Preferred Language
Articles
/
ijl-151
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Bulletin Of The Iraq Natural History Museum
A COMPARATIVE-MORPHOLOGICAL STUDY OF SKULLS IN TWO SPECIES OF CARNIVOROUS AND HERBIVOROUS MAMMALS
...Show More Authors

The skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Non-traded Tales in Imami and Hanafi Doctrines (A Comparative Study of Religion Fundamentals)
...Show More Authors

 

The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 21 2017
Journal Name
Biomechanics And Modeling In Mechanobiology
A novel method for non-invasively detecting the severity and location of aortic aneurysms
...Show More Authors

The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Oral And Maxillofacial Surgery
Characteristics of mandibular injuries caused by bullets and improvised explosive devices: a comparative study
...Show More Authors

The purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci

... Show More
View Publication
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Creating a Conductive Surface of the PMMA by Laser Cladding with DWCNT and MWCNTS
...Show More Authors

This work studied the electrical and thermal surface conductivity enhancement of polymethylmethacrylate (PMMA) clouded by double-walled carbon nanotubes (DWCNTs) and multi-walled carbon nanotube (MWCNTs) by using pulsed Nd:YAG laser. Variable input factors are considered as the laser energy (or the relevant power), pulse duration and pulse repetition rate. Results indicated that the DWCNTs increased the PMMA’s surface electrical conductivity from 10-15 S/m to 0.813×103 S/m while the MWCNTs raised it to 0.14×103 S/m. Hence, the DWCNTs achieved an increase of almost 6 times than that for the MWCNTs. Moreover, the former increased the thermal conductivity of the surface by 8 times and the later by 5 times.

View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
The other day in the Holy Quran and the four Gospels: A comparative study
...Show More Authors

The other day in the Holy Quran and the four Gospels

View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
meta and its dimensions in the designed bio-formation - virtual reality environment - a model
...Show More Authors

This study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref