Preferred Language
Articles
/
ijl-102
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 13 2019
Journal Name
Al-khwarizmi Engineering Journal
Transient Behavior Analysis for Solar Energy Storage in PCM-CFM Material Using Equivalent Heat Capacity Method as Storage Model
...Show More Authors

A paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Laplace Distribution And Probabilistic (bi) In Linear Programming Model
...Show More Authors

The theory of probabilistic programming  may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, pro­duction and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Investigation of Thermal Stress Distribution in Laser Spot Welding Process
...Show More Authors

The objective of this paper was to study the laser spot welding process of low carbon steel sheet. The investigations were based on analytical and finite element analyses. The analytical analysis was focused on a consistent set of equations representing interaction of the laser beam with materials. The numerical analysis based on 3-D finite element analysis of heat flow during laser spot welding taken into account the temperature dependence of the physical properties and latent heat of transformations using ANSYS code V.10.0 to simulate the laser welding process. The effect of laser operating parameters on the results of the temperature profile were studied in addition to the effect on thermal stresses  and dimensions of the laser w

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 21 2022
Journal Name
Journal Of Planner And Development
Estimation of Traffic Volumes Distribution of Urban Streets in Baghdad City
...Show More Authors

The aim of this research is to explore the time and space distribution of traffic volume demand and investigate its vehicle compositions. The four selected links presented the activity of transportation facilities and different congestion points according to directions. The study area belongs to Al-Rusafa sector in Baghdad city that exhibited higher rate of traffic congestions of working days at peak morning and evening periods due to the different mixed land uses. The obtained results showed that Link (1) from Medical city intersection to Sarafiya intersection, demonstrated the highest traffic volume in both peak time periods morning AM and afternoon PM where the demand exceeds the capacity along the link corridor. Also, higher values f

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study the distribution of Fungi and Bacteria in AL- Yusifia River– South of Baghdad City.: Study the distribution of Fungi and Bacteria in AL- Yusifia River– South of Baghdad City.
...Show More Authors

Al-Yusifia river was assessed at three sampling stations with study period from Autumn 2010 to the end of Summer 2011. The present investigation was carried out on diversity of fungi and bacteria from Al-Yusifia river, Baghdad city. During the study, a total of 12 fungal genus and 6 bacterial genus were isolated during the year seasons. The dominant fungus at the three stations were Penicillium sp., then Rhizopus and Trichophyton   megninii while the dominant bacteria was Escherichia coli and Klebsiella sp.

            The higher

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
The Effect of Toxoplasma Gondii on DNA SequenceAlteration among BreastCancer Patients
...Show More Authors

Objective: The study aims to determine the effect of Toxoplasma gondii infection on the
genetic sequence of breast cancer patients in the Medical City Hospital – Tumor Unit /
Iraq-Baghdad.
Methodology: A study was carried out in the City of Medicine / Oncology Unit / Baghdad,
during the period 1st June 2016 to 15
th March 2017. Forty samples of tissue and serum
were collected from patients who complaining from Breast cancer and infected with
Toxoplasmosis. Forty sera samples were taken from patients complaining from parasitic
infection only; without breast cancer as control group. Data is analyzed by using of
descriptive and inferential data analysis methods.
Results: The results show that there is an effe

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref