Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Management of Foreign Exchange Rate Exposure by Using Financial Hedging An Analytical Empirical Study The main purpose of this Research is to investigate the ability to reduce the effect of exchange rate fluctuation on firm value , by usage appropriate hedging strategies to provide the firms force to adopted with complex and highly uncertainty conditions , characteristic of the most of the financial markets . The field of this study is the giant five Multinational on the world. Nokia, Toyota Motor, Intel , Coca Cola, Microsoft. practical analysis is provide the truth of all study's hypothesis , and it is reach to many of conclusion, the most important of them is Stem from unexpected fluctuation on nominal ex
... Show MoreThis paper presents an experimental study of cooling photovoltaic (PV) panels using evaporative cooling. Underground (geothermal energy) water used to extract heat from it during cooling and cleaning of PV panels. An experimental test rig was constructed and tested under hot and dusty climate conditions in Baghdad. An active cooling system was used with auxiliary an underground water tank to provide cold water as a coolant over both PV surfaces to reduce its temperature. The cellulose pad has been arranged on the back surface and sprays cooling on the front side. Two identical PV panels modules used: without cooling and evaporative water cooling. The experiments are comprised of four cases: Case (I): backside cooling, Ca
... Show MoreLiposome-mediated transfection of cancer cells provide a valuable experimental technique to study cellular gene expression and may also be adapted for gene therapy studies. However, the widely recognized advantage of liposome-mediated transfection is high efficiency. Therefore, this study were performed to optimize transfection techniques in human larynx carcinoma cell line Hep-2 using the commercial synthetic lipid TransFast™ Reagent and monitoring the expression efficiency by using the pSV-?-galactosidase Control Vector which encoded ?-galactosidase, maximum transfection efficiency were achieved with TransFast™ Reagent used at the Charge ratios of 2:1 and 0.5 µg DNA/ml, this is indicate that TransFast™ Reagent can be used as an eff
... Show More<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show MoreThe study aims to study the geographical distribution of electricpower plants in Iraq, except the governorates of Kurdistan Region (Dohuk, Erbil, Sulaymaniyah) due to lack of data.
In order to reach the goal of the research was based on some mathematical equations and statistical methods to determine how the geographical distribution of these stations (gas, hydropower, steam, diesel) within the provinces and the concentration of them as well as the possibility of the classification of power plants in Iraq to facilitate understanding of distribution in a scientific manner is characterized by objectively.
The most important results of the research are that there are a number of factors that led to the irregular distribution
... Show MoreThis study aims to assess the accuracy of digital elevation model (DEM) created with utilization of handheld Global Positioning System (GPS) and comparing with Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. It is known that the quality of the DEM is affected by both of accuracy of elevation at each pixel (absolute accuracy) and accuracy of presented morphology (relative accuracy). The University of Baghdad, Al Jadriya campus was selected as a study area to create and analysis the resulting DEM. Additionally, Geographic Information System (GIS) was used to visualize, analyses and interpolate GPS track points (elevation data) of the study area. In this
... Show MoreWe present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.