Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreThe Atoms in Molecules (AIM) analysis for triosmium cluster, which contains trihydridede, carbon, carbonyl and 2-methylbenzothiazolide ligands, [Os3(µ-H)3(µ3-ɳ2-CC7H3(2-CH3)NS)(CO)8] is reported. Bonding features in this cluster has been analyzed based on QTAIM ("Quantum Theory of Atoms in Molecules") in this work. The topological indices derived from electron density of relevant interactions in triosmium compound have been studied. The major interesting point of the AIM analyses is that the core of part (Os3H3) reveals the absence of any critical points and bond paths connecting any pairs of O
... Show MoreActivated carbon prepared from date stones by chemical activation with ferric chloride (FAC) was used an adsorbent to remove phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) from aqueous solutions. The influence of process variables represented by solution pH value (2-12), adsorbent to adsorbate weight ratio (0.2-1.8), and contact time (30-150 min) on removal percentage and adsorbed amount of Ph and PNPh onto FAC was studied. For PNPh adsorption,( 97.43 %) maximum removal percentage and (48.71 mg/g) adsorbed amount was achieved at (5) solution pH,( 1) adsorbent to adsorbate weight ratio, and (90 min) contact time. While for Ph adsorption, at (4) solution pH, (1.4) absorbent to adsorbate weight ratio, and (120 min) contact
... Show MoreAsthma is one of the most common chronic, non-communicable diseases affecting children worldwide. The estimated prevalence of pediatric asthma in Iraq is 15.8%. Physiologic, inflammatory and structural factors contribute to the development of asthma. Assessment and monitoring of asthma control can be done by a validated children asthma control test (CACT). Management of asthma must address three components which are an appropriate management plan, the most appropriate medication if necessary, and the use of safe and effective medication. The management plan should consider patient counseling and education about the definition of asthma, signs, and symptoms, the pathophysiology of asthma, common triggers for asthma and how can avoid them,
... Show MoreThis study reports on natural convection heat transfer in a square enclosure of length (L=20 cm) with a saturated porous medium (solid glass beads) having same fluid (air) at lower horizontal layer and free air fill in the rest of the cavity's space. The experimental work has been performed under the effects of heating from bottom by constant heat flux q=150,300,450,600 W/m2 for four porous layers thickness Hp (2.5,5,7.5,1) cm and three heaters length δ(20,14,7) cm. The top enclosure wall was good insulated and the two side walls were symmetrically cooled at constant temperature. Four layers of porous media with small porosity, Rayleigh number range (60.354 - 241.41) and (Da) 3.025x10-8 has been investigated. The obtained data of temperatu
... Show MoreModern trends have appeared recently in educational thought that call for the achievement of the outcomes of the educational process. Some of these trends are the development of individual thinking skills, considering the individual differences, and learning basic skills. The five-year learning cycle is one of these models. It is called as five-year learning cycle because it passes through five stages. These five stages are: (operate - discover - clarify - expand – Evaluate), which make the learner as the main axis for activating thinking processes. This can be done by organizing study materials through research, investigation, and identifying concepts by himself, as in learning sports skills that depend on motor performance and teamwork,
... Show MoreKE Sharquie, AA Noaimi, BAM Saleh, 2015