In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10°C.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAbstract
Objectives: The study is carried out to assess functional performance for heart's valve replacement patients and find out relationship with sociodemographic data and clinical data
Methodology: Descriptive design is carried out at cardiac surgery centers in Baghdad ; Ibn -Al Betar Specialized for cardiac surgery center and Al-Iraqi center for cardiac disease. its initiation from December28the 2013 to September 1st 2014,A non- probability (purposive) sample of 50 adults patients are attended cardiac surgery centers at Baghdad city and who have heart valves replacement. The data collection through development of questionnaire which is composed from three parts(socio demographic data, clinical information, functional performa
Polyethersulfone (PES) ultrafiltration membrane blending NaX zeolite crystals as a hydrophilic additive was examined for zinc (II) and lead ions Pb (II) removal from aqueous solutions. The effect of NaX zeolite content on the permeation flux and removal efficiency was studied. The results showed that adding zeolite to the polymer matrix enhanced the permeation flux. The permeation flux of all the zeolite/PES matrix membranes was higher than the pristine membrane. No significant improvement was observed in the removal of Zn (II) ions using all prepared membranes as the removal percentage did not raise above 29.2%. However, the removal percentage of Pb (II) ions was enhanced to 97% using a membrane containing 0.9%wt. zeolite. Also, it was
... Show More<span lang="EN-US">We are living in the 21<sup>st</sup> century, an era of acquiring necessity in one click. As we, all know that technology is continuously reviving to stay ahead of advancements taking place in this world of making things easier for mankind. Technology has been putting his part in introducing different projects as we have used the field programmable gate arrays (FPGAs) development board of low cost and programmable logic done by the new evolvable cyclone software is optimized for specific energy based on Altera Cyclone II (EP2C5T144) through which we can control the speed of any electronic device or any Motor Control IP product targeted for the fan and pump. Altera Cyclone FPGAs’ is a board thro
... Show MoreAbstract:
This study is studied one method of estimation and testing parameters mediating variables in a structural equations model SEM is causal steps method, in order to identify and know the variables that have indirect effects by estimating and testing mediation variables parameters by the above way and then applied to Iraq Women Integrated Social and Health Survey (I-WISH) for year 2011 from the Ministry of planning - Central statistical organization to identify if the variables having the effect of mediation in the model by the step causal methods by using AMOS program V.23, it was the independent variable X represents a phenomenon studied (cultural case of the
Orthogonal Frequency Division Multiplexing (OFDM) is an efficient multi-carrier technique.The core operation in the OFDM systems is the FFT/IFFT unit that requires a large amount of hardware resources and processing delay. The developments in implementation techniques likes Field Programmable Gate Array (FPGA) technologies have made OFDM a feasible option. The goal of this paper is to design and implement an OFDM transmitter based on Altera FPGA using Quartus software. The proposed transmitter is carried out to simplify the Fourier transform calculation by using decoder instead of multipliers. After programming ALTERA DE2 FPGA kit with implemented project, several practical tests have been done starting from monitoring all the results of
... Show MoreThe researchers of the present study have conducted a genre analysis of two political debates between American presidential nominees in the 2016 and 2020 elections. The current study seeks to analyze the cognitive construction of political debates to evaluate the typical moves and strategies politicians use to express their communicative intentions and to reveal the language manifestations of those moves and strategies. To achieve the study’s aims, the researchers adopt Bhatia’s (1993) framework of cognitive construction supported by van Emeren’s (2010) pragma-dialectic framework. The study demonstrates that both presidents adhere to this genre structuring to further their political agendas. For a positive and promising image
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More
Through research it shows that the calculation has an effective role in the maintenance of Islamic law and save. And that the calculation religious function to attach religious matters and it closeness to God, whether calculated or assumed carried out by volunteers. And scientists from the description of the calculation as a social function to attach to morality and kinship and charity to the poor and the dissemination of science. By definition it shows that the injury will not be exposed only to the evils of any phenomenon that do not break and was checking to search for evil, but he must intervene if he saw visible in front of him. And that of the areas that could see the calculation are the field of information and educ
... Show More