Preferred Language
Articles
/
ijl-390
Numerical Simulation of Metasurface Grating to Function as Polarization Modulator in Quantum Key Distribution Systems
...Show More Authors

Polarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarizer is designed by COMSOL Multiphysics Software to operate in the visible region and transmit the transverse magnetic polarization of light. The same structure can be rotated by different angles, i.e., 90o, 45o, and -45o to mimic the function of polarization modulation in quantum key distribution systems. The designed structure has an extinction ratio of ~ 60000 and a wide angular tolerance range of (-20o - 20o).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
High performance work systems and general industrial enterprise performance
...Show More Authors

High performance work systems and general industrial enterprise performance

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Channel Estimation and Prediction Based Adaptive Wireless Communication Systems
...Show More Authors

Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath  propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.

In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Block-Iterative Frequency-Domain Equalizations for SC-IDMA Systems
...Show More Authors

In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
25th Gis Research Uk Conference
VGI data collection for supplementing official land administration systems
...Show More Authors

This article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.

Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Arpn Journal Of Engineering And Applied Sciences
Numerical and experimental analysis of transient temperature and residual thermal stresses in friction stir welding of aluminum alloy 7020-T53
...Show More Authors

Scopus (2)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Renewable Materials
Boosting Structural and Dielectric Properties of Polyvinyl Alcohol/Starch/Carboxymethyl Cellulose Films with Iron-Doped Carbon Quantum Dots for Advanced Applications
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Comparing Study of The Stability and spectral properties vibrations for some Tellurium (IV) compounds containing cycloctadienyl group by Quantum Mechanical Calculations
...Show More Authors

Density Functional Theory (DFT) with B3LYP hybrid exchange-correlation functional and 3-21G basis set and semi-empirical methods (PM3) were used to calculate the energies (total energy, binding energy (Eb), molecular orbital energy (EHOMO-ELUMO), heat of formation (?Hf)) and vibrational spectra for some Tellurium (IV) compounds containing cycloctadienyl group which can use as ligands with some transition metals or essential metals of periodic table at optimized geometrical structures.

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Microbial Biosystems
Distribution of cytotoxic necrotizing factor type 1 in clinical isolates of Escherichia coli isolated from urinary tract infections in Iraq
...Show More Authors

Uropathogenic Escherichia coli is the main cause of urinary tract infections, the ability of this bacteria to cause urinary tract infections is related to a variety of virulence factors that enhance colonization and evade the immune response, one of these virulence factors is cytotoxic necrotizing factor 1 toxin which converts the glutamine residue to glutamic acid to activated GTPase Rho family. The study was meant to find out the prevalence rate of the cnf1 gene in Uropathogenic Escherichia coli isolated from Iraqi patients. Conventional laboratory methods were used for primary bacterial identification and molecular methods were used to confirm bacterial identity and gene detection. Escherichia coli was identified in 89/165 (53.93%) of th

... Show More
View Publication
Scopus (2)
Scopus Crossref