In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 protocol based on polarizing encoding with consideration of the optical fiber and free-space quantum channel imperfections and losses by estimating the quantum bit error rate and final secure key. This work shows a general repeatable modeling process for significant performance evaluation. The most remarkable result that emerged from the simulated data generated and detected is that the modeling process provides guidance for optical quantum channels design and characterization for other quantum key distribution protocols.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreMagneto-rheological (MR) Valve is one of the devices generally used to control the speed of Hydraulic actuator using MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. The finite element analysis is carried out on this valve to optimize its design. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMM). The Model dimensions of MR valve, material properties and the circuit properties of valve coil are taken into account. The results of analysis are presented in terms of magnetic strength and magnetic flux density. The valve can be operated with variable flow rate by varying the current. It i
... Show More|
One of the most powerful tools for any stellar dynamics is the N-body simulation. In an N-body simulation the motion of N particles is followed under their mutual gravitational attraction. In this paper the gravitational N-body simulation is described to investigate Newtonian and non- Newtonian (modified Newtonian dynamics) interaction between the stars of spiral galaxies. It is shown that standard Newtonian interaction requires dark matter to produce the flat rotational curves of the systems under consideration, while modified Newtonian dynamics (MOND) theorem provides a flat rotational curve and gives a good agreement with the observed rotation cu |
In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can
The research aims to reveal the methods of visual intertextuality used in the websites of the oriented satellite channel which is Arabic-speaking when addressing normalization with Israel. It also indicates the sources and types of intertextual images, the methodological and semiotic mechanisms for analyzing the intertextuality of news images used on the website of Alhurra satellite channel for the period from 1/6 - 30/8/2022, which included (94) images. The researcher analyzed (37) images with intertextual dimensions, excluding (57) images, which did not carry connotations connected with the inputs and objectives of the research.
The research reach
... Show MoreLow oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).
This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p
... Show MoreThis work explores the advancement and potential of solar‐powered humidification–dehumidification (HDH) desalination systems, addressing the critical challenge of global water scarcity. Emphasizing solar‐powered humidifiers in HDH systems presents an innovative solution per the urgent demand for sustainable freshwater sources utilizing abundant energy resources. This work reviews various humidifier designs, pointing out their crucial role in the efficiency and yield of HDH desalination units and their operational, maintenance, and scaling issues. Key factors, such as design effectiveness, water‐vapor capacity, and material selection, are assessed to understand their impact on the system's ove
AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show More