Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Abstract
In this study, modified organic solvent (organosolv) method was applied to remove high lignin content in the date palm fronds (type Al-Zahdi) which was taken from the Iraqi gardens. In modified organosolv, lignocellulosic material is fractionated into its constituents (lignin, cellulose and hemicellulose). In this process, solvent (organic)-water is brought into contact with the lignocellulosic biomass at high temperature, using stainless steel reactor (digester). Therefor; most of hemicellulose will remove from the biomass, while the solid residue (mainly cellulose) can be used in various industrial fields. Three variables were studied in this process: temperature, ratio of ethano
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreHydraulic fracturing is considered to be a vital cornerstone in decision making of unconventional reservoirs. With an increasing level of development of unconventional reservoirs, many questions have arisen regarding enhancing production performance of tight carbonate reservoirs, especially the evaluation of the potential for adapting multistage hydraulic fracturing technology in tight carbonate reservoirs to attain an economic revenue.
In this paper we present a feasibility study of multistage fractured horizontal well in typical tight carbonate reservoirs covering different values of permeability. We show that NPV is the suitable objective function for deciding on the optimum number
CdSe quantum dots possess a tuning energy gap which can control gap values according to the size of the quantum dots, this is made the material able to absorb the wavelengths within visible light. A simple model is provided for the absorption coefficient, optical properties, and optical constants for CdSe quantum dots from the size 10nm to 1nm with the range of visible region between (300-730) nm at room temperature. It turns out that there is an absorption threshold for each wavelength, CdSe quantum dots begin to absorb the visible spectrum of 1.4 nm at room temperature for a wavelength of 300 nm. It has been noted that; when the wavelength is increased, the absorption threshold also increases. This applies to the optical propertie
... Show MoreThe density functional B3LYP is used to investigate the effect of decorating the silver (Ag) atom on the sensing capability of an AlN nanotube (AlN-NT) in detecting thiophosgene (TP). There is a weak interaction between the pristine AlN-NT and TP with the sensing response (SR) of approximately 9.4. Decoration of the Ag atom into the structure of AlN-NT causes the adsorption energy of TP to decrease from − 6.2 to − 22.5 kcal/mol. Also, the corresponding SR increases significantly to 100.5. Moreover, the recovery time when TP is desorbed from the surface of the Ag-decorated AlN-NT (Ag@AlN-NT) is short, i.e., 24.9 s. The results show that Ag@AlN-NT can selectively detect TP among other gases, such as N2, O2, CO2, CO, and H2O.
This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show More