This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show Morethe electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
The revolution of technology in the 21st century has changed radically the
climate of opinion concerning second language education. In order to excel in
today’s world, teachers and learners need to adopt new roles and be equipped with
new skills and competencies that go beyond the basic ones of listening, speaking,
reading, and writing; skills that cannot be gained if teachers teach mere academic
subjects, and students are evaluated on how well they have learnt the minute sub
skills in those content areas.
This session will touch upon several skills which may be considered the
new basics of the 21st century. Among these skills are: autonomy, active learning,
critical thinking, cooperative learning, and digita
The research tagged (Digital Collage in Contemporary Art) consisted of four chapters. The first chapter was devoted to the methodological framework of the research. The problem ended with the following questions: How does digital collage represent contemporary art? What is the variable at the level of meaning shifts in composing works according to the digital collage? Was the digital collage a qualitative leap in the path of the aesthetic pattern in art? How does digital collage interfere with contemporary life and societies? It included the aim of the research and its importance, while the second chapter dealt with two topics, the first (reading in the concept of collage), and the second (digital collage). The third chapter was devoted
... Show MoreProduction logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations af
... Show MoreProduction logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations af
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.