Preferred Language
Articles
/
ijl-114
Generation of Weak Coherent Pulses for Quantum Cryptography Systems
...Show More Authors

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
Characteristics of Electrical Power Generation by Wind for Al-Tweitha Location Using Weibull Distribution Function
...Show More Authors

In this paper, the 5 minutes measured wind speed data for year 2012 at 10 meter height for Tweitha have been statically analyzed to assess the time of wind turbine electrical power generation. After collection Tweitha wind data and calculation of mean wind speed the cumulative Weibull diagram and probability density function was ploted, then each of cumulative Weibull distribution, cut-in and furling turbine wind speed could be used as a mathematical input parameters in order to estimate the hours of electrical power generation for wind turbine during one day or one year. In Tweitha site, found that the average wind speed was (v= 1.76 m/s), so five different wind turbines were be selected to calculate hours of electrical generation for A

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Degradation of Indigo Dye Using Quantum Mechanical Calculations
...Show More Authors

The semiempirical (PM3) and DFT quantum mechanical methods were used to investigate the theoretical degradation of Indigo dye. The chemical reactivity of the Indigo dye was evaluated by comparing the potential energy stability of the mean bonds. Seven transition states were suggested and studied to estimate the actually starting step of the degradation reaction. The bond length and bond angle calculations indicate that the best active site in the Indigo dye molecule is at C10=C11.  The most possible transition states are examined for all suggested paths of Indigo dye degradation predicated on zero-point energy and imaginary frequency. The first starting step of the reaction mechanism is proposed. The change in enthalpy, Gibbs free energ

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Oscillator Strength and Quantum Efficiency of Fluoranthene Molecule
...Show More Authors

The fluorescence and absorption spectra of Fluoranthene dissolved in
cyclohexane and ethanol were studied and analyzed. The effect of the
concentration of this molecule and the polarity of the solvents on the spectral
shifts and on relative intensity has been investigated. A computational program
was written in order to convert the spectra from grapher to data. Some
photophysical parameters such as oscillator strength and quantum efficiency have
been calculated. Fluorescence quantum efficiency of Fluoranthene was measured
relative to Quinine Sulfate (QS) in 1N H2SO4. The obtained values were (0.5) in
cyclohexane and (0.45) in ethanol

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Computer Generation of Low Light-Level Images
...Show More Authors

As result of exposure in low light-level are images with only a small number of
photons. Only the pixels in which arrive the photopulse have an intensity value
different from zero. This paper presents an easy and fast procedure for simulating
low light-level images by taking a standard well illuminated image as a reference.
The images so obtained are composed by a few illuminated pixels on a dark
background. When the number of illuminated pixels is less than 0.01% of the total
pixels number it is difficult to identify the original object.

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
GENERATION OF MPSK SIGNAL USING LOGIC CIRCUITS
...Show More Authors

The traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Analytical Studies on the Effectiveness of IoMT for Healthcare Systems
...Show More Authors

     The Internet of Things (IoT) has great importance in the medical industry. The creation of intelligent sensors, intelligent machines, and superior algorithms for lightweight communication made it feasible to connect medical equipment in order to monitor biomedical signals and also to detect illnesses in patients without human intervention. This new IoT and medical equipment connection is called IoMT. This IoMT model is most adapted to this pandemic since every human being has to be interconnected and monitored via a larger communication network. Hence, this article provides an overview of remote healthcare systems, monitoring ingestible sensors, mobile health, smart hospitals, and improved chronic disease management focused on t

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
The Astrophysical Journal
MATTER IN THE BEAM: WEAK LENSING, SUBSTRUCTURES, AND THE TEMPERATURE OF DARK MATTER
...Show More Authors
ABSTRACT<p>Warm dark matter (WDM) models offer an attractive alternative to the current cold dark matter (CDM) cosmological model. We present a novel method to differentiate between WDM and CDM cosmologies, namely, using weak lensing; this provides a unique probe as it is sensitive to all of the “matter in the beam,” not just dark matter haloes and the galaxies that reside in them, but also the diffuse material between haloes. We compare the weak lensing maps of CDM clusters to those in a WDM model corresponding to a thermally produced 0.5 keV dark matter particle. Our analysis clearly shows that the weak lensing magnification, convergence, and shear distributions can be used to distinguish</p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Weak Forms of Soft (1, 2)*-Omega Open Sets in Soft Bitopological Spaces
...Show More Authors

 In this paper, we introduce  and  study  new  classes of soft  open  sets  in soft bitopological spaces called soft  (1,2)*-omega  open  sets  and  weak forms of soft (1,2)*-omega open sets such as soft  (1,2)*-α-ω-open sets, soft  (1,2)*-pre-ω-opensets, soft  (1,2)*-b-ω-open sets,  and  soft  (1,2)*-β-ω-open  sets. Moreover; some basic properties and the relation among these concepts and other concepts also have been studied.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Simulation and Experimental Walking Pattern Generation for Two Types of Degrees of Freedom Bipedal Locomotion Robot
...Show More Authors

Humanoids or bipedal robots are other kinds of robots that have legs. The balance of humanoids is the general problem in these types when the other in the support phase and the leg in the swing phase. In this work, the walking pattern generation is studied by MATLAB for two types of degrees of freedom, 10 and 17 degrees of freedom. Besides, the KHR-2HV simulation model is used to simulate the experimental results by Webots. Similarly, Arduino and LOBOT LSC microcontrollers are used to program the bipedal robot. After the several methods for programming the bipedal robot by Arduino microcontroller, LOBOT LSC-32 driver model is the better than PCA 96685 Driver-16 channel servo driver for programming the bipedal walking rob

... Show More
View Publication Preview PDF
Crossref (1)
Crossref