Preferred Language
Articles
/
ijl-102
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Engineering And Innovative Technology
White Light Generation by Electroluminescence for ZnO Nanoparticle –Organic Hybrid Junction Device
...Show More Authors

ZnO organic hybrid junction (electroluminescence EL device) was fabricated using phase segregation method. ZnO-nanoparticle (NPs) was prepared as a colloidal by self–assembly method of Zinc acetate solution with KOH solution. Nanoparticle is employed to form organic-inorganic hybrid film and generate white light emission, while N,N’–diphenyl-N,N’ –bis(3-methylphenyl)-1,1’-biphenyl 4,4’-diamine (TPD) and polymethyl methacrylate (PMMA) are adopted as the organic matrices. ZnO NPs was used to fabricate TPD: PMMA: ZnO NPs hybrid junction device. The photoluminescence (PL) and electroluminescence (EL) spectra of the TPD: PMMA: ZnO NPs hybrid device provided a broad emission band covering entirely the visible spectrum (∼350-∼700

... Show More
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Thu Sep 26 2024
Journal Name
Journal Of Optics
Cysteine-cupped CdSe/CdS quantum dots as an opticalbiosensor for early skin cancer detection
...Show More Authors

This study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Sep 24 2021
Journal Name
Indonesian Journal Of Chemistry
Molecular Imprinted of Nylon 6 for Selective Separation of Procaine by Solid-Phase Extraction
...Show More Authors

The study is based on the selective binding ability of the drug compound procaine (PRO) on a surface imprinted with nylon 6 (N6) polymer. Physical characterization of the polymer template was performed by X-ray diffraction and DSC thermal analysis. The imprinted polymer showed a high adsorption capacity to trap procaine (237 µg/g) and excellent recognition ability with an imprinted factor equal to 3.2. The method was applied to an extraction column simulating a solid-phase extraction to separate the drug compound in the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate more than the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate of more t

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
The Role of Social Media in Changing Media
...Show More Authors

Media theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner.

So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref