Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
It highlights the importance of construction projects because of its significant role in the development of society, including the buildings FEDE projects to their importance to raise the level of education through the conclusion of the special to implementation and the establishment of schools of contracts at the country level, which requires the completion of the project at less time and within the cost specified and the best quality and may highlight the importance of time on all the elements of what has an important role in setting up the project for various reasons may be the need for the use of schools as soon as possible, but the reality showed exceeded the completion of those schools could be up to 6 years and there are some cont
... Show MoreA preventing shield for neutrons and gamma rays was designed using alternate layers of water and iron with pre-fixed dimensions in order to study the possibility of attenuating both neutrons and gamma-rays. ANISN CODE was prepared and adapted for the shield calculation using radiation doses calculation: Two groups of cross-section were used for each of neutrons and gamma-rays that rely on the one – dimensional transport equation using discrete ordinate's method, and through transforming cross-section values to values that are independent on the number of groups. The memory size required for the applied code was reduced and the results obtained were in agreement with those of standard acceptable document samples of cross –section, this a
... Show MoreKE Sharquie, AA Al-Bayatti, AI Al-Ajeel, AJ Al-Bahar, AA Al-Nuaimy, Saudi medical journal, 2007 - Cited by 63
Modified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreModified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreThis study was conducted to assess the hydrocarbon degradation abilities of Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae, which isolated from diesel contaminated soil samples. Single strains and mixed bacterial consortia have been investigated their ability to degrade 1.0 % (v/v) of diesel oil in Bushnell- Haas medium as sole.carbon.and.energy.source. At temperature 30∘C, the individual.bacterial.isolates exhibited low growth and low degradation.than did the.mixed. bacterial.culture. After 28 days.of incubation the.combination.of four isolates degraded.an upper limit.of diesel 88.4%. This was. continued.by 85.1% by S. paucimobilis, 84 % by Pentoae sp., 79% by S.aureus, and
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show More