In this paper, a random transistor-transistor logic signal generator and a synchronization circuit are designed and implemented in lab-scale measurement device independent–quantum key distribution systems. The random operation of the weak coherent sources and the system’s synchronization signals were tested by a time to digital convertor.
This research aims to Presented model can be applicable – in the frame of current accounting implementations - to measure environmental effects and disclosure then in the financial statements of economic entities after determined the environmental performance scopes of environmental activities that is works by this entities , because of importance of accounting information which presentation by accounting systems which's effectiveness tool on hand of decision maker about site plans and goals and drawing policies aims protection environment sustainable the represented of naturalism wealth elements . The researcher could be able to application his suggested model which's proof the ability to environmental accounting measurement and discl
... Show MoreThis research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreIn recent years, the attention of researchers has increased of semi-parametric regression models, because it is possible to integrate the parametric and non-parametric regression models in one and then form a regression model has the potential to deal with the cruse of dimensionality in non-parametric models that occurs through the increasing of explanatory variables. Involved in the analysis and then decreasing the accuracy of the estimation. As well as the privilege of this type of model with flexibility in the application field compared to the parametric models which comply with certain conditions such as knowledge of the distribution of errors or the parametric models may
... Show MoreIn this study, the radon gas concentration as well as the annual effective dose in leaves of the Malvasylvestris (Khabbaz) plant used in the traditional treatment and as food in Iraq, for this, it is necessary to evaluate the concentrations radon gas, which were measured using solid state nuclear track detectors (SSNTDs) CR-39 technique. The concentration and annual effective dose in samples were collected from Baghdad city ranged from minimum to maximum value 15.815 , 0.498 , 54.445 , 1.717 respectively, while the values of concentration and annual effective dose in a sample collected from Karbala are 15.297 ,0.482 . These values of concentration and annual effective dose less were compared with th
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe economic development and intense competition may make economic units neglected the social aspect as a service workers and the environment, the community and focus on the economic side and achieve profitability only, which puts it in a position of accountability of trade unions and bodies, environment, health, civil society organizations and the focus of many studies accounting in order to clarify social activities and disclosed in the financial statements, increasing pressure from multiple parties calling for governments to issue laws and regulations oblige economic units to disclose complete and accurate information in a timely manner for all social activities and be subj
... Show MoreThe research aims to verify the presence of correlation between the financial cycle and the economic cycle in the Iraqi economy. During the research period, the Iraqi economy witnessed a crisis cycle due to the permanent deviations in the state budget and the occurrence of sustainable deficits during the period of the economic blockade with the coincidence of an inflationary economic cycle due to the cheap money policy and the occurrence of Negative supply shocks due to the blockade and the madly high general level of prices, in addition to the weak financial planning of the state budget during the post-economic blockade and the entry of the economy into a stagnant economic cycle due to security and political instability, low levels of priv
... Show MoreThis paper aims to evaluate large-scale water treatment plants’ performance and demonstrate that it can produce high-level effluent water. Raw water and treated water parameters of a large monitoring databank from 2016 to 2019, from eight water treatment plants located at different parts in Baghdad city, were analyzed using nonparametric and multivariate statistical tools such as principal component analysis (PCA) and hierarchical cluster analysis (HCA). The plants are Al-Karkh, Sharq-Dijlah, Al-Wathba, Al-Qadisiya Al-Karama, Al-Dora, Al-Rasheed, Al-Wehda. PCA extracted six factors as the most significant water quality parameters that can be used to evaluate the variation in drinkin