Preferred Language
Articles
/
fBiIk5cBVTCNdQwCK5lS
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rate can reach 0.0239 (bits/pulse) with a quantum bit error rate (QBER) of 3.2% for the free space channel and 1.5% for the simulated sea-water channel. The security parameters for each value of the mean photon number closely align with the corresponding theoretical predictions. However, some discrepancies were observed, primarily due to a mismatch in photon detection efficiency for SPDMs and system fluctuations. The theoretical calculations also predict that using coincidence detection, the key can be distributed over distances of up to 195 km.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Damage Detection and Assessment of Stiffness and Mass Matrices in Curved Simply Supported Beam Using Genetic Algorithm
...Show More Authors

In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical And Cellular Archives
Effect of gibberellins on growth and production of two cultivars of ranunculus plant under different environmental conditions
...Show More Authors

Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical And Cellular Archives
Effect of cultar on growth and production of two cultivars of Ranunculus plant under different environmental conditions
...Show More Authors

Scopus
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Approximate Regular Modules
...Show More Authors

There are two (non-equivalent) generalizations of Von Neuman regular rings to modules; one in the sense of Zelmanowize which is elementwise generalization, and the other in the sense of Fieldhowse. In this work, we introduced and studied the approximately regular modules, as well as many properties and characterizations are considered, also we study the relation between them by using approximately pointwise-projective modules.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Algebra
Fully extending modules
...Show More Authors

Throughout this paper we introduce the concept of quasi closed submodules which is weaker than the concept of closed submodules. By using this concept we define the class of fully extending modules, where an R-module M is called fully extending if every quasi closed submodule of M is a direct summand.This class of modules is stronger than the class of extending modules. Many results about this concept are given, also many relationships with other related concepts are introduced.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Physics: Conference Series
D_j -Supplemented Modules
...Show More Authors

Scopus
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Semi – Bounded Modules
...Show More Authors

Let R be a commutative ring with identity, and let M be a unity R-module. M is called a bounded R-module provided that there exists an element x?M such that annR(M) = annR(x). As a generalization of this concept, a concept of semi-bounded module has been introduced as follows: M is called a semi-bounded if there exists an element x?M such that . In this paper, some properties and characterizations of semi-bounded modules are given. Also, various basic results about semi-bounded modules are considered. Moreover, some relations between semi-bounded modules and other types of modules are considered.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Science
PRIME HOLLOW MODULES
...Show More Authors

A non-zero module M is called hollow, if every proper submodule of M is small. In this work we introduce a generalization of this type of modules; we call it prime hollow modules. Some main properties of this kind of modules are investigated and the relation between these modules with hollow modules and some other modules are studied, such as semihollow, amply supplemented and lifting modules.

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
⊕-Rad -supplemented modules
...Show More Authors

Publication Date
Thu Oct 16 2014
Journal Name
Journal Of Advances In Mathematics
Strongly Rickart Modules
...Show More Authors

View Publication Preview PDF