Preferred Language
Articles
/
ijl-119
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10°C.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Serological markers “CEA test & sAPRIL test” in Iraqi patients with colon cancer
...Show More Authors

Background: Colonic cancer is a very common disease world-wide being fourth most common cancer characterized by abnormal proliferation of the inner wall of colon then taking full colon wall thickness then spreading to surrounding lymph nodes and tissues and finally distant metastasis. It is one of most complicated diseases with debilitating symptoms which becomes more sever , prominent and specific with advancing stage with high percent of fatality and relatively short survival if diagnosed late or if left untreated.Objective: To evaluate the efficacy of serum CEA & sAPRIL levels in the diagnosis and screening of colon cancer and their validity for this.Patients and methods: This study was applied on 35 patients with colonic can

... Show More
View Publication
Crossref
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The exploratory and Confirmatory Factorial structure for Riso-Hadson enneagram test indicator
...Show More Authors

This  investigation was conducted to recognize the structure for (RHETI version 2.5  1999) by using exploratory and confirmatory factor analysis. Sample of (620) student of Al-Mustansrya University were administered the (RHETI).

The data of their responses was analyzed by using (PAF) and oblique rotating .

The findings explored (9) factors as one factor for each type and (184) items were loaded by the factors: (60) item for feeling center, (61) items for instinctive center and (63) items for thinking center.

Results of confirmatory factorial analysis supported a model designed by the researcher depended upon a theoretical views of Riso and Hudson

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 08 2009
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Evaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children
...Show More Authors

Evaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children

Publication Date
Mon Feb 12 2024
Journal Name
Journal Mustansiriyah Of Sports Science
Standardization test for the measurement of offensive basketball composite skills(16) years
...Show More Authors

Summary of the researchThe style of playing in basketball, represented by the performance of complex movements as a result of the rapid movement and changing positions is one of the advantages of this game, which adds beauty and excitement to this game, so it was necessary for players to use forms of mobility and complex skills mixed with precision and speed, In the attack to overcome the difficult positions defenders are trying to impose on the attacking team.Complex offensive skills in basketball are difficult skills that a player can not easily perform so they need to be specially trained to handle those situations so that the player can use them in difficult situations.The research community represented a sample of Baghdad players for t

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref