Preferred Language
Articles
/
ZBYf6okBVTCNdQwCyY5M
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Control Program for Hydropower Operation Based on Minimizing the Principal Stress Values on the Dam Body: Mosul Dam Case Study
...Show More Authors

This study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 06 2025
Journal Name
Aip Conference Proceedings
Enhance the performance of the wind turbine blade based on the blade element momentum theory
...Show More Authors

In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Advances In Science And Technology Research Journal
Experimental Investigation and Fuzzy Based Prediction of Titanium Alloy Performance During Drilling Process
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Composites Science
Sawdust-Based Concrete Composite-Filled Steel Tube Beams: An Experimental and Analytical Investigation
...Show More Authors

Incorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co

... Show More
View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Rock facies classification and its effect on the estimation of original oil in place based on petrophysical properties data
...Show More Authors

The most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
The Effects of Conductance on Metastable Switches in Memristive Devices Based on Anti-Hebbian and Hebbian (AHaH) Learning Rules
...Show More Authors

     In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF