Preferred Language
Articles
/
fBiIk5cBVTCNdQwCK5lS
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rate can reach 0.0239 (bits/pulse) with a quantum bit error rate (QBER) of 3.2% for the free space channel and 1.5% for the simulated sea-water channel. The security parameters for each value of the mean photon number closely align with the corresponding theoretical predictions. However, some discrepancies were observed, primarily due to a mismatch in photon detection efficiency for SPDMs and system fluctuations. The theoretical calculations also predict that using coincidence detection, the key can be distributed over distances of up to 195 km.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Performance quality of single and ?two stage solar concentrators
...Show More Authors

The performance of single and two stage solar concentrator were studied ' " The ratio of the primary to the secondary mirrors diameter is taking to be 0.5, depending on the theoretical calculation for the accumulated energy by the concentrator with ratio between 0.0 to 0.9. The design of the systems were designed and examined by using a ray-tracing program. The efficiency of the single and the two stage concentrators are calculated and compared with and without cooling systems.

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
On Primary Multipliction Modules
...Show More Authors

Let R be a commutative ring with identity and M be a unitary R- module. We shall say that M is a primary multiplication module if every primary submodule of M is a multiplication submodule of M. Some of the properties of this concept will be investigated. The main results of this paper are, for modules M and N, we have M N and HomR (M, N) are primary multiplications R-modules under certain assumptions.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
On S*-Supplemented Modules
...Show More Authors

The main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.

View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
On J–Lifting Modules
...Show More Authors
Abstract<p>Let R be a ring with identity and M is a unitary left R–module. M is called J–lifting module if for every submodule N of M, there exists a submodule K of N such that <inline-formula> <tex-math><?CDATA ${\rm{M}} = {\rm{K}} \oplus \mathop {\rm{K}}\limits^\prime,\>\mathop {\rm{K}}\limits^\prime \subseteq {\rm{M}}$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block" overflow="scroll"> <mrow> <mi mathvariant="normal">M</mi> <mo>=</mo> <mi mathvariant="normal">K</mi></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
On Annihilator-Extending Modules
...Show More Authors

    Throughout this work we introduce the notion of Annihilator-closed submodules, and we give some basic properties of this concept. We also introduce a generalization for the Extending modules, namely Annihilator-extending modules. Some fundamental properties are presented as well as  we discuss the relation between this concept and some other related concepts.

Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 10 2022
Journal Name
Eurasian Chemical Communications
Detection of lead and cadmium in types of chips from local markets in Baghdad
...Show More Authors

View Publication
Scopus (1)
Scopus
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Detection of the Typical Condition of chitinase Production from the Yeast Saccharomyces cerevisiae S4
...Show More Authors

Five Saccharomyces cerevisiae isolated from the ability of chitinase production from the isolates were studied. Quantitative screening appeared that Saccharomyces cerevisiae S4 was the highest chitinase producer specific activity 1.9 unit/mg protein. The yeast was culture in liquid and solid state fermentation media (SSF). Different plant obstanases were used for (SSF) with the chitine, while liquid media contained chitine with the diffrented nitrogen source. The favorable condition for chitinase producers were incubated at 30 ºC at pH 6 and 1% colloidal chitine.

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 16 2018
Journal Name
International Journal Of Pharmaceutical Quality Assurance
Isolation and Detection of Candida tropicalis from Aborted Placenta in Al-Najaf city/Iraq
...Show More Authors

Background: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four iso

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref