Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
In this study we using zirconium sulfate, Punica granatum plant extract, and an alkaline medium, to created ZrO2 nanoparticles. They were then characterized using a variety of techniques, including FT-IR, UV-visible, atomic force microscopy, X-ray diffraction, transmission electron microscopy, scanning electron microscopy, and energy-dispersive X-ray spectroscopy. The Debye-Scherrer equation was used to calculate the crystal size in X-ray diffraction and found to be 27.82 nm. The particle size of ZrO2 nanoparticles was determined using atomic force microscopy, scanning electron microscopes, and transmission electron microscopy. Utilizing ZrO2 NPs, the metal ions M (II) = Co, Ni, and Cu were successfully a
... Show MoreThe present research was conducted to synthesis Y-Zeolite by sol-gel technique using MWCNT (multiwalled carbon nanotubes) as crystallization medium to get a narrow range of particle size distribution with small average size compared with ordinary methods. The phase pattern, chemical structure, particle size, and surface area were detected by XRD, FTIR, BET and AFM, respectively. Results shown that the average size of Zeolite with and without using MWCNT were (92.39) nm and (55.17) nm respectively .Particle size range reduced from (150-55) nm to (130-30) nm. The surface area enhanced to be (558) m2/g with slightly large pore volume (0.231) km3/g was obtained. Meanwhile, degree of crystallization decrease
... Show MoreInthisstudy,FourierTransformInfraredSpectrophotometry(FTIR),XRay Diffraction(XRD)andlossonignition(LOI),comparativelyemployedtoprovideaquick,relativelyinexpensiveandefficientmethodforidentifyingandquantifyingcalcitecontentofphosphateoresamplestakenfromAkashatsiteinIraq.Acomprehensivespectroscopicstudyofphosphate-calcitesystemwasreportedfirstintheMid-IRspectra(4004000cm-1)usingShimadzuIRAffinity-1,fordifferentcutsofphosphatefieldgradeswithsamplesbeneficiatedusingcalcinationandleachingwithorganicacidatdifferenttemperatures.Thenusingtheresultedspectratocreateacalibrationcurverelatesmaterialconcentrationstotheintensity(peaks)ofFTIRabsorbanceandappliesthiscalibrationtospecifyphosphate-calcitecontentinIraqicalcareousphosphateore.Theirpeakswereass
... Show MoreBackground: World Health Organization (WHO) and United Nation International Children Fund (UNICEF) developed a strategy known as Integrated Management of Childhood Illness (IMCI); which aims to reduce less than five years children morbidity and mortality in developing countries.
Objective: To assess the completion of the IMCI format status in primary health care centers, Baghdad.
Methods: A cross sectional study with analytic element was conducted during the period from 15th of January till 15th May 2016 in selected Primary health centers in Baghdad, Iraq. The sample consists of form of child files less than 2 months and form from 2
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreSince the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreObtaining the computational models for the functioning of the brain gives us a chance to understand the brain functionality thoroughly. This would help the development of better treatments for neurological illnesses and disorders. We created a cortical model using Python language using the Brian simulator. The Brian simulator is specialized in simulating the neuronal connections and synaptic interconnections. The dynamic connection model has multiple parameters in order to ensure an accurate simulation (Bowman, 2016). We concentrated on the connection weights and studied their effect on the interactivity and connectivity of the cortical neurons in the same cortical layer and across multiple layers. As synchronization helps us to mea
... Show More