Preferred Language
Articles
/
JRbW5okBVTCNdQwCk445
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Modern Physics E
The ground state properties of some exotic nuclei studied by the two-body model
...Show More Authors

The ground state properties including the density distributions of the neutrons, protons and matter as well as the corresponding root mean square (rms) radii of proton-rich halo candidates 8B, 12N, 23Al and 27P have been studied by the single particle Bear– Hodgson (BH) wave functions with the two-body model of (core+p). It is found that the rms radii of these proton-rich nuclei are reproduced well by this model and the radial wave functions describe the long tail of the proton and matter density distributions. These results indicate that this model achieves a suitable description of the possible halo structure. The plane wave Born approximation (PWBA) has been used to compute the elastic charge form factors.

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Taking Over The Judiciary By Women And The Position Of Law From That: مثالا
...Show More Authors

لمقدمة

     الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى  واصحابه أجمعين  ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :

        فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Shortcomings mentioned by the Torah about the prophet Lot in the prophecies and the respond of Quran
...Show More Authors

Praise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 13 2026
Journal Name
Iraqi Journal Of Biotechnology
DETECTION OF GENE EXPRESSION OF SERINE PALMITOYLTRANSFERASE (SPT2) IN MOUSE CELL LINE RAW264.7 INFECTED WITH LEISHMANIA MEXICANA AMASTIGOTES
...Show More Authors

Leishmania species are the causative agent of a tropical disease known as leishmaniasis. Previous studies on the old world species Leishmania major, showed that the amastigotes form which resides inside the macrophage of the vertebrate host, utilize host’s sphingolipids for survival and proliferation. In this study, gene expression of serine palmitoyltransferase (SPT) subunit two (MmLCB2) of the mouse macrophage cell line (RAW264.7), which is the first enzyme in the de novo sphingolipid biosynthesis, was detected in both infected and non-infected macrophages. This was detected under condition where available sphingolipid was reduced, with the new world species Leishmania mexicana. Results of qPCR analysis showed that there was no differen

... Show More
View Publication Preview PDF
Publication Date
Fri May 23 2025
Journal Name
Reproductive Health Of Woman
Molecular detection of Rubella virus (1E genotype) in clinical sample of pregnant women, and it’s related to abortion
...Show More Authors

Pregnant women who have rubella may potentially pass the infection on to their unborn offspring. A congenital rubella infection can result in a miscarriage, stillbirth, and congenital rubella syndrome. The only member of the Togaviridae family’s Rubivirus genus, the Rubella virus (RV) is a positive-polarity, single-stranded RNA virus genome surrounded by a lipoprotein envelope with spike-like, hemagglutinin-containing surface projections.The objective: to determine the Rubella virus (1E genotype) in pregnant woman and its relation to spontaneous miscarriage.Materials and methods. A total of 174 women which visited Al-Elweya Teaching Hospital, Baghdad, Iraq, were screened according to the following criteria: women with a history of

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Carbohydrate Antigen CA19-9 Levels in Sera and Tissues' Homogenate of Breast and Thyroid Benign Cases
...Show More Authors

         The aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Functionalized multi-walled carbon nanotubes network sensor for NO2 gas detection at room temperature
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref