Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reducing of Corrosion Rate in Boiler Tubes by Using Oxygen Scavengers
...Show More Authors

The corrosion behavior of carbon steel at different temperatures 100,120,140 and 160 Cͦ under different pressures 7,10 and 13 bar in pure distilled water and after adding three types of oxygen scavengers Hydroquinone, Ascorbic acid and Monoethanolamine in different concentrations 40,60 and 80 ppm has been investigated using weight loss method. The carbon steel specimens were immersed in water containing 8.2 ppm dissolved oxygen (DO) by using autoclave. It was found that corrosion behavior of carbon steel was greatly influenced by temperature with high pressure. The corrosion rate decreases, when adding any one of oxygen scavengers. The best results were obtained at a concentration of 80 ppm of each scavenger. It was observed that 

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 06 2024
Journal Name
Research Square
Bioremediation of Cellulosic Wastes by Using Orthodillo chiltoni (Vandel, 1973), Isopoda
...Show More Authors

Terrestrial isopods play an important role in the biodegradation of many wastes which gives agreat importance in the nutrient cycles and ecosystem services , therefore this paper aims to use species Orthodillo chiltoni (Vandel, 1973) as a model organism in bioremediation of urban environment with municipal wastes, agricultural fields, parks and markets wastes. Samples of these wastes included potato peels, orange fruit leaves, thyme plant and sawdust,cardboard residues , the experiments were carried out in laboratory condition similar to the living environment of this species in terms of temperature, humidity and intensity lighting. The applied results have shown that

... Show More
View Publication
Crossref
Publication Date
Mon Jul 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Postoperative assessment of dental implants by using multi-slice computed tomography
...Show More Authors

Background: Implantology is a fast growing area in dentistry. One of the most common issues encountered in dental implantation procedures is the lack of adequate preoperative planning. Conventional radiography may not be able to assess the true regional three-dimensional anatomical presentation. Multi Slice Computed Tomography provides data in 3-dimentional format offering information on craniofacial anatomy for diagnosis; this technology enables the virtual placement of implant in a 3-Dimensional model of the patient jaw (dental planning). Patients, Material and Methods: The sample consisted of (72) Iraqi patients indicated for dental implant (34 male and 38 female), age range between (20-70) years old. They were examined during a time p

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Estimation of return stock rate by using wavelet and kernel smoothers
...Show More Authors

This article aim to estimate the Return Stock Rate of the private banking sector, with two banks, by adopting a Partial Linear Model based on the Arbitrage Pricing Model (APT) theory, using Wavelet and Kernel Smoothers. The results have proved that the wavelet method is the best. Also, the results of the market portfolio impact and inflation rate have proved an adversely effectiveness on the rate of return, and direct impact of the money supply.

Scopus (3)
Scopus
Publication Date
Sat Dec 11 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Study the Distribution of Rotavirus Genotypes in Vaccinated and non Vaccinated Children in Babylon Province
...Show More Authors

Rotaviruses, a major cause of gastroenteritis in children worldwide accounts for around half a million deaths annually. Vaccine against the virus has been recommended by the WHO to be involved in the national immunization program.To evaluate the genetic characterization of rotavirus among children with acute gastroenteritis in Babylon province is warranted. Children complained of diarrhea with rotavirus infection detected in their stool were involved in the study. The age range was 10 months to 60 months and with retrogradechecking of rotavirus vaccine history. Rotavirus genotypes were detected by reverse transcription-polymerase chain reaction (RT-PCR).A total number of 40 children with rotavirus gastroenteritis were used to examine the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and analysing inequality in the Distribution of Economic Welfare in Suleimania Governorate during (2007):
...Show More Authors

Abstract

 The issue of inequality in distribution of income and / or consumption expenditure is related to economic welfare because there is an inverse relationship between the economic welfare on the one hand, and the degree of inequality, on the other hand. Despite the fact that inequality is considered as normal phenomenon in every society, but if it exceeded certain limits it will lead to undesirable economic, social and political consequences. Therefore, the availability of indicators about inequality is a necessary tool for planning and evaluation of economic development programs. So, current study is aiming at measuring and analyzing the degree of inequality in distribution of consumpti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
Comparative study of electrochemical oxidation system hybrid with photocatalytic system for the treatment of Al-Najaf petroleum refinery wastewater
...Show More Authors

View Publication
Crossref
Publication Date
Wed Feb 06 2019
Journal Name
National Academy Science Letters
The Detection Limit of PCR Amplification for Cryptosporidium spp. Oocysts in Fecal Samples
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref