Talib Kh. Hussein's research while affiliated with Al-Kitab University and other places

Publications (5)

Article
In this paper, we suggest a theoretical model for the exchange of the orbital angular momentum (OAM) state of laser fields in a real cold atomic system for realization in an experimental setup. By using four-wave mixing (FWM) processes, we study the spatial dependence of the new weak generated signal light under electromagnetically induced transpar...
Article
In this letter, we have proposed a new model for quantum control of atom photon entanglement in a single layer graphene via von Neumann reduced entropy of entanglement. We consider the effect of terahertz laser field intensity on the degree of entanglement (DEM) in the resonance and off-resonance condition of the applied fields. We also investigate...
Article
Full-text available
In this study, aqueous, ethanol, methanol, and hexane extracts from Iraqi Kurdistan Region Daphne mucronata were prepared due to the numerous applications and development of nanofibers in biological and medical fields, including food packaging, enzyme stabilization, and wound dressing. In the initial evaluation of the extracts, the antioxidant prop...

Citations

... This dynamic field has unraveled a plethora of novel physical phenomena, including but not limited to electromagnetically induced transparency [4], coherent population trapping [5], and stimulated Raman adiabatic passage [6]. These discoveries, nestled within the intricate framework of different systems [7][8][9][10][11][12][13][14][15], have not only enriched the theoretical research but also unfolded promising practical applications. The diverse optical effects stemming from quantum coherence and interference in multi-level systems extend beyond the confines of theoretical curiosity [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31]. ...
... Therefore, it is difficult to ensure the data saved in the cloud will remain intact owing to the prevalence of software and hardware problems as well as human mistake [11][12][13][14][15]. Data owners or Third-Party Auditors (TPAs) have the option to use one of several auditing methodologies to determine if cloud-based data is affected. These plans address several facets of data integrity audits, including data dynamic operation, user identity and data privacy protection, key exposure resilience, certificate management simplicity, privacy-preserving authenticators, and hybrid) are all factors to consider when thinking about cloud security [55][56][57][58][59][60][61]. Traditional security and authorised security, which employs the technique of reviewing the parameters, are two alternatives described in this scheme. ...