Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreThe purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreSince 1990 internal combustion engines and variable systems has been considered as emission. Noise can be defined as undesirable sound, and in high levels it can be considered ahealth hazard. Large internal combustion engines produce high levels of noise. In many countries there are laws restricting the noise levels in large engine rooms and fixed applications. Locomotives engines have the minimum emission influence because of noise control techniques capability.
In this paper study on a single cylinder internal combustion engine was conducted. The engine works by adding ethanol to gasoline, at variable speeds, without adding ethanol, and with adding 10 and 20% ethanol in volumetric ratio. Using one sound insulator or two or with
... Show MoreThe durability of asphalt pavement is associated with the properties and performance of the binder. This work-study intended to understand the impact of blending Styrene-Butadiene-Styrene (SBS) to conventional asphalt concrete mixtures and calculating the Optimum Asphalt Content (OAC) for conventional mixture also; compare the performance between SBS modified with the conventional mixture. Two different kinds of asphalt penetration grades, A.C. (40-50) and A.C. (60-70), were improved with 2.5 and 3.5% SBS polymer, respectively. Marshall properties were determined in this work. Optimum Asphalt Content (OAC) was 4.93 and 5.1% by weight of mixture for A.C. (40-50) and (60-70), respectively. Marshall properties results show an increasem
... Show MoreTo enhance interfacial bonding between carbon fibers and epoxy matrix, the carbon fibers have been modified with multiwall carbon nanotubes (MWCNTs) using the dip- coating technique. FT-IR spectrum of the MWCNTs shows a peak at 1640 cm−1 corresponding to the stretching mode of the C=C double bond which forms the framework of the carbon nanotube sidewall. The broad peak at 3430 cm−1 is due to O–H stretching vibration of hydroxyl groups and the peak at 1712 cm−1 corresponds to the carboxylic (C=O) group attached to the carbon fiber. The peaks at 2927 cm−1 and 2862 cm−1 ar
The limitations of conventional cement mortar as a widely used construction material include low tensile capacity, high permeability, and susceptibility to chemical degradation. The increasing demand for durable and sustainable construction materials has led to increased attention in modifying cementitious materials through nanotechnology. This study investigates the influence of nano-silica (NS) and nano-alumina (NA) on the physical, strength-related, and durability characteristics of cement mortar to determine the optimum nanomaterial type and dosage for performance enhancement. Six mortar mixes, in addition to a reference mix, were designed and prepared by adding 1%, 1.5%, and 2% of the cement weight with NS and NA separately, an
... Show MoreA skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.