Preferred Language
Articles
/
ijl-114
Generation of Weak Coherent Pulses for Quantum Cryptography Systems
...Show More Authors

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 20 2012
Journal Name
J. Of University Of Anbar For Pure Science
Laser Processing For Nanoscale Size Quantum Wires of AlGaAs/GaAs
...Show More Authors

In this work we investigate and calculate theoretically the variation in a number of optoelectronic properties of AlGaAs/GaAs quantum wire laser, with emphasis on the effect of wire radius on the confinement factor, density of states and gain factor have been calculated. It is found that there exist a critical wire radius (rc) under which the confinement of carriers are very weak. Whereas, above rc the confinement factor and hence the gain increase with increasing the wire radius.

Publication Date
Tue Nov 05 2019
Journal Name
Cardiff University
Technology development for nanoscale InSb quantum split-gate structures
...Show More Authors

Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery
...Show More Authors

     Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Nonlinear Optical Physics & Materials
SPECTRAL WIDTH VARIATION OF ULTRASHORT LASER PULSES IN MONOMODE OPTICAL FIBERS
...Show More Authors

Femtosecond laser pulse propagation in monomode optical fibers is demonstrated and investigated numerically (by simulations) and experimentally in this paper. A passively mode locked Nd:glass laser giving a pulse duration of about 200 fsec at 1053 nm wavelength and 120 mW average optical power with 100 MHz repetition rate is used in the experimental work. Numerical simulations are done by solving the nonlinear Schrödinger equation with the aid of Matlab program. The results show that self phase modulation (SPM) leads to compression of the spectral width from 5 nm to 2.1 nm after propagation of different optical powers (34, 43, 86 and 120 mW) in fibers of different length (5, 15, 35 m). The varying optical powers produced a varying

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Chemiluminescence Study of High Power Microwave Pulses Effects on Whole Blood
...Show More Authors

   Chemiluminescenc (CL), light emitted during chemical reaction, is one of the accurate methods used to detect directly oxygen free radicals. In this study, luminol was used as CL detector, to detect the concentration of free radicals formed in whole blood exposed to high power microwave pulses. The changes in the intensity of CL signal gives a clear relation between the concentration of free radicals formed by radiation in blood and changes in blood properties such as hemolysis of blood cells. This is done by measuring the electrical sytoplsimic electrical properties, the results are substituted in Maxwell-Wagner equation, to obtain electrical conductivity of cytoplasm, which is 18.3   ms/cm, while at suspension med

... Show More
View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Weak and Strong Forms of ω-Perfect Mappings
...Show More Authors

In this paper, we introduce weak and strong forms of ω-perfect mappings, namely the -ω-perfect, weakly -ω-perfect and strongly-ω-perfect mappings. Also, we investigate the fundamental properties of these mappings. Finally, we focused on studying the relationship between weakly -ω-perfect and strongly -ω-perfect mappings.

View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Strong and Weak Forms of μ-Kc-Spaces
...Show More Authors

In this paper, we provide some types of - -spaces, namely, - ( )- (respectively, - ( )- , - ( )- and - ( )-) spaces for minimal structure spaces which are denoted by ( -spaces). Some properties and examples are given.
The relationships between a number of types of - -spaces and the other existing types of weaker and stronger forms of -spaces are investigated. Finally, new types of open (respectively, closed) functions of -spaces are introduced and some of their properties are studied.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Pramana
The description of quantum dielectric function for insulators over Bethe surface
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Apr 06 2017
Journal Name
Global Journal Of Engineering Science And Researches 4(2348-8034):48-52
ON SEMI-STRONG (WEAK)CJ-TOPLOGICAL SPACES
...Show More Authors