Preferred Language
Articles
/
GBe7WpEBVTCNdQwCq5UK
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Sep 20 2021
Journal Name
Key Engineering Materials
The Effect of Quantum Confinement on Optical Properties of CdSe Quantum Dots at Room Temperature
...Show More Authors

CdSe quantum dots possess a tuning energy gap which can control gap values according to the size of the quantum dots, this is made the material able to absorb the wavelengths within visible light. A simple model is provided for the absorption coefficient, optical properties, and optical constants for CdSe quantum dots from the size 10nm to 1nm with the range of visible region between (300-730) nm at room temperature. It turns out that there is an absorption threshold for each wavelength, CdSe quantum dots begin to absorb the visible spectrum of 1.4 nm at room temperature for a wavelength of 300 nm. It has been noted that; when the wavelength is increased, the absorption threshold also increases. This applies to the optical propertie

... Show More
View Publication
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental and Theoretical Investigation of Noise Effect in Centrifugal Fan Impeller
...Show More Authors

In this work a study was made in centrifugal fan blower to investigate the effect of impeller blade design on sound pressure level (SPL). Shroud and unshroud impeller of nine blades are used. The sound generation from flow inside the test rig at different positions was displayed by using spectral analyzer. The experiments were carried out in anechoic chamber with small holes in its walls, under ambient condition about (25-27) C ° to avoid the effect of temperature on the sound pressure level. The results showed that (SPL) decreased with the increase of distance from the source about (3-4)dB when distance varied about (0.8-1.06)m, and the (SPL) decreased with the decrease of velocity about (8-12)dB when velocity varied between (13000-260

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
American Journal Of Applied Sciences
A New Strategy for Signaling Overhead Reduction in the Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
2009 7th International Conference On Information, Communications And Signal Processing (icics)
The effect of traffic load on using XCAST based routing protocol in wireless ad hoc networks
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials & Continua
Fused and Modified Evolutionary Optimization of Multiple Intelligent Systems Using ANN, SVM approaches
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
2013 35th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Protocol for site selection and movement assessment for the myoelectric control of a multi-functional upper-limb prosthesis
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2009
Journal Name
International Journal Of Applied Environmental Sciences
An expert System for Predicting the Effects of Noise Pollution on Grass Trimming Task Using Fuzzy Modeling
...Show More Authors

Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents

... Show More
View Publication Preview PDF