Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.
This study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals
Intellectual and material displacement is one of the design strategies through many mechanisms and means, and depends on the idea of changing the shape within the internal spaces at times and has concepts related to the transformation at other times. And represented by the boxes for travelers, the research problem emerged through the following question: (What is the effectiveness of displacement in the formal structures in the interior design of historical sites), and the aim of the study is to reveal the reality of the use of historical internal spaces and to determine the formal displacement that occurs as a result of change and transformation, and it included two topics, the first topic Transformation and the effectiveness of formal d
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreThe objective of this paper was to study the laser spot welding process of low carbon steel sheet. The investigations were based on analytical and finite element analyses. The analytical analysis was focused on a consistent set of equations representing interaction of the laser beam with materials. The numerical analysis based on 3-D finite element analysis of heat flow during laser spot welding taken into account the temperature dependence of the physical properties and latent heat of transformations using ANSYS code V.10.0 to simulate the laser welding process. The effect of laser operating parameters on the results of the temperature profile were studied in addition to the effect on thermal stresses and dimensions of the laser w
... Show MoreThe goal (purpose) from using development technology that require mathematical procedure related with high Quality & sufficiency of solving complex problem called Dynamic Programming with in recursive method (forward & backward) through finding series of associated decisions for reliability function of Pareto distribution estimator by using two approach Maximum likelihood & moment .to conclude optimal policy
Al-Yusifia river was assessed at three sampling stations with study period from Autumn 2010 to the end of Summer 2011. The present investigation was carried out on diversity of fungi and bacteria from Al-Yusifia river, Baghdad city. During the study, a total of 12 fungal genus and 6 bacterial genus were isolated during the year seasons. The dominant fungus at the three stations were Penicillium sp., then Rhizopus and Trichophyton megninii while the dominant bacteria was Escherichia coli and Klebsiella sp.
The higher
... Show MoreThe aim of this research is to explore the time and space distribution of traffic volume demand and investigate its vehicle compositions. The four selected links presented the activity of transportation facilities and different congestion points according to directions. The study area belongs to Al-Rusafa sector in Baghdad city that exhibited higher rate of traffic congestions of working days at peak morning and evening periods due to the different mixed land uses. The obtained results showed that Link (1) from Medical city intersection to Sarafiya intersection, demonstrated the highest traffic volume in both peak time periods morning AM and afternoon PM where the demand exceeds the capacity along the link corridor. Also, higher values f
... Show MoreL'œuvre de fiction la plus ancienne qui nous soit restée, est aussi bien la première jamais écrite. L'épopée de Gilgamesh a été composée à l'aube de la civilisation mésopotamienne. Gilgamesh était le cinquième souverain après le déluge.
Sous son règne, trois millénaires environ avant Jésus-Christ, les Urukiens s’emparèrent des cités voisines, et formèrent ainsi ce que nous appellerions une petite nation. Pendant plus de deux mille ans, les civilisations du Proche-Orient ont fait de Gilgamesh leur héros épique. Il existe des
... Show MoreFree vibration behavior was developed under the ratio of critical buckling temperature of laminated composite thin plates with the general elastic boundary condition. The equations of motion were found based on classical laminated plate theory (CLPT) while the solution functions consists of trigonometric function and a continuous function that is added to guarantee the sufficient smoother of the so-named remaining displacement function at the boundaries, in this research, a modified Fourier series were used, a generalized procedure solution was developed using Ritz method combined with the imaginary spring technique. The influences of many design parameters such as angles of layers, aspect ratio, thickness ratio, and ratio of initial in-
... Show More