Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Genetic Algorithm-Based Anisotropic Diffusion Filter and Clustering Algorithms for Thyroid Tumor Detection
...Show More Authors

Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Iraqi Journal Of Science
Gravity Field Interpretation for Subsurface Faults Detection in A Region Located SW- Iraq
...Show More Authors

This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermor

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Taking Over The Judiciary By Women And The Position Of Law From That: مثالا
...Show More Authors

لمقدمة

     الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى  واصحابه أجمعين  ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :

        فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Estimation the Radioactive Pollution by Uranium in the Soil of Al-Kut City/ Iraq
...Show More Authors

The aim of the present work, was measuring of uranium concentrations in 25 soil samples from five locations of Al-Kut city. The samples taken from different depths ranged from soil surface to 60cm step 15 cm, for this measurement of uranium concentrations .The most widely used technique SSNTDs was chosen to be the measurement technique. Results showed that the higher concentrations were in Hai Al- Kafaat which recorded 1.49 ± 0.054 ppm . The uranium content in soil samples were less than permissible limit of UNSCEAR(11.7ppm).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Modern Physics E
The ground state properties of some exotic nuclei studied by the two-body model
...Show More Authors

The ground state properties including the density distributions of the neutrons, protons and matter as well as the corresponding root mean square (rms) radii of proton-rich halo candidates 8B, 12N, 23Al and 27P have been studied by the single particle Bear– Hodgson (BH) wave functions with the two-body model of (core+p). It is found that the rms radii of these proton-rich nuclei are reproduced well by this model and the radial wave functions describe the long tail of the proton and matter density distributions. These results indicate that this model achieves a suitable description of the possible halo structure. The plane wave Born approximation (PWBA) has been used to compute the elastic charge form factors.

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
The optical properties of C\Mg, nano-rods produced by the explosion wire technique
...Show More Authors
Abstract<p>The aim of this research is to study the optical properties of carbon-magnesium plasma resulting from arc discharge with explosive wire technique, where the energy gap of each of carbon and magnesium and the carbon-magnesium bond for three values of the wire exploding current (50,75,100 amperes) was studied. It was found that the energy gap for each of carbon and magnesium decreases with increasing the current, the X-ray diffraction of magnesium and the carbon-magnesium suspension was studied, and FTIR of the carbon-magnesium suspended carbon was studied for three values of the exploding current (50, 75, 100 amperes) and the type of bonds for carbon and magnesium was determined. To ob</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref