Preferred Language
Articles
/
ijl-119
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10°C.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The relationship between the dimensions of the strategic recovery and achieving the company's strategic goals: Applied research in the National Insurance Company
...Show More Authors

The aim of the research is to explain the nature of the relationship between the dimensions of the strategic recovery of the service represented by (compensation, speed of response, apology, initiative (defining the problem) and the strategic goals of the company represented in (profitability, growth, community service, employee satisfaction) in the National Insurance Company, it has been approved The questionnaire as a tool to collect data and information from the sample of (58) who are in (department manager, M. department director, division official, unit official) and the statistical program (spss) was used in calculating (arithmetic mean, standard deviation, coefficient of variation, coefficient of Correlation, t-test, varia

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أستخدام الضريبة البيئية للحد من الملوثات الناجمة عن عوادم السيارات: أنموذج مقترح للضريبة البيئية في العراق
...Show More Authors

 The researcher tried to show the importance of using environmental taxes as an effective economic factor for reducing contaminators resulting from cars exhausts, and presenting a suggested pattern for  environmental taxes as a nucleus and a starting point for a wider implementing of environmental taxes in Iraq.                                                                      &nbs

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
مجلة كلية التربية للبنات / الجامعة العراقية
مسائل مختارة من ترجيحات الإمام البزازي في الحدود والجنايات من كتاب الفتاوى البزازية / دراسة فقهية مقارنة
...Show More Authors

تضمن البحث التعريف بالإمام البزازي، وحياته العلمية، ومشايخه، وتلامذته، ومؤلفاته، ووفاته، وأربعة مسائل مختارة من ترجيحاته في الحدود والجنايات، والإمام محمد بن محمد بن شهاب بن يوسف (ت827هـ)، يُكنَّى بالكَردَرِيِّ الحنفي الخوارزمي الشهير بالبزَّازي، ويُنسب إلى كَرْدَر، وقد عرض في كتابه كثيرًا من كتب الحنفية، وذكر الكثير من آراء علمائهم مع تعرضه لبعض آراء المذاهب الأخرى. ولم يعتمد على التعريفات اللغوية والاصط

... Show More
View Publication
Publication Date
Sat May 04 2019
Journal Name
Journal Of Physical Education
تأثير استخدام تمرينات خاصة وفقا لنموذج كولب(النط التكيفي) في تعلم مهارة الطبطبة بكرة اليد للطالبات
...Show More Authors

تعتبر لعبة كرة اليد من الالعاب الفرقية، وان هذه اللعبة تستند الى قاعدة اساسية وهي الاداء الصحيح للمهارات، وللتقدم في هذه اللعبة يجب تعلم وأتقان اداء المهارات للوصول الى مستوى افضل للتعلم، من خلال الدور الذي يؤديه اسلوب نموذج كولب لأنماط التعلم (التكيفي) الذي يعمل على تحديد اسلوب التفكير والمفضل لكل فرد وتاثيره في تعلم مهارة الطبطبة للطالبات، اذ يعمل على ايصال المعلومات والافكار الخاصة باداء المهارة وحس

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
مجلة علوم اللغة العربية
وعي الدم وسبر القاع المكاني : مقاربة نقدية سردية في رواية (نساء البخور ) للروائي السعودية خالد اليوسف
...Show More Authors

دراسة في رواية سعودية

View Publication
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Financial technology as one of the recovery strategies of the Iraqi banking sector in the post-Covid-19 stage: An exploratory study
...Show More Authors

The research aims to employ one of the most important strategies for recovery from the crisis of the Covid-19 pandemic, which ravaged the economies of the entire world and its various sectors, including the banking sector, through financial technology that is based on digital transformation to achieve financial sustainability and the creation of innovative financial value chains in light of the decline in the banking sector as a result of The negative effects of the Covid-19 pandemic, be guided by the relevant international accounting standards to control the risks associated with financial technology. To recover from the Covid-19 crisis, the research came out with a set of recommendations, most notably financial technology from

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Investigating Difficulties Faced by Iraqi EFL Learners in Identifying the Illocutionary Force of the Reduplicative Words
...Show More Authors

A reduplicative word is an important phenomenon in all language studies because it reflects many functions in language communication such as plurality, emphasis, contrast, imitation.  The various instances of reduplicative words in a particular language reflect the richness and uniqueness of that language. Moreover, such variation gives insights into both culture and thought. A reduplicative word is a linguistic phenomenon found in the syntactic, morphological, phonological and semantic levels. The current study aims at investigating the illocutionary force of English reduplicative words in some selected English colloquial utterances. To achieve this aim, an analytical -pragmatic approach has been used by adopting Searle’s (1979)

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
مجلة العلوم القانونية
جزاء الاخلال بالوعد بالتعاقد في ضوء تعديل القانون المدني الفرنسي بموجب المرسوم رقم 131 لسنة 2016
...Show More Authors

يتناول البحث جزاء الاخلال بالوعد بالتعاقد في ضوء تعديل القانون المدني الفرنسي بموجب المرسوم رقم 131 لسنة 2016

Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication