Preferred Language
Articles
/
ehh9k5cBVTCNdQwCW5kF
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB84 detection setup. The second experiment represents an accurate method for estimating the value of µ because of using single photon detectors with high timing resolution and low dark counts, in addition to using a Time-to-digital convertor with a bin size of 81 ps.                                                                                   

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Investigating the Mastering of the Pronunciation of Weak and Strong Forms of English Function Words
...Show More Authors

    The weak and strong forms are so called because it is not their lexical content that primary matter, but the role they have in the sentence. The problematic confusion, our students encounter, in recognizing and producing the correct pronunciation of weak and strong forms of the English function words is the main incentive behind conducting  this study. In order to gather the data, this paper used two types of tests: a recognition test and a production test. The general results reached  through the analysis of the students' answers seem to conform to the researcher's assumption: students face a critical problem in recognizing and producing correct pronunciation of the weak and strong forms of the English funct

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 25 2021
Journal Name
Engineering And Technology Journal
The Effect of the Number of Key-Frames on the Facial Emotion Recognition Accuracy
...Show More Authors

Key-frame selection plays an important role in facial expression recognition systems. It helps in selecting the most representative frames that capture the different poses of the face. The effect of the number of selected keyframes has been studied in this paper to find its impact on the final accuracy of the emotion recognition system. Dynamic and static information is employed to select the most effective key-frames of the facial video with a short response time. Firstly, the absolute difference between the successive frames is used to reduce the number of frames and select the candidate ones which then contribute to the clustering process. The static-based information of the reduced sets of frames is then given to the fuzzy C-Means algor

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 27 2024
Journal Name
Caspian Journal Of Environmental Sciences,
Morphological study on the form and number of eyes in scorpions and spiders
...Show More Authors

Scorpions and spiders belong to the class Arachnida in phylum Arthropoda. Scorpions are easily distinguished by median eyes on obvious the center of the carapace and have one pair, and lateral eyes have 2-8 in some species. Scorpions do not have good eyesight so the median eyes have always been simple and they are more sensitive than the lateral pairs. They have anterior median eyes (AME) with narrow field of view and pairs of lateral eyes (LE) with more sensitivity and response to light. Family Buthidae have 2-6 lateral eyes in Compsobuthus Mesobuthus, Hottentotta, while Vaejovidae, Chactidae and Chaerilidae have 2 pairs of lateral eyes. In addition, 3 pairs are found in Orthochirus and Androctonus. Spiders have six eyes in family Pholicid

... Show More
View Publication
Publication Date
Mon Sep 12 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The influence of fear on the dynamic of an eco-epidemiological system with predator subject to the weak Allee effect and harvesting
...Show More Authors

In this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t

... Show More
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Whoever Abu Dawood said about him is weak in his Sunan
...Show More Authors

Abstract

The research was limited to those whom Imam Abu Dawood

described in his Sunan as weak, so this research does not include

narrators who carried descriptions indicating weakness such as

ignorance or others, nor does it include hadiths that the Imam

described as weak.

The number of narrators whom Imam Abu Dawood described as

weak has reached six narrators, and my methodology was to

mention the words of Imam Abu Dawood, then transfer the

sayings of other advanced scholars, as well as the sayings of

Imam Abu Dawood in his other books, if any, to show the extent

of compatibility between these sayings.

I have reached the following resul

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Evaluation of the Compton (Incoherent) and Rayleigh (Coherent) Differential Cross Sections of Scattering for Rhodium 103Rh45 and Tantalum181Ta73 by Employing CSC model
...Show More Authors

The differential cross section for the Rhodium and Tantalum has been calculated by using the Cross Section Calculations (CSC) in range of energy(1keV-1MeV) . This calculations based on the programming of the Klein-Nashina and Rayleigh Equations. Atomic form factors as well as the coherent functions in Fortran90 language Machine proved very fast an accurate results and the possibility of application of such model to obtain the total coefficient for any elements or compounds.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Journal Of Kufa For Mathematics And Computer
On Jeffery Prior Distribution in Modified Double Stage Shrinkage-Bayesian Estimator for Exponential Mean
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref