Preferred Language
Articles
/
ixaG64kBVTCNdQwCHY6z
Modeling and Simulation for Performance Evaluation of Optical Quantum Channels in Quantum key Distribution Systems
...Show More Authors

In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 protocol based on polarizing encoding with consideration of the optical fiber and free-space quantum channel imperfections and losses by estimating the quantum bit error rate and final secure key. This work shows a general repeatable modeling process for significant performance evaluation. The most remarkable result that emerged from the simulated data generated and detected is that the modeling process provides guidance for optical quantum channels design and characterization for other quantum key distribution protocols.

Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi Geological Journal
Reservoir modeling for mishrif formation in Nasiriyah oilfield
...Show More Authors

Scopus (6)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
A Comparative Evaluation of Gutta-Percha and Sealer Removal of Rotary Niti File Retreatment Systems
...Show More Authors

Forty lower premolars with single root canals prepared with ProtaperNext files to size 25, and obturated with GP/sealer using lateral compaction. Teeth divided randomly into four groups (group n=10). Protaper universal retreatment kit (PUR), D-Race desobturation files (DRD), R-Endo retreatment kit (RE) and Hedstrom (H) files (control) were used to remove GP/sealer in each group. Removal effectiveness assessed by measuring the GP /sealer remnants in the roots after sectioning them into two halves. Stereomicroscope with a digital camera used to capture digital images. Images processed by ImageJ software to measure the percentage of GP/sealer remnants surface area in total, coronal, middle and apical areas of the canal. In the coronal area,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
A Comparative Evaluation of Gutta-Percha and Sealer Removal of Rotary Niti File Retreatment Systems
...Show More Authors

Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Evaluation of the optical properties for thick films of epoxy-diamond paste blend prepared by the casting method
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Geofluids
Performance Evaluation of Polyethersulfone Membranes for Competitive Removal of Cd2+, Co2+, and Pb2+ Ions from Simulated Groundwater
...Show More Authors

This paper presents studying the performance of three types of polyethersulfone (PES) membrane for the simultaneous removal of Co2+ ions, Cd2+ ions, and Pb2+ ions from binary and ternary aqueous solutions. Co2+ ions, Cd2+ ions, and Pb2+ ions with two different initial concentrations (e.g., 10 and 50 ppm) were selected as examples of heavy metals that contaminate the groundwater as a result of geological and human activities. This study investigated the effect of types of PES membrane and metal ions concentration on the separation process. For the binary aqueous solutions, the permeation flux of the PES2 membranes was higher for the separation process of solutions containing 50 ppm of Cd2+ ions and 10 ppm of Co2+ ions (24.7 L

... Show More
View Publication
Scopus (20)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
2nd International Conference On Engineering & Science
Comparative on-grid solar systems winter performance analyses of different PV technologies in Baghdad weather
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Feb 20 2022
Journal Name
Egyptian Journal Of Chemistry
Simulation of the remediation of groundwater contaminated with ciprofloxacin using grafted concrete demolition wastes by ATPES as reactive material: Batch and modeling study
...Show More Authors

Scopus (17)
Scopus Clarivate Crossref