In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show MoreTwo quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an
... Show MoreAccording to the circumstances experienced by our country which led to Occurrence of many crises that are the most important crisis is gaining fuel therefore , the theory of queue ( waiting line ) had been used to solve this crisis and as the relevance of this issue indirect and essential role in daily life .
This research aims to conduct a study of the distribution of gasoline station in (both sides AL – kharkh and AL Rusafa, for the purpose of reducing wasting time and services time through the criteria of the theory of queues and work to improve the efficiency of these stations by the other hand. we are working to reduce the cost of station and increase profits by reducing the active serv
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThe aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show More