Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
The corrosion inhibiting properties of the new furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione in acidic solution (1.0 M HCl) were explored utilizing electrochemical, surface morphology (AFM), and quantum chemical calculations approaches. The novel furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione shows with an inhibitory efficiency value of 99.4 percent at 150 ppm, carbon steel corrosion in acidic medium is effectively inhibited, according to the results. The influence of temperature on corrosion prevention was studied using adsorption parameters and activation thermodynamics. The novel furan derivative creates a protective layer over the metallic surfa
... Show MoreThe Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit
... Show MoreAmong the duties of the state is to organize the lives of individuals in all respects, and among the categories that the state has to organize their lives are the category of new graduates who are looking for work, As a result of the conditions that accompany our dear country, such as the deterioration of economic life, the rise in unemployment, the inability of the state to recruit graduates as a whole, and the shortage that has appeared in the teaching staff in schools, especially those located in remote areas of the governorates, Studies have shown that there is a significant shortage of teaching staff, which prompted the state to create a new category, the category of free lecturers, and they are people who pledge to give free lectur
... Show MoreGreywater is a possible water source that can be improved for meeting the quality required for irrigation. Treatment of greywater can range from uncomplicated coarse filtration to advanced biological treatment. This article presents a simple design of a small scale greywater treatment plant, which is a series of physical and natural processes including screening, aeration, sedimentation, and filtration using granular activated carbon filter and differentiates its performance with sand filter. The performance of these units with the dual filter media of (activated carbon with sand) in treatment of greywater from Iraqi house in Baghdad city during 2019 and that collected from several points including washbasins, kitchen si
... Show MoreIn this work a study was made in centrifugal fan blower to investigate the effect of impeller blade design on sound pressure level (SPL). Shroud and unshroud impeller of nine blades are used. The sound generation from flow inside the test rig at different positions was displayed by using spectral analyzer. The experiments were carried out in anechoic chamber with small holes in its walls, under ambient condition about (25-27) C ° to avoid the effect of temperature on the sound pressure level. The results showed that (SPL) decreased with the increase of distance from the source about (3-4)dB when distance varied about (0.8-1.06)m, and the (SPL) decreased with the decrease of velocity about (8-12)dB when velocity varied between (13000-260
... Show MoreGrass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreSupport vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.