Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreThe purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the
In the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re
... Show MoreStudies in Iraq that concerned identification of free-living Protozoa (sarcodina) are scarce; so the current study deals with these protozoan communities inhabiting the Tigris River in Baghdad City. Sampling collection stations have been selected at each of AL-Gheraiˈat and AL-Adhamiyah area adjacent to the river. Monthly intervals sampling with three samples were collected from each station from June to September 2020. Total of 23 sarcodina taxa were listed, out of them 5 taxa were new record to the Tigris River in Baghdad: Difflugia urceolata Carter, 1864 (Arcellinida, Difflugiidae), Heleopera perapetricola Leidy, 1879 (Arcellinida, Heleoperidae), Rhaphidiophrys pallida F.E. Schulze, 1874 (Centrohelida, Raphidiophridae), Saccamoeba sp
... Show MoreDeath is undoubtedly the theme of Don DeLillo’s White Noise. Murray Siskind, a College-on-the-Hill professor who is obsessed with the exploration and reinterpretation of American popular culture, talks about the Tibetan Book of the Dead, and the German mentor of Jack Gladney has been using the Egyptian Book of the Dead, translated into German. The core episode of the story is the Airborne Toxic Event, the associate of Heinrich (Jack’s teenage son), Orestes Mercator, dreams of becoming one of the great figures in the Guinness Book by challenging and confronting death by enclosing himself in a glass pen jam-packed with poisonous snakes, and Heinrich challenges an imprisoned mass murderer in a chess game. The scholarly expertise of Jack c
... Show MoreThe performance of asphalt pavements is crucial due to heavy traffic loads from civil and industrial developments. Various additives and modifiers are used in flexible roads to improve their resistance to deterioration caused by climatic changes. From this context, modifying the asphalt binder with polymers is popular in asphalt pavement construction. The present research investigates the effect of Polyethylene (PE) polymers in powder form on the characteristics of asphalt mixtures since these polymers are composed of hydrocarbons. It is similar to asphalt binders, making them very effective in enhancing the performance of neat asphalt produced from the oil refinery. To confirm this, two types of PE, High-Density PE (HDPE) and Low-Density P
... Show MoreA skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe aim of this research work is to study the effect of stabilizing gypseous soil, which covers
vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties
to be used as a base course layer replacing the traditional materials of coarse aggregate and broken
stones which are scarce at economical prices and hauling distances.
Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%,
medium curing cutback asphalt (MC-30), and hydrated lime are used in this study.
The conducted tests on untreated and treated gypseous soil with different percentages of medium
curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and o