In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10°C.
Background: The aryl hydrocarbon receptor (AhR) is a ligand-activated transcription factor historically recognized for its role in the regulation of toxicity mediated by environmental chemicals. Recent research points to AhR's critical participation in male reproductive physiology, particularly in spermatogenesis, hormone signaling, and the maintenance of sperm quality. Both endogenous ligands (e.g., dietary and gut microbiota-derived metabolites) and exogenous pollutants (e.g., dioxins and benzo-α-pyrene) influence AhR-mediated pathways, making it a key link between environmental exposures and male fertility. Results: This review highlights AhR's influence on the male reproductive system, emphasizing the role of endogenous AhR ligands an
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno
In this paper, we investigate and study quantum theoretical of quark-gluon interaction modeling in QGP matter formatted. In theoretical modeling, we can use a flavor number, strength coupling, critical energy Tc = 190 MeV, system energy (400-650)MeV, fugacity of quark and gluon, and photon energy in range of 1-10 GeV parameter to calculation and investigation spectrum of photon rate. We calculation and study the photon rate produced through bremsstrahlung processes from the stable QGP matter. The photon rate production from cg → dgy systems at bremsstrahlung processes are found to be increased with increased fugacity, decreased strength coupling, decreased the photons energy and temperature of system. The photons rate in cg → dgy is inc
... Show MoreThe charge transfer at C23H17F8N8O2PRu, C44H30BF4N5O4Ru, C56H52CL5N5OOsP2 and C76H88F80N24O11P10Ru4 nitrosyl complexes are investigation and studies theoretically using the quantum consideration. Charge transfer behavior largely rely to the electric properties of nitrosyl complexes system whose depending on the main important parameters for the transmission rate constant such that: orientation transition energy, overlapping coupling coefficient, driving force energy, height barrier and Temperature T (K). Data results have been evaluated using a MATLAB program. Results show that rate of charge transfer increases due to increases the orientation transition energy.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis study aims to identify the impact of using the infrastructure of the Information Technology (IT) on the performance of human resources in the public universities. This process is done by doing research in the size, quality, and efficiency of the performance, also speed of achievement and simplification of procedures. Diyala University was chosen for the diagnosis through the opinions and attitudes of its employees. Consequently, suggestions that contribute to improve the performance of the employees and thus its overall performance are obtained. Another objective of this study is identifying the human resources which are currently used in academic institutions and educational services systems because the significant role of th
... Show MoreSports management is a fundamental pillar that supports sports institutions and plays a pivotal role in achieving advanced levels of success in talent development. The Talent Development Project is one of the key strategic initiatives of the Ministry of Youth and Sports. This study compares department heads with effective managerial competence to those with ineffective competence to highlight differences in performance quality. Through this comparison, the urgent need to assess the administrative performance skills of the heads of sports talent departments becomes evident, particularly their ability to lead and manage the Sports Talent Development Project. The objective is to identify strengths and weaknesses, establish a clear framework fo
... Show More