Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Mon May 01 2023
Journal Name
Petroleum Research
Investigating tight oil reservoir production performance: Influence of geomechanical parameters and their distribution
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 12 2026
Journal Name
Infrastructures
Behaviour of Shear Stress Distribution in Steel Sections Under Static and Dynamic Loads
...Show More Authors

Shear lag is the phenomenon that occurs when a supported slender member undergoes deformation from lateral loading, causing in-plane non-uniform distribution of stresses that results in reducing the member’s minimum strength capacity. This paper investigates the behaviour of shear distribution in steel I-section and box girders when subjected to both static and impact loadings. Three-dimensional finite element analysis models were prepared in Strand7 and validated against experimental results providing a basis for further comparison research into shear lagging effects. A parametric study was conducted comparing the effects of impact loading through certain specified velocities at the midspan of restrained ends. It provided new ins

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of College Of Education
Some of the Probability Characteristics Functions of the Solution of a System of Random Linear Inequalities
...Show More Authors

Publication Date
Fri Oct 22 2021
Journal Name
Journal Of Petroleum Exploration And Production Technology
4D Finite element modeling of stress distribution in depleted reservoir of south Iraq oilfield
...Show More Authors
Abstract<p>The harvest of hydrocarbon from the depleted reservoir is crucial during field development. Therefore, drilling operations in the depleted reservoir faced several problems like partial and total lost circulation. Continuing production without an active water drive or water injection to support reservoir pressure will decrease the pore and fracture pressure. Moreover, this depletion will affect the distribution of stress and change the mud weight window. This study focused on vertical stress, maximum and minimum horizontal stress redistributions in the depleted reservoirs due to decreases in pore pressure and, consequently, the effect on the mud weight window. 1D and 4D robust geomechanical models are</p> ... Show More
View Publication
Scopus (16)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Journal Of Petroleum Research And Studies
Distribution of Petrophysical Properties Based on Conceptual Facies Model, Mishrif Reservoir/South of Iraq
...Show More Authors

A 3D geological model is an essential step to reveal reservoir heterogeneity and reservoir properties distribution. In the present study, a three-dimensional geological model for the Mishrif reservoir was built based on data obtained from seven wells and core data. The methodology includes building a 3D grid and populating it with petrophysical properties such as (facies, porosity, water saturation, and net to gross ratio). The structural model was built based on a base contour map obtained from 2D seismic interpretation along with well tops from seven wells. A simple grid method was used to build the structural framework with 234x278x91 grid cells in the X, Y, and Z directions, respectively, with lengths equal to 150 meters. The to

... Show More
View Publication
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
The Extent of Homogeneity in the Distribution of Petrophysical Properties that Affecting the Primary and Enhanced Oil Recoveries of Reservoir Rocks in Zubair Formation of South Iraq
...Show More Authors

Records of two regionalized variables were processed for each of porosity and permeability of reservoir rocks in Zubair Formation (Zb-109) south Iraq as an indication of the most important reservoir property which is the homogeneity,considering their important results in criterion most needed for primary and enhanced oil reservoirs.The results of dispersion treatment,the statistical incorporeal indications,boxes plots,rhombus style and tangents angles of intersected circles indicated by confidence interval of porosity and permeability data, have shown that the reservoir rocks of Zubair units (LS),(1L) and (DJ) have reservoir properties of high quality,in contrast to that of Zubair units (MS) and (AB)which have reservoir properties of less q

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems
...Show More Authors

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Swarm And Evolutionary Computation
Improving the performance of evolutionary multi-objective co-clustering models for community detection in complex social networks
...Show More Authors

Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref