Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Analysis Of The Photon Production Rate in the Quark-Gluon Interaction According To The Quantum Cromodynamic QCD Theory
...Show More Authors

           In this work, we have used the QCD dynamic scenario of the quark gluon interaction to investigate and study photon emission theoretically based on quantum theory. The QCD theory is implemented by deriving the photon emission rate equation of the state of ideal QGP at a  chemical potential. The photon rate of the quark-gluon interaction has to be calculated for the anti up-gluon interaction in the g →  γ system at the temperature of system  with critical temperature ( 132.38, ,  and 198.57) MeV and photon energy (  GeV. We investigated a significant effect of critical temperature, strength coupling, and photon energy on the photon rate contribution. Here, the increased photon emission rate and decreased streng

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Improvement of Gasoline Octane Number by Using Organic Compounds
...Show More Authors

The toxic lead additives to gasoline are no longer used in many countries around the world. Many other countries are now phasing out the lead in gasoline. Although the lead fuel is still in use in Iraq, several plans are considered to phase out the lead. The use of organic compounds to replace the lead additives in gasoline is considered now as an option in Iraqi refineries. The main objective of this project was preparation of premium gasoline, by blending of gasoline with Alternative additives (alcohol, aromatic) to enhancing octane number of Al-Doura gasoline pool. Improved gasoline was tested by ASTM standard method which includes octane number measuring by CFR engine analyzer. Gasoline pool RON (80) was used and selective components

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of the Number of Gaussian Points and Their Distribution on Image Quality
...Show More Authors

This  research  involves  studying  the  influence  of  increasing  the

number of Gaussian points and the style of their distribution, on a circular exit pupil, on the numerical calculations accuracy of the point spread function for an ideal optical system and another system having focus error of (0.25 A. and 0.5 A. )

It was shown that the accuracy of the results depends on the type of

distributing points on the exit pupil. Also, the accuracy increases with the increase of the number of points (N) and the increase of aberrations which requires on increas (N).

View Publication Preview PDF
Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Science And Research (ijsr)
Detection System of Varicose Disease using Probabilistic Neural Network
...Show More Authors

Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Photocatalytic Performance of AgNPs-Zeolite Composite by Hydrothermal Synthesis for Water Splitting
...Show More Authors

Two samples of (Ag NPs-zeolite) nanocomposite thin films have been prepared by easy hydrothermal method for 4 hours and 8 hours inside the hydrothermal autoclave at temperatures of 100°C. The two samples were used in a photoelectrochemical cell as a photocatalyst inside a cell consisting of three electrodes: the working electrode photoanode (AgNPs-zeolite), platinum as a cathode electrode, and Ag/AgCl as a reference electrode, to study the performance of AgNPs-zeolite under dark current and 473 nm laser light for water splitting. The results show the high performance of an eight-hour sample with high crystallinity compared with a four-hour sample as a reliable photocatalyst to generate hydrogen for renewable energies.

 

View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Inspired by poets under the Zangid and Ayyubid states
...Show More Authors

The poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
A Recognition System for Subjects' Signature Using the Spatial Distribution of Signature Body
...Show More Authors

This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 01 2017
Journal Name
2017 5th International Conference On Information And Communication Technology (icoic7)
Analysis of the number of ants in ant colony system algorithm
...Show More Authors

View Publication
Scopus (28)
Crossref (14)
Scopus Crossref