Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
The problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MoreThe problem of noise in the Baghdad airport has been examined in this study; and noise measurement and survey studies have been carried out at four high noise level (operation, training and development, quality system, and information and technology) zones located in this region. Noise exposure is a common hazard to workforce in general although at varying degrees depending on the occupation, as many workers are exposed for long periods of time to potentially hazardous noise. A questionnaire was completed by 122 workers during this study in order to determine the physical, physiological, and psycho-social impacts of the noise on workers and to specify what kind of measurements have been taken both by the employers and workers for protection
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreAbstract
In this study, modified organic solvent (organosolv) method was applied to remove high lignin content in the date palm fronds (type Al-Zahdi) which was taken from the Iraqi gardens. In modified organosolv, lignocellulosic material is fractionated into its constituents (lignin, cellulose and hemicellulose). In this process, solvent (organic)-water is brought into contact with the lignocellulosic biomass at high temperature, using stainless steel reactor (digester). Therefor; most of hemicellulose will remove from the biomass, while the solid residue (mainly cellulose) can be used in various industrial fields. Three variables were studied in this process: temperature, ratio of ethano
... Show MoreCritical buckling temperature of laminated plate under thermal load varied linearly along the thickness, is developed using a higher-order shape function which depends on a parameter ‘‘m’’, which is improved to obtain results for thin and thick plates. Laminated plates’ equations of motion are obtained using virtual work principle and solved for simply supported boundary conditions. Angle and cross laminates thermal buckled mode shapes with different E1/E2 proportion, number of plies, (α2/α1) proportion, aspect ratios, are investigated. It is observed that this shape function gives thermal buckling for thin and thick plates but with m = 0.05 that agree well with other theories and linear distribution of temperature giv
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.