In this paper, a random transistor-transistor logic signal generator and a synchronization circuit are designed and implemented in lab-scale measurement device independent–quantum key distribution systems. The random operation of the weak coherent sources and the system’s synchronization signals were tested by a time to digital convertor.
The study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.
The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:
Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of
... Show MoreIn recent years, there is more interest in water sources availability, including groundwater due to an increase in demand for water because of the increasing population in the world, and the water recedes due to climate change also. Therefore, the study of groundwater has required more attention. The aim of the present study is to establish a MODFLOW model in the groundwater modeling system software to simulate the movement of groundwater in the Turssaq alluvial fan which is located in the Qazaniyah city, east of Diyala Governorate. The solid model was used to define the aquifer in the study area. Using the GIS software, mapping and preparing the data needed to create a conceptual model were carried out. The data of the
... Show MoreAbstractBackgroundLeishmaniasis is endemic in Iraq, where both cutaneous and visceral forms of the disease are reported.ObjectivesTo determine the prevalence of cutaneous leishmaniasis (CL) and to identify associations of CL with age, sex, season, and provinces depending on some demographic and climatic aspects.MethodsThis study is retrospective and includes reported cases of infections using the available surveillance database taken from the Iraqi Ministry of Health for the years 2011, 2012, and 2013 for all provinces of Iraq.ResultsMen and boys were found to be at higher risk for CL compared with women and girls. The majority of cases were recorded among those in age groups 5–14 and 15–45 years old. Most cases were recorded from lowla
... Show MoreThe research included five sections containing the first section on the introduction of the research and its importance and was addressed to the importance of the game of gymnastic and skilled parallel effectiveness and the importance of learning, but the problem of research that there is a difference in learning this skill and difficulty in learning may be one of the most important reasons are fear and fear of falling and injury, And a lack of sense of the movement of the movement is one of the obstacles in the completion of the skill and the goal of research to design a device that helps in learning the skill of descending Almtor facing with half a cycle according to the typical locomotor track on the parallel device of the technical men'
... Show MoreGenerally, there are many problems that people run into; unemployment is one of these common diseases which usually hits the whole communities leaving crucial effects (economic, social, and psychological) that are difficult to handle them. The current study aims to identify the level of emotional disorders among Iraqi unemployed alumni for the academic years (2013-2016). To this end, the researchers have prepared a questionnaire to measure (anxiety, depression, and anger): these criteria distributed over (30) item. As for sample, it limited to (50) male and female student. The findings of study have revealed that the whole sample showed a high level of emotional disorders, and anger disorder showed higher level than the level of (depress
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT
... Show MoreEstimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More