dots
...Show More Authors
Abstract<p>Because of Cadmium selenide quantum dots (CdSe quantum dots) has a tuning energy gap in the visible light range, therefore; it is provided a simple theoretical model for the absorption coefficient of CdSe quantum dots, where the absorption coefficient determines the extent to which the light of a material can penetrate a specific wavelength before it is absorbed. CdSe quantum dots have an energy gap can be controlled through two effects: the temperature and the dot size of them. It is found that; there is an absorption threshold for each directed wavelength, where CdSe quantum dots begin to absorb the visible spectrum at a size of 1.4 nm at room temperature for a directed wavelength 3</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Investigations about the characteristic behavior of the linear mode of quantum acoustic waves ion
...Show More Authors

The dispersion relation of linear quantum ion acoustic waves is derivate according to a fluid approach that depends on the kinetic description of the systems of charged particles model. We discussed the dispersion relation by changing its parameters and graphically represented. We found through graphs that there is full agreement with previous studies on the subject of interest. That motivates us to discuss the dispersion relation of waves depending on the original basic parameters that implicitly involved in the relationship which change the relationship by one way or another, such as electron Fermi temperature and the density at equilibrium state.

View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Proposal of Using Principle of Maximizing Entropy of Generalized Gamma Distribution to Estimate the Survival probabilities of the
...Show More Authors

Abstract

In this research we been estimated the survival function for data suffer from the disturbances and confusion of  Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Revolution In Science And Humanity
Nonparametric Estimation of Failure Periods for Log Normal Distribution Using Bootstra
...Show More Authors

A non-parametric kernel method with Bootstrap technology was used to estimate the confidence intervals of the system failure function of the log-normal distribution trace data. These are the times of failure of the machines of the spinning department of the weaving company in Wasit Governorate. Estimating the failure function in a parametric way represented by the method of the maximum likelihood estimator (MLE). The comparison between the parametric and non-parametric methods was done by using the average of Squares Error (MES) criterion. It has been noted the efficiency of the nonparametric methods based on Bootstrap compared to the parametric method. It was also noted that the curve estimation is more realistic and appropriate for the re

... Show More
View Publication
Publication Date
Thu Jan 16 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Comparison of some reliability estimation methods for Laplace distribution using simulations
...Show More Authors

In this paper, we derived an estimator of reliability function for Laplace distribution with two parameters using Bayes method with square error loss function, Jeffery’s formula and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived Bayesian estimator compared to the maximum likelihood of this function and moment method using simulation technique by Monte Carlo method under different Laplace distribution parameters and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator and moment estimator in all samples sizes