Preferred Language
Articles
/
fBiIk5cBVTCNdQwCK5lS
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rate can reach 0.0239 (bits/pulse) with a quantum bit error rate (QBER) of 3.2% for the free space channel and 1.5% for the simulated sea-water channel. The security parameters for each value of the mean photon number closely align with the corresponding theoretical predictions. However, some discrepancies were observed, primarily due to a mismatch in photon detection efficiency for SPDMs and system fluctuations. The theoretical calculations also predict that using coincidence detection, the key can be distributed over distances of up to 195 km.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Comparison of Single and Group Bored Piles Settlement Based on Field Test and Theoretical Methods
...Show More Authors

 Bored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Arabic Characters Recognition by Edge Detection Using Connected Component Contour(CO3)
...Show More Authors

  In the present paper, Arabic Character Recognition  Edge detection method based on contour and connected components  is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content.         The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Materials Letters
Determination of third order susceptibility of carbon quantum dots at different concentrations
...Show More Authors

The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 04 2017
Journal Name
Al-qadisiyah Journal For Administrative And Economic Sciences
Survival Function Estimating of Single age Groups for Generalized Gamma Distribution with Simulation.
...Show More Authors

The analysis of survival and reliability considered of topics and methods of vital statistics at the present time because of their importance in the various demographical, medical, industrial and engineering fields. This research focused generate random data for samples from the probability distribution Generalized Gamma: GG, known as: "Inverse Transformation" Method: ITM, which includes the distribution cycle integration function incomplete Gamma integration making it more difficult classical estimation so will be the need to illustration to the method of numerical approximation and then appreciation of the function of survival function. It was estimated survival function by simulation the way "Monte Carlo". The Entropy method used for the

... Show More
Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 29 2024
Journal Name
Journal Of The College Of Basic Education
Detection Of Biofilm Formation By Beta- Lactam Resistance Klebsiella Pneumoniae Isolated From Clinical Specimens And Aquatic Samples
...Show More Authors

Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Open Veterinary Journal
Detection of biofilm formation and antibiotics resistance of Staphylococcus spp. isolated from humans’ and birds’ oral cavities
...Show More Authors

Background: Staphylococcus spp. are widely distributed in nature and can cause nosocomial, skin infections, and foodborne illness, and it may lead to severe financial losses in birds by causing systemic infection in numerous organs. Aim: This study was conducted to determine the prevalence of Staphylococcus spp. in humans and birds in Baghdad city. Methods: Seventy-six oral cavity swabs were collected, including 41 from birds and 35 from breeders. All samples were examined by bacteriological methods and identified by using the VITEK technique, the samples were then further studied to test the ability of biofilm formation, and MDR factors and MAR index were tested with the use of seven antibiotics. Results: Among the 76 oral swa

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
An Investigation Study of Thinning Distribution in Single Point Incremental Forming Using FEM Analysis
...Show More Authors

Single Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.

This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref