Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreThis paper examines the mechanical properties of a composite material made of modified Iraqi gypsum (juss) reinforced with polypropylene fibers. The modified juss was prepared by adding two percentages of cement (5, 10) %. Two percentages of polypropylene fibers were used, to reinforce the modified juss (1, 2) %. The water/dry compound ratio used was equal to 0.53%. The composite was evaluated based on compressive strength, flexural strengths, absorption percentage, density, acoustic impedance, ultra - pulse velocity, longitudinal shrinkage and setting time tests. The results indicated that the inclusion of cement on to juss increases the compressive strength, absorption percentage, density, acoustic impedance, ultra - pulse velocit
... Show More<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreIn Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MoreDeath is undoubtedly the theme of Don DeLillo’s White Noise. Murray Siskind, a College-on-the-Hill professor who is obsessed with the exploration and reinterpretation of American popular culture, talks about the Tibetan Book of the Dead, and the German mentor of Jack Gladney has been using the Egyptian Book of the Dead, translated into German. The core episode of the story is the Airborne Toxic Event, the associate of Heinrich (Jack’s teenage son), Orestes Mercator, dreams of becoming one of the great figures in the Guinness Book by challenging and confronting death by enclosing himself in a glass pen jam-packed with poisonous snakes, and Heinrich challenges an imprisoned mass murderer in a chess game. The scholarly expertise of Jack c
... Show MoreIn this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.
Loud noise can be extremely harmful to the auditory system as well as to human health. Noise pollution is primarily caused by traffic noise. The study's goal was to determine how various vehicle types and speeds affected the amount of noise generated by traffic. The two factors were investigated at seven different arterial streets throughout Kirkuk city to measure the noise levels. The measurements were performed during peak hours to compare the result with WHO standards for noise specification. Traffic volume and vehicle speed are shown to be the key elements that determine an increase in noise level.