Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Ultrasound imaging has some problems with image properties output. These affects the specialist decision. Ultrasound noise type is the speckle noise which has a grainy pattern depending on the signal. There are two parts of this study. The first part is the enhancing of images with adaptive Weiner, Lee, Gamma and Frost filters with 3x3, 5x5, and 7x7 sliding windows. The evaluated process was achieved using signal to noise ratio (SNR), peak signal to noise ratio (PSNR), mean square error (MSE), and maximum difference (MD) criteria. The second part consists of simulating noise in a standard image (Lina image) by adding different percentage of speckle noise from 0.01 to 0.06. The supervised classification based minimum di
... Show MoreIn this paper, thermal properties were performed by using semi-empirical theoretical calculations to study the molecular structure of a nonlinear molecular system, the (S2F2) molecule in the infrared region, by using semi-empirical quantum programs in the (MNDO / PM3) method. This study is under the condition of obtaining the stable structure of the molecule in which the molecule obtains the minimum value of the total energy. The thermodynamic properties were also calculated, including the heat of formation, whose value was (-61.002kcal / mol), the entropy and its value (78.2916 cal / mol.k), as well as the heat capacity (15.9454 cal / mol.k) and the enthalpy (3763.434 cal /mol), Gibbs F
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreBackground: Mental health is integrated into PHC as a strategy of WHO to fill the gap in mental health treatment. Part of this strategy needs a level of task shifting so that mental health care is provided by different level of PHC workers and not only specialists such as psychiatrists and psychologists.
Objectives: To assess the knowledge and attitudes of family doctors regarding the provision of psychological health in PHCC and if there is an association between the certificates of these family doctors and their Knowledge and attitudes to psychological health.
Subjects and Methods: A cross-sectional descriptive study with analytic elements was conducted in 8 famil
... Show MoreAbstract
In this study, modified organic solvent (organosolv) method was applied to remove high lignin content in the date palm fronds (type Al-Zahdi) which was taken from the Iraqi gardens. In modified organosolv, lignocellulosic material is fractionated into its constituents (lignin, cellulose and hemicellulose). In this process, solvent (organic)-water is brought into contact with the lignocellulosic biomass at high temperature, using stainless steel reactor (digester). Therefor; most of hemicellulose will remove from the biomass, while the solid residue (mainly cellulose) can be used in various industrial fields. Three variables were studied in this process: temperature, ratio of ethano
... Show MoreHydraulic fracturing is considered to be a vital cornerstone in decision making of unconventional reservoirs. With an increasing level of development of unconventional reservoirs, many questions have arisen regarding enhancing production performance of tight carbonate reservoirs, especially the evaluation of the potential for adapting multistage hydraulic fracturing technology in tight carbonate reservoirs to attain an economic revenue.
In this paper we present a feasibility study of multistage fractured horizontal well in typical tight carbonate reservoirs covering different values of permeability. We show that NPV is the suitable objective function for deciding on the optimum number
In the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show More