Preferred Language
Articles
/
fBiIk5cBVTCNdQwCK5lS
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rate can reach 0.0239 (bits/pulse) with a quantum bit error rate (QBER) of 3.2% for the free space channel and 1.5% for the simulated sea-water channel. The security parameters for each value of the mean photon number closely align with the corresponding theoretical predictions. However, some discrepancies were observed, primarily due to a mismatch in photon detection efficiency for SPDMs and system fluctuations. The theoretical calculations also predict that using coincidence detection, the key can be distributed over distances of up to 195 km.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 05 2023
Journal Name
Thesis
P-Rational Submodules and Certain Types of Polyform Modules
...Show More Authors

The main objective of this thesis is to study new concepts (up to our knowledge) which are P-rational submodules, P-polyform and fully polyform modules. We studied a special type of rational submodule, called the P-rational submodule. A submodule N of an R-module M is called P-rational (Simply, N≤_prM), if N is pure and Hom_R (M/N,E(M))=0 where E(M) is the injective hull of M. Many properties of the P-rational submodules were investigated, and various characteristics were given and discussed that are analogous to the results which are known in the concept of the rational submodule. We used a P-rational submodule to define a P-polyform module which is contained properly in the polyform module. An R-module M is called P-polyform if every es

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
Duality of St-closed submodules and semi-extending modules
...Show More Authors

The main goal of this paper is to dualize the two concepts St-closed submodule and semi-extending module which were given by Ahmed and Abbas in 2015. These dualizations are called CSt-closed submodule and cosemi-extending mod- ule. Many important properties of these dualizations are investigated, as well as some others useful results which mentioned by those authors are dualized. Furthermore, the relationships of cosemi-extending and other related modules are considered.

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Pr-small R-submodules of modules and Pr-radicals
...Show More Authors

The goal of this discussion is to study the twigged of pure-small (pr-small) sub- moduleof a module W as recirculation of a small sub-module, and we give some basic idiosyncrasy and instances of this kind of sub-module. Also, we give the acquaint of pure radical of a module W (pr-radical) with peculiarities.

Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
T-Essentially Coretractable and Weakly T-Essentially Coretractable Modules
...Show More Authors

        A new generalizations of coretractable modules are introduced where a module  is called t-essentially (weakly t-essentially) coretractable if for all proper submodule  of , there exists f End( ), f( )=0 and Imf tes  (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.

View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
THE DIFFERENCE IN THE CHARGE DENSITY DISTRIBUTION OF 90Zr and 92Mo NUCLEI FROM ELASTIC ELECTRON SCATTERING
...Show More Authors

The calculation. of the nuclear. charge. density. distributions. ρ(r) and root. mean. square. radius.( RMS ) by elastic. electron. scattering. of medium. mass. nuclei. such. as (90Zr, 92Mo) based. on the model. of the modified. shell. and the use of the probability. of occupation. on the surface. orbits. of level 2p, 2s eroding. shells. and 1g gaining. shells. The occupation probabilities of these states differ noticeably from the predictions of the SSM. We have found. an improvement. in the determination. of ground. charge. density. and this improvement. allow. more precise. identification. of (CDD) between. (92Mo- 90Zr) to illustrate the influence of the extra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Drug Delivery Science And Technology
Antibacterial and wound healing performance of a novel electrospun nanofibers based on polymethyl-methacrylate/gelatin impregnated with different content of propolis
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Al-rafidain Dental Journal
The Effect of Two Bonding Agents Generations On Microleakage Of Composite Resin Using Two Light Curing Systems.
...Show More Authors

Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Selecting the optimal movement subset with different pattern recognition based EMG control algorithms
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More