Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreHR Al-Hamamy, AA Noaimi, IA Al-Turfy, AI Rajab, Journal of Cosmetics, Dermatological Sciences and Applications, 2015
This study involved the effect of anew nickel (II) complexs with formla [NiL2(H2O)2].2.5ETOH where L=Bis[5-(p-nitrophenyL)-4-phenyL-1,2,4-traizole-3-dithocarbamato hydrazide] diaqua. nickel(II). Ethanol(2.5).and anti-cancer drug cyclophosphamide on specific actifity of two Liver enzymes (GOT,GPT) in the (Liver,kidney) tissues and on the creatinine Level in the kidney byUtilizing an invivosystem in femalmice.The result showed that inhibition in the activity of GPT and GOT enzymes in theLiver and in both nickel (II) complex and cyclophosphamide drug (CP) . mice weretreated with three doses (90,180,320) µg/mouse for three days for each group.The Liver show's the highest rate of GPT inhibition was about 97.43% at180µg/mouse regarding the ki
... Show MoreThe research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .
1-The lack of authority control depends on it to find a
... Show MoreThis work studies the role of serum apelin-36 and Glutathione S-transferases (GST) activity in association with the hormonal, metabolic profiles and their link to the risk of cardiovascular disease (CVD) in healthy and patients' ladies with polycystic ovary syndrome (PCOS). A total of fifty-four (PCOS) patients and thirty-one healthy woman as a control have been studied. The PCOS patients were subdivided on the basis of body-mass-index (BMI), into 2-subgroups (the first group was obese-PCOS with BMI ≥ 30 and the second group was non-obese PCOS MBI<30). Fasting-insulin-levels and Lipid-profile, Homeostatic-model assessment-of-insulin-resistance (HOMA-IR), follicle-stimulating-hormone (FSH), luteinizing-hormone (LH), testosterone and
... Show MoreBiodiesel production from microalgae depends on the biomass and lipid production. Both biomass and lipid accumulation is controlled by several factors. The effect of various culture media (BG11, BBM, and Urea), nutrients stress [nitrogen (N), phosphorous (P), magnesium (Mg) and carbonate (CO3)] and gamma (γ) radiation on the growth and lipid accumulation of Dictyochloropsis splendida were investigated. The highest biomass and lipid yield of D. splendida were achieved on BG11 medium. Cultivation of D. splendida in a medium containing 3000 mg L−1 N, or 160 mg L−1 P, or 113 mg L−1 Mg, or 20 mg L-1 CO3, led to enhanced growth rate. While u
... Show MoreSix isolates of A. pullulans were collected from many sources including Hibiscus sabdariffa (Roselle), old Roofs of houses and bathroom surface that referred as Ap ros1, Ap or2, 3, 4 and Ap bs5, 6 respectively, all these isolates were identified based on morphological characteristics and nutritional physiology profiles, all were able to utilize various carbon and nitrogen sources such as glucose, xylose, sucrose, maltose, ammonium sulfate, ammonium nitrate and ammonium chloride, also they showed positive test for starch and amylase, while α-cellulose, ethanol, and methanol were could not be ass
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More