In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
The present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreThe inhibitory behavior of L-Cysteine (Cys) and its derivatives towards iron corrosion through density functional theory (DFT) was investigated. The current research study undertakes a rigorous evaluation of global as well as local reactivity descriptors of the Cys in protonated as well as neutral forms and the changes in reactivity after the combination of Cys into di- and tripeptides. The inhibitory effect of di- and tri-peptides increases since, in the molecular structure, the number of reaction centers increase. We computed the adsorption energies (Eads) and low energy complexes with most stability for the adsorption of small peptides and Cys amino acids onto the surfaces of Fe (1 1 1). We found that the adsorption of tri-peptides onto
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe research explored the impact of applying lean thinking With all that carries this term of goals, trends, principles, foundations and concepts, The possibility of applying it in institutions, including Ur public company, an industrial company, And the only one in Iraq specialized in the manufacture of cables, Electrical Wires and the aluminum industry ,Which has been applied to the curriculum of lean thinking , The problem of research is that the institutions, including the company (research sample), adopt and practice traditional administrative, financial and technical methods without relying on modern curricula and ideas, including the subject of our research, In order to achieve the research objectives, the research was divided int
... Show MoreThe researcher highlighted the general budget in Iraq for the period (2003-2018) facing the challenges of administrative and financial corruption, in addition to the fluctuations in oil prices, the repercussions and many problems suffered and will suffer the Iraqi government in the process of preparing the general budget of the state and weak contribution of the agricultural and industrial sectors and other economic sectors and neglect altogether, oil has become the main supplier in funding Iraq's budget after 2003, and the impact on the unemployment rates in Iraq, which recorded fluctuating rates and then increased during the period (2012-2018) to achieve this, an inductive method was adopted, using theoretical and descriptive a
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreSome types of the fungus Aspergillus were isolated from some hospitals in the city of Baghdad (Imam Ali Hospital and Sadr General Hospital). The samples were taken by Transport media at a rate of three replicates of each place isolated from samples from different places within the hospital (waste, baths, the sick beds, corridors and room floors) for the purpose of isolating and diagnosing the fungus on the Czapeck Dox Agar media. It was noticed that the spread rate of fungus Aspergillus was 70% compared to other species that have emerged during the isolation process of the Sabouraud's Dextrose Agar media. The species A.niger (56.25%) was considered the most common type of fungus visible during the isolation process of the Imam Ali Hospit
... Show MoreThe research Aim is to provide support to small enterprises by providing tools that enable measurement and test their performance and identifying weaknesses and work on them is determined by the problem of searching using traditional assessment methods for small projects with only financial performance measurement standards that do not provide a complete picture of the performance of these projects so use the balanced scorecard the four pillars (financial, customer, learning and growth, and internal processes) and identify deviations and work on them through the use of the outputs of the programme (probe), PROmoting Business Excellence-PROBE), which It is a model of performance evaluation, with which you can deve
... Show MoreFree Piston Engine Linear Generator (FPELG) is a modern engine and promising power generation engine. It has many advantages compared to conventional engines such as less friction, few numbers of parts, and high thermal efficiency. The cycle-to-cycle variation one of the big challenges of the FPELG because it is influence on the stability and output power of the engine. Therefore, in this study, the effect of ignition time on combustion characteristics is investigated. The single-cylinder FPELG with spark ignition (SI) combustion type by using compressed natural gas (CNG) fuel type was set to run. LabVIEW is used to run the engine and control of input parameters. All experimental data