Preferred Language
Articles
/
ehh9k5cBVTCNdQwCW5kF
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB84 detection setup. The second experiment represents an accurate method for estimating the value of µ because of using single photon detectors with high timing resolution and low dark counts, in addition to using a Time-to-digital convertor with a bin size of 81 ps.                                                                                   

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Estimation of Bladder pressure by using poiseuilles equation
...Show More Authors

Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Estimation of Surface Runoff to Bahr AL-Najaf
...Show More Authors

The estimation of the amounts of Surface runoff resulting from rainfall in the water basins is of great importance in water resources management. The study area (Bahr Al-Najaf) is located on the western edge of the plateau and the southwestern part of the city center of Najaf, with an area of 2729.4 (km2). The soil and water assessment tool (SWAT) with ArcGIS software was used to simulate the runoff coming from the three main valleys (Kharr (A and B)), Shoaib Al-Rahimawi, and Maleh), that contribute the flow to the study area. The results of the model showed that the SWAT software was successfully simulating the flow conditions based on the coefficient of determination (R2), the Nash coefficient (NS

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 17 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Estimation the Safety of Parenteral Resveratrol in Mice
...Show More Authors

   Resveratrol is polyphenolic compound has many biochemical and biological effects on several organs. Therefore, resveratrol can be used to treat many diseases. The aim was to evaluate resveratrol safety when used in a parenteral single bolus dose. This study was conducted on 60 mice (30 males and 30 females). Each male and female mice divided into 6 groups (five mice per group). All mice groups given 1% DMSO and five different doses of resveratrol (5, 2.5, 1.25, 0.625, 0.312) gm/kg intraperitonially given to five groups respectively. The mice were continuously monitored during 14 days. The number of deaths, changes in general behavior, changes in physiological activity, and signs of toxicity were reported. On day 15 blood was

... Show More
View Publication Preview PDF
Scopus (8)
Scopus Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (12)
Scopus Crossref