Preferred Language
Articles
/
alkej-739
Modeling and Simulation for Performance Evaluation of Optical Quantum Channels in Quantum key Distribution Systems
...Show More Authors

In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 protocol based on polarizing encoding with consideration of the optical fiber and free-space quantum channel imperfections and losses by estimating the quantum bit error rate and final secure key. This work shows a general repeatable modeling process for significant performance evaluation. The most remarkable result that emerged from the simulated data generated and detected is that the modeling process provides guidance for optical quantum channels design and characterization for other quantum key distribution protocols.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BE

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Optical Forward Scattering Property Employment for measuring the Atmospheric Visibility
...Show More Authors

Abstract
An optoelectronic system for fog detection and visibility technique is presented .The idea of this research is based on the measurement of the atmospheric visibility by using an infrared beam emitter from LED diode. The optical scattering is used as a method to calculate the visibility. This method is applied at forward scattering within a foggy atmosphere, which is modern and has great importance for measuring visibility in seaports, airports, public roads and highways. In this paper we focus on the description of the system, principles of its operation and some results of field tests.
Keywords: fog sensor, visibility sensor, backscattering, forward scattering.

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
An optimized deep learning model for optical character recognition applications
...Show More Authors

The convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 26 2021
Journal Name
Modern Sport
Decision-making and its relationship to spiking and blocking performance in volleyball for emerging players
...Show More Authors

The game of volleyball is one of the competitive team games that took the lead in terms of its spread in the world, and the game of volleyball relies on basic skills as an important base on which this game is built to advance in the level of performance Performance and among these skills the skill of spiking and blocking wall, the research aims to identify the extent of the relationship of decision-making to the performance of spiking and blocking in volleyball for junior players. The sample was chosen from volleyball players for the Junior Specialized School of Sulaikh Sports Club / Baghdad Governorate for the season 2020 The researcher used the descriptive approach, and the research community was composed of (101) players. The two

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Automatic operation of the optical system in the theatrical show
...Show More Authors

Theatrical techniques took upon themselves the responsibility of building and organizing the theatrical form for the various forms of performances, and it was the important tool that the show makers could rely on in carrying out the various works at the audio-visual level, and lighting is one of the most important elements of the visual formation of the image in the show, as it is related to the visual process and what it can achieve in operations The contrast that constitutes the aesthetic and intellectual values of the theatrical show, especially since the process of adjusting the element of time and the timings for receiving or delivering, moving, and the movement of the actor is what can determine the rhythm of the scene, which in it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Studying the effect of annealing on some electrical and optical properties for thin CdS , CdS:In films
...Show More Authors

In the present work we prepared heterojunction not homogenous CdS/:In/Cu2S) by spray and displacement methods on glass substrate , CdS:In films prepared by different impurities constration. Cu2S prepared by chemical displacement method to improve the junction properties , structural and optical properties of the deposited films was achieved . The study shows that the film polycrystalline by XRD result for all film and the energy gap was direct to 2.38 eV with no effect on this value by impurities at this constration .

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iraqi Journal Of Physics
Optimum diameter for laser beam and effect of temperature rise on the optical bistability hysteresis loops
...Show More Authors

 In this research, analytical study for simulating a Fabry-Perot bistable etalon (F-P cavity) filled with a dispersive optimized nonlinear optical material (Kerr type) such as semiconductors Indium Antimonide (InSb). An optimization procedure using reflective (~85%) InSb etalon (~50µm) thick is described. For this etalon with a (50 µm) spot diameter beam, the minimum switching power is (~0.078 mW) and switching time is (~150 ns), leading to a switching energy of (~11.77 pJ) for this device. Also, the main role played by the temperature to change the etalon characteristic from nonlinear to linear dynamics.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2023
Journal Name
Civileng
Numerical Modeling and Analysis of Strengthened Steel–Concrete Composite Beams in Sagging and Hogging Moment Regions
...Show More Authors

Strengthening of composite beams is highly needed to upgrade the capacities of existing beams. The strengthening methods can be classified as active or passive techniques. Therefore, the main purpose of this study is to provide detailed FE simulations for strengthened and unstrengthened steel–concrete composite beams at the sagging and hogging moment regions with and without profiled steel sheeting. The developed models were verified against experimental results from the literature. The verified models were used to present comparisons between the effect of using external post-tensioning and CFRP laminates as strengthening techniques. Applying external post-tensioning at the sagging moment regions is more effective because of the e

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref