Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Wed Sep 28 2022
Journal Name
Gsc Advanced Research And Reviews
Distribution and seasonal spread of zooplankton in Iraqi waters
...Show More Authors

A summary of zooplankton research done in Peruvian marine waters is presented. We first provide a brief overview of the evolution of zooplankton studies off Peru before reviewing zooplankton biodiversity, regional distribution, seasonal and interannual fluctuation, trophodynamics, secondary production, and modeling are some of these topics. We evaluate research on various meroplankton, macroplankton, mesoplankton, and microplankton groups and provide a list of species from both published and unpublished sources. Three regional zooplankton groups have been identified: A shelf group on the continental shelf dominated by Acartia tonsa and Centropages brachiatus; A slope group on the continental shelf with siphonophores, bivalves, foramin

... Show More
Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
"Comparison of Approximate Estimation Methods for Logistics Distribution Teachers"
...Show More Authors

The goal beyond this Research is to review methods that used to estimate Logistic distribution parameters. An exact estimators method which is the Moment method, compared with other approximate estimators obtained essentially from White approach such as: OLS, Ridge, and Adjusted Ridge as a suggested one to be applied with this distribution. The Results of all those methods are based on Simulation experiment, with different models and variety of  sample sizes. The comparison had been made with respect to two criteria: Mean Square Error (MSE) and Mean Absolute Percentage Error (MAPE).  

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Estimation of (S-S) reliability for inverted exponential distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Predicting of Temperature Distribution in Direct Contact Heat Transfer
...Show More Authors

An experimental and theoretical investigation of three phase direct contact heat transfer by evaporation of refrigerant drops in an immiscible liquid has been carried out. Refrigerant Rl2 and R134a were used for the dispersed phase, while water and brine were the immiscible continuous phase. A numerical analysis is presented to predict the temperature distribution throughout the circular test column radially and axially is achieved. Experimental measurements of the temperature distribution have been compared with the numerical results and are discussed .A comparison between the experimental and theoretical results showed acceptable agreement and applicability of the derived equations. Comparison with other related work showed similar beh

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 22 2018
Journal Name
Al-nahrain Journal For Engineering Sciences
Numerical Analysis of the Effect of Scanning Speed on the Temperature Field Distribution for Laser Heat Treatment Applications
...Show More Authors

One of the unique properties of laser heating applications is its powerful ability for precise pouring of energy on the needed regions in heat treatment applications. The rapid rise in temperature at the irradiated region produces a high temperature gradient, which contributes in phase metallurgical changes, inside the volume of the irradiated material. This article presents a comprehensive numerical work for a model based on experimentally laser heated AISI 1110 steel samples. The numerical investigation is based on the finite element method (FEM) taking in consideration the temperature dependent material properties to predict the temperature distribution within the irradiated material volume. The finite element analysis (FEA) was carried

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
the role of marketing intelligence in promoting new product policies.a sample survey of workers in a number of mineral water plants in dohuk governorate
...Show More Authors

Marketing Intelligence is one of the important methods of collecting information about competitors ' products and changes in customers ' tastes and needs that contribute to determining the policies to be followed in product development.

The problem of research, which seeks to be answered by the extent to which the companies in question have the appropriate and effective mechanisms to develop their products, and the nature of the relationship between the components of marketing intelligence and new product development policies. The importance of research is determined by the importance of obtaining important and necessary information to make the appropriate decision on the development of the new product an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection
...Show More Authors

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
View Publication
Crossref (4)
Crossref