Preferred Language
Articles
/
ijl-102
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 30 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Laplace transform-adomian decomposition approach for solving random partial differential equations
...Show More Authors

Market share is a major indication of business success. Understanding the impact of numerous economic factors on market share is critical to a company’s success. In this study, we examine the market shares of two manufacturers in a duopoly economy and present an optimal pricing approach for increasing a company’s market share. We create two numerical models based on ordinary differential equations to investigate market success. The first model takes into account quantity demand and investment in R&D, whereas the second model investigates a more realistic relationship between quantity demand and pricing.

Scopus (2)
Scopus
Publication Date
Wed Oct 04 2023
Journal Name
Exergy - New Technologies And Applications
High Synthetic Image Coding System
...Show More Authors

Compressing an image and reconstructing it without degrading its original quality is one of the challenges that still exist now a day. A coding system that considers both quality and compression rate is implemented in this work. The implemented system applies a high synthetic entropy coding schema to store the compressed image at the smallest size as possible without affecting its original quality. This coding schema is applied with two transform-based techniques, one with Discrete Cosine Transform and the other with Discrete Wavelet Transform. The implemented system was tested with different standard color images and the obtained results with different evaluation metrics have been shown. A comparison was made with some previous rel

... Show More
View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
2013 Ieee International Conference On Circuits And Systems (iccas)
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
...Show More Authors

The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Design and Implementation for optical fiber communication system using frequency shift coding
...Show More Authors

In this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
The effect of changing the grammatical ruling in the Qur’anic readings on changing the jurisprudential ruling
...Show More Authors

 The study aimed to show the jurisprudential impact of the multiplicity of directing the syntactic movement of the Qur’anic readings, and it was based on the inductive, descriptive and analytical approach. , such as the difference in explaining the ruling on washing the feet, and the one who meditates on the Qur’anic readings notices in it a picture of the Qur’anic miracles, and this is what is manifested by the brevity of the speech. Collapse the research, and the research tried to trace the Qur’anic readings, contained in the verses, and the readings were limited to what is related to the explanatory meaning mentioned by the commentators, by clarifying the explanatory relationship between the Qur’anic readings and the me

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Designing activity based costing systems ABC for transport services and its role in improving the efficiency of pricing decisions: بحث تطبيقي في الشركة العامة لادارة النقل الخاص
...Show More Authors

  The research dealt with the design of the cost accounting system for the transport service and its Role in improving the efficiency of pricing decisions through the application of the cost system based on ABC activities. The main activities were defined and cost guides were to measure the cost of each service and to determine the cost of each service for the purpose of providing management with appropriate information and pricing decisions The problem of research in the lack of adoption by some public companies in the service sector on the cost accounting system to calculate the cost of service as well as the lack of identification of productive activities and service activities and therefore cannot make the appropriate decision t

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 06 2011
Journal Name
مجلة العلوم السياسية
الارهاب في العراق :دراسة في الاسباب الحقيقية
...Show More Authors

يناقش البحث الاسباب الحقيقية بتفشي الارهاب في العراق بعد العام 2003

View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Political Sciences Journal
الاهاب في الهعراق .. دراسة في الاسباب الحقيقية
...Show More Authors

لقد حمَّلت مفردة الإرهاب بكمٍ هائلٍ من المفاهيم والدلالات المُتباينة والمُتناقضة . لذا حاول البحث التأكيد على أهمية وضع تعريفٍ مُحدد لظاهرة الارهاب،ومن ثم توضيح ماهي الاسباب الحقيقية وراء تنامي الارهاب في العراق بعد 2003 ،وما هي المتغيرات الاجتماعية والسياسية التي اسهمت في تصاعد وتيرة العمليات الارهابية في العراق،لاسيما وإن المجتمع العراقي مجتمع متعدد الشرائح الاجتماعية،وبشكلٍ قد يُمَّ

... Show More
View Publication Preview PDF
Crossref