Preferred Language
Articles
/
ijl-102
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
History Of Medicine
Chemical and Molecular Physics in Perspective Quantum Mechanics is alternative of Quantum Classical Mechanics
...Show More Authors

Abstract The concept of quantum transition is based on the completion of a succession of time dependent (TD) perturbation theories in Quantum mechanics (QM). The kinetics of "quantum" transition, which are dictated by the coupled motions of a lightweight electrons and very massive nuclei, are inherent by nature in chemical and molecular physics, and the sequence of TD perturbation theory become unique. The first way involved adding an additional assumption into molecule quantum theory in the shape of the Franck-Condon rule, which use the isothermal approach. The author developed the second strategy, which involved injecting chaos to dampen the unique dynamically of the bonding movement of electrons and nuclei in the intermediary state of

... Show More
Publication Date
Wed May 01 2024
Journal Name
مجلة العلوم الانسانية والاجتماعية
كيفية توزيع حصيلة البيع الجبري على الدائنين
...Show More Authors

Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
Notes on Exponential Distribution
...Show More Authors

المتغير العشوائي X  له توزيع أسي اذا كان له دالة احتمالية الكثافة بالشكل:

عندما  ، هذه هي الحالة الخاصة لتوزيع كاما.

غالباً جداً ولسبب معقول تأخذ . الحالة الخاصة لـ (1) التي نحصل عليها تسمى بالتوزيع الاسي لمعلمة واحدة.

اذا كانت  ، ، التوزيع في هذه الحالة يسمى التوزيع الاسي القياسي

اما بالنسب

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Designing activity based costing systems ABC for transport services and its role in improving the efficiency of pricing decisions: بحث تطبيقي في الشركة العامة لادارة النقل الخاص
...Show More Authors

  The research dealt with the design of the cost accounting system for the transport service and its Role in improving the efficiency of pricing decisions through the application of the cost system based on ABC activities. The main activities were defined and cost guides were to measure the cost of each service and to determine the cost of each service for the purpose of providing management with appropriate information and pricing decisions The problem of research in the lack of adoption by some public companies in the service sector on the cost accounting system to calculate the cost of service as well as the lack of identification of productive activities and service activities and therefore cannot make the appropriate decision t

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 20 2018
Journal Name
Offshore Technology Conference Asia
Prediction of Hydrate Phase Equilibrium Conditions for Different Gas Mixtures
...Show More Authors
Abstract<p>Gas hydrate formation poses a significant threat to the production, processing, and transportation of natural gas. Accurate predictions of gas hydrate equilibrium conditions are essential for designing the gas production systems at safe operating conditions and mitigating the problems caused by hydrates formation. A new hydrate correlation for predicting gas hydrate equilibrium conditions was obtained for different gas mixtures containing methane, nitrogen and carbon dioxide. The new correlation is proposed for a pressure range of 1.7-330 MPa, a temperature range of 273-320 K, and for gas mixtures with specific gravity range of 0.553 to 1. The nonlinear regression technique was applie</p> ... Show More
Scopus (6)
Scopus Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
On New Algebraic Systems
...Show More Authors

The purpose of this paper is to give some results theorems , propositions and corollaries concerning new algebraic systems flower , garden and farm with accustomed algebraic systems groupoid , group and ring.

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
A New Model Design for Combating COVID -19 Pandemic Based on SVM and CNN Approaches
...Show More Authors

       In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from      Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (3)
Scopus Crossref