Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
This Research aim to identify the factors affecting the strategic implementation of sewage projects and to seek to activate the real follow-up of projects to identify the factors that accompany their implementation, The study included a sample of the projects of the investment plan implemented for the Directorate General of sewage in the governorates of Iraq, which was completed during the six years period (2010-2016). The sample of the research was four projects: The project of implementation and processing of the treatment plant and the lifting station and the conveyor line for the project of IMARA/The third stage/Al-Sanaf marshland , The project of the processing and implementation of the treatment plant with the
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreIn this work, the effects of size, and temperature on the linear and nonlinear optical properties in InGaN/GaN inverse parabolic and triangular quantum wells (IPQW and ITQW) for different concentrations at the well center were theoretically investigated. The indium concentrations at the barriers were fixed to be always xmax = 0.2. The energy levels and their associated wave functions are computed within the effective mass approximation. The expressions of optical properties are obtained analytically by using the compact density-matrix approach. The linear, nonlinear, and total absorption coefficients depending on the In concentrations at the well center are investigated as a function of the incident photon energy for different
... Show MoreThis review article summarizes our research focused on Cu(In, Ga)Se2 (CIGS) nanocrystals, including their synthesis and implementation as the active light absorbing material in photovoltaic devices (PVs). CIGS thin films were prepared by arrested precipitation from molecular precursors consisting of CuCl, InCl3, GaCl3 and Se metal onto Mo/soda-lime glass (SLG) substrates. We have sought to use CIGS nanocrystals synthesized with the desired stoichiometry to deposit PV device layers without high temperature processing. This approach, using spray deposition of the CIGS light absorber layers, without high temperature selenization, has enabled up to 1.5 % power conversion efficiency under AM 1.5 solar illumination. The composition and morphology
... Show MoreThe present work reports the performance of three types of polyethersulfone (PES) membrane in the removal of highly polluting and toxic lead Pb2+ and cadmium Cd2+ ions from a single salt. This study investigated the effect of operating variables, including pH, types of PES membrane, and feed concentration, on the separation process. The transport parameters and mass transfer coefficient (k) of the membranes were estimated using the combined film theory-solution-diffusion (CFSD), combined film theory-Spiegler-Kedem (CFSK), and combined film theory-finely-porous (CFFP) membrane transport models. Various parameters were used to estimate the enrichment factors, concentration polarization modulus, and Péclet number. The pH values signif
... Show MoreGlobal warming has a serious impact on the survival of organisms. Very few studies have considered the effect of global warming as a mathematical model. The effect of global warming on the carrying capacity of prey and predators has not been studied before. In this article, an ecological model describing the relationship between prey and predator and the effect of global warming on the carrying capacity of prey was studied. Moreover, the wind speed was considered an influencing factor in the predation process after developing the function that describes it. From a biological perspective, the nonnegativity and uniform bounded of all solutions for the model are proven. The existence of equilibria for the model and its local stability is inves
... Show MoreThe efforts embedded in this paper have been devoted to designing, preparing, and testing warm mix asphalt (WMA) mixtures and comparing their behavior against traditional hot mix asphalt mixtures. For WMA preparation, the Sasobit wax additive has been added to a 40/50 asphalt binder with a concentration of 3%. An experimental evaluation has been performed by conducting the Marshall together with volumetric properties, indirect tensile strength, and wheel tracking tests to acquire the tensile strength ratio (TSR), retained stability index (RSI), and rut depth. It was found that the gained benefit of reduction in mixing and compaction temperatures was reversely associated with a noticeable decline in Marshall properties and moisture s
... Show MoreThere is currently a pressing need to create an electro-analytical approach capable of detecting and monitoring genosensors in a highly sensitive, specific, and selective way. In this work, Functionalized Multiwall Carbon Nanotubes, Graphene, Polypyrrole, and gold nanoparticles nanocomposite (f-MWCNTs-GR-PPy-AuNP) were effectively deposited on the surface of the ITO electrode using a drop-casting process to modify it. The structural, morphological, and optical analysis of the modified ITO electrodes was carried out at room temperature using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) images, atomic force microscopy (AFM) and Fourier transform infrared (FTIR) spectra. Cyclic voltammetry (CV) and electrochemi
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func