Preferred Language
Articles
/
fBiIk5cBVTCNdQwCK5lS
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rate can reach 0.0239 (bits/pulse) with a quantum bit error rate (QBER) of 3.2% for the free space channel and 1.5% for the simulated sea-water channel. The security parameters for each value of the mean photon number closely align with the corresponding theoretical predictions. However, some discrepancies were observed, primarily due to a mismatch in photon detection efficiency for SPDMs and system fluctuations. The theoretical calculations also predict that using coincidence detection, the key can be distributed over distances of up to 195 km.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Palestine Journal Of Mathematics
STATISTICAL PROPERTIES OF GENERALIZED EXPONENTIAL RAYLEIGH DISTRIBUTION
...Show More Authors

This paper demonstrates the construction of a modern generalized Exponential Rayleigh distribution by merging two distributions with a single parameter. The "New generalized Exponential-Rayleigh distribution" specifies joining the Reliability function of exponential pdf with the Reliability function of Rayleigh pdf, and then adding a shape parameter for this distribution. Finally, the mathematical and statistical characteristics of such a distribution are accomplished

View Publication Preview PDF
Scopus (5)
Scopus
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
KEY TO THE SPECIES OF THE GENUS STACHYS L. (LABIATAE) IN IRAQ WITH THREE NEW RECORDS
...Show More Authors

A simplified parallel key was presented in this work for the Taxa of Stackys L. wildly grown in Iraq. Three records within this genus were newly recorded to our country in the present work and they are S. kermanshahansis Rech S. setifera C.A. Mey. subsp setifera, S. setifera ssp iranica (Reck.) The characteristics of these new records were also given with some representative specimens.

View Publication
Publication Date
Tue Jul 12 2022
Journal Name
Proceedings Of Seventh International Congress On Information And Communication Technology
Identification of Key Criteria of Selecting the Delivery System and Type of Contract in Construction Projects
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Microbial Biosystems
Distribution of cytotoxic necrotizing factor type 1 in clinical isolates of Escherichia coli isolated from urinary tract infections in Iraq
...Show More Authors

Uropathogenic Escherichia coli is the main cause of urinary tract infections, the ability of this bacteria to cause urinary tract infections is related to a variety of virulence factors that enhance colonization and evade the immune response, one of these virulence factors is cytotoxic necrotizing factor 1 toxin which converts the glutamine residue to glutamic acid to activated GTPase Rho family. The study was meant to find out the prevalence rate of the cnf1 gene in Uropathogenic Escherichia coli isolated from Iraqi patients. Conventional laboratory methods were used for primary bacterial identification and molecular methods were used to confirm bacterial identity and gene detection. Escherichia coli was identified in 89/165 (53.93%) of th

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Identificatio n Of Key Factors Affecting Waste Management In Life Cycle Of The Construction Project By Using Delphi Technique
...Show More Authors

The problem of generated waste as a result of the implementation of construction projects, has  been aggravated recently because of construction activity experienced by the world, especially Iraq, which is going through a period of reconstruction, where construction waste represents (20-40%) of the total generated waste and has a negative effect on the environment and economic side of the project. In addition, the rate of consumpted  amounts of natural resources are estimated to be about 40% in the construction industry, so it became necessary to reduce waste and to be manage well. This study aims to identify the key factors affecting waste management through the various phases of the project, and this is accom

... Show More
View Publication Preview PDF