Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.
In this work, yttrium oxide particles (powder) reinforced AL-Si matrix composites (Y2O3/Al-Si) and Chromium oxide particles reinforced AL-Si matrix composites (Cr2O3/AL-Si) were prepared by direct squeeze casting. The volume percentages of yttrium oxide used are (4, 8.1, 12.1, 16.1 vol %) and the volume percentages of the chromium oxide particles used are (3.1, 6.3, 9.4, 12.5 vol. %). The parameters affecting the preparation of Y2O3/Al-Si and Cr2O3/AL-Si composites by direct squeeze casting process were studied. The molten Al-Si alloy with yttrium oxide particles or with chromium oxide particles was stirred again using an electrical stirrer at speed 500 rpm and the molten alloy was poured into the squeeze die cavity. Th
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThis paper studies the combination fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. It works by connecting the central core, comprising either shear walls or braced frames, to the outer perimeter columns.
The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model, and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximum lateral load at the top of the building is calculated, and this load w
... Show MoreDr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreIn this paper, we have derived Bayesian estimation for the parameters and reliability function of Perks distribution based on two different loss functions, Lindley’s approximation has been used to obtain those values. It is assumed that the parameter behaves as a random variable have a Gumbell Type P prior with non-informative is used. And after the derivation of mathematical formulas of those estimations, the simulation method was used for comparison depending on mean square error (MSE) values and integrated mean absolute percentage error (IMAPE) values respectively. Among of conclusion that have been reached, it is observed that, the LE-NR estimate introduced the best perform for estimating the parameter λ.
The experiences in the life are considered important for many fields, such as industry, medical and others. In literature, researchers are focused on flexible lifetime distribution.
In this paper, some Bayesian estimators for the unknown scale parameter of Inverse Rayleigh Distribution have been obtained, of different two loss functions, represented by Suggested and Generalized loss function based on Non-Informative prior using Jeffery's and informative prior represented by Exponential distribution. The performance of estimators is compared empirically with Maximum Likelihood estimator, Using Monte Carlo Simulation depending on the Mean Square Error (MSE). Generally, the preference of Bayesian method of Suggeste
... Show More