Preferred Language
Articles
/
ehh9k5cBVTCNdQwCW5kF
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB84 detection setup. The second experiment represents an accurate method for estimating the value of µ because of using single photon detectors with high timing resolution and low dark counts, in addition to using a Time-to-digital convertor with a bin size of 81 ps.                                                                                   

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 12 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The influence of fear on the dynamic of an eco-epidemiological system with predator subject to the weak Allee effect and harvesting
...Show More Authors

In this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t

... Show More
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 28 2019
Journal Name
International Journal Of Simulation: Systems, Science & Technology
On the Estimation of Nonparametric Copula Density Functions
...Show More Authors

In this research, we present a nonparametric approach for the estimation of a copula density using different kernel density methods. Different functions were used: Gaussian, Gumbel, Clayton, and Frank copula, and through various simulation experiments we generated the standard bivariate normal distribution at samples sizes (50, 100, 250 and 500), in both high and low dependency. Different kernel methods were used to estimate the probability density function of the copula with marginal of this bivariate distribution: Mirror – Reflection (MR), Beta Kernel (BK) and transformation kernel (KD) method, then a comparison was carried out between the three methods with all the experiments using the integrated mean squared error. Furthermore, some

... Show More
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Whoever Abu Dawood said about him is weak in his Sunan
...Show More Authors

Abstract

The research was limited to those whom Imam Abu Dawood

described in his Sunan as weak, so this research does not include

narrators who carried descriptions indicating weakness such as

ignorance or others, nor does it include hadiths that the Imam

described as weak.

The number of narrators whom Imam Abu Dawood described as

weak has reached six narrators, and my methodology was to

mention the words of Imam Abu Dawood, then transfer the

sayings of other advanced scholars, as well as the sayings of

Imam Abu Dawood in his other books, if any, to show the extent

of compatibility between these sayings.

I have reached the following resul

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Transference Number Measurement of Zinc Salts in Aqueous Solution
...Show More Authors

Transference numbers of the aqueous zinc chloride and zinc sulphate solutions have been measured for the concentrations 0.03, 0.05, 0.07, 0.09 and 0.1 mol.dm-3at 298.15K, by using the modified Hittorf method. The dependence of transference number on concentration of each electrolyte was also investigated in an attempt to explain the value of the limiting transference number. The Longsworth method has been used for the extrapolation of zinc transference number in aqueous solutions, using the values of the limiting transference numbers of the appropriate values of the limiting equivalent conductance, it was possible to determine the corresponding values of the limiting ion conductance for the cations and anions of the electrolytes. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Jun 14 2005
Journal Name
Iraqi Journal Of Laser
Bending Effect on the Single Mode Optical Fibers
...Show More Authors

Bending effects on the transmission of optical signal are investigated on a single mode
optical fiber (SMOF) of 10 m length, core radius of 5 μm and optical refractive index difference
0.003. The bending radii (R) were between 0.08 and 0.0015 m. A great decrease in the amplitude is
shown for radii below 0.01 m. Sudden break down occurs for radii less than 0.0015 m. Birefringence
(B) is difficult to measure for long fibers. Meanwhile, B was found by comparing with calibrated
fiber of the same properties but of length of 0.075 m. The results show an increase in propagation
constant (Δβ) and the decrease in beat length (Lb), and show that bending decreases the critical radius
of curvature (Rc) related to B. The chang

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 04 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Employ shrinkage technique during estimate normal distribution mean
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Improvement of Gasoline Octane Number by Using Organic Compounds
...Show More Authors

The toxic lead additives to gasoline are no longer used in many countries around the world. Many other countries are now phasing out the lead in gasoline. Although the lead fuel is still in use in Iraq, several plans are considered to phase out the lead. The use of organic compounds to replace the lead additives in gasoline is considered now as an option in Iraqi refineries. The main objective of this project was preparation of premium gasoline, by blending of gasoline with Alternative additives (alcohol, aromatic) to enhancing octane number of Al-Doura gasoline pool. Improved gasoline was tested by ASTM standard method which includes octane number measuring by CFR engine analyzer. Gasoline pool RON (80) was used and selective components

... Show More
View Publication Preview PDF
Crossref