Preferred Language
Articles
/
LRc29I8BVTCNdQwCwIGp
Numerical Simulation of Metasurface Grating to Function as Polarization Modulator in Quantum Key Distribution Systems
...Show More Authors

larization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarizer is designed by COMSOL Multiphysics Software to operate in the visible region and transmit the transverse magnetic polarization of light. The same structure can be rotated by different angles, i.e., 90o, 45o, and -45oto mimic the function of polarization modulation in quantum key distribution systems. The designed structure has an extinction ratio of ~ 60000 and a wide angular tolerance range of (-20o-20o).Space Size 1

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Experimental and Numerical Investigation on the Performance of Straight-Bladed Vertical Axis Wind Turbine by Adding Cavities to it Structure
...Show More Authors

As the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Depending the Total Quality Management Philosophy To Develop Lean Manufacturing Systems: Case Study In the General Company for Heavy Engineering Equipments
...Show More Authors

The continued acceleration in the business environment has led to the need for organizations great attention to quality applied in organizations to meet the needs of customers and stay in the market for as long as possible.

Search launched from the underlying problem is the presence of concentrations of defects and waste plaguing the company and to achieve the goal of the study detects the level of quality applied in the factory vessels and reservoirs of the General Company for Heavy Engineering Equipment, As well as calculate wastage rates occurring in the production process and find a relationship between the level of quality and ratios defective in each type of waste, it has been used quantitative meas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
The distance variation due to mass transfer and mass loss in (13.6+8) Mand (13+10) M binary star systems
...Show More Authors

In this research the change in the distance of the two stars in two binary star systems (13.6+8)M8and (13+10)Mwas studied, through the calculations the value  (rate of mass transfer) of the two phases of dynamical stages of mass which are mass loss and mass transfer has been extracted in its own way ,by extracting the value of  the value of (the distance variation between the two stars) has been found only in the mass transfer stage by using mathematical model ,in mass loss stage  and   were calculated from the change and the difference between the values of each at different times of binary star system evolution ,it was found that  the maximum values of  and  are in ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Sustainable Chemistry And Pharmacy
A sustainable approach to utilize olive pips for the sorption of lead ions: Numerical modeling with aid of artificial neural network
...Show More Authors

Scopus (23)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-out Concrete Specimen
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of this

... Show More
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-Out Concrete Specimens
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Oct 15 2020
Journal Name
Iop Conf. Series: Journal Of Physics: Conf. Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

The aim of this paper is to evaluate the rate of contamination in soils by using accurate numerical method as a suitable tool to evaluate the concentration of heavy metals in soil. In particular, 2D –interpolation methods are applied in the models of the spread the metals in different direction.The paper illustrates the importance of the numerical method in different applications, especially nvironment contamination. Basically, there are many roles for approximating functions. Thus, the approximating of function namely the analytical expression may be expressed; the most common type being is polynomials, which are the easy implemented and simplest methods of approximation. In this paper the divided difference formula is used and extended

... Show More
Preview PDF