Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. The suggested multistage QKD applies different random commutative sets of Euler’s angles to the transmitted qubits. If Eve successfully hacked the Euler’s angles of a transmitted qubit, Bob will predict the hacking event because other bits apply different Euler’s angles. The commutative sets of Euler’s angles should be selected by a prior agreement between Alice and Bob. Our approach provides additional security proof for the multistage QKD protocol enabling safe public sharing of a sifted key between the sender and receiver
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreDuring the last few decades, many academic and professional groups gave attention to adopting the multi-criteria decision-making methods in a variety of contexts for decision-making that are given to the diversity and sophistication of their selections. Five different classification methods are tested and assessed in this paper. Each has its own set of five attribute selection approaches. By using the multi-criteria decision-making procedures, these data can be used to rate options. Technique for order of preference by similarity to ideal solution (TOPSIS) is designed utilizing a modified fuzzy analytic hierarchy process (MFAHP) to compute the weight alternatives for TOPSIS in order to obtain the confidence value of each class
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreThe added value of internal audit greatly contributes to adding value to the institution, but most departments of economic units in Iraq neglected the role of internal audit and the added value that can be achieved by those institutions, since the term added value of internal audit is a relatively vague term from the premise that what cannot be measured is difficult Determine it, and perhaps descriptive standards for it is the extent of compliance with international auditing standards (IIA).
The research aims to study the procedures and results of auditing to verify that they have given an added value to the audit with a positive impact, develop its aspects and research, identify deficiencies for the audi
... Show MoreDensity Functional Theory (DFT) at the B3LYP/ 6-311G basis set level and
semiemperical methods (PM3, AM1, and MINDO/3) were performed on six new
substituted Schiff bases derivatives of INHC (N-(3-(phenylidene-allylidene)
isonicotinohydrazide) using Gaussian-03 program. The calculated quantum chemical
parameters correlated to the inhibition efficiency were studied and discussed at their
equilibrium geometry and their correct symmetry (Cs). Comparisons of the order of
inhibition efficiency of the Schiff bases derivatives, and local electrophilic and
nucleophilic reactivity have analyzed. Some physical properties also were studied
such as heat of formation, total energy and dipole moment...etc. Also vibration
freq
The behavior investigation of castellated beams with fiber-reinforced lightweight concrete deck slab as a modified choice for composite steel-concrete beams affected by harmonic load is presented in this study. The experimental program involved six fixed-supported castellated beams of 2140mm size. Three types of concrete were included: Normal Weight Concrete (NWC), Lightweight Aggregate Concrete (LWAC), and Lightweight Fiber-Reinforced Aggregate Concrete (LWACF). The specimens were divided into two groups: the first comprised three specimens tested under harmonic load effect of 30Hz operation frequency for 3 days, then the residual strength was determined through static load application. The second group included three specimens ide
... Show MoreThis study was carried out at the Dept. Hortic. and Land.Gard., Coll. Agric. Eng.Sci., University of Baghdad during fall season of 2019-2020, in order to evaluate the effect of nutrient solution type under hydroponic system (NFT) on growth, yield and quality of broccoli Brassica oleracea var.italica. Two experiments were carried out which were the standard solution experiment (Cooper) and the alternative solution experiment (ABEER) prepared from fertilizers. Results revealed that the type of solution used in the hydroponics system had non significant effect on the leaves content of N,K, Mg, Fe, Cu, B, Chlorophyll, leaves number, root length, weight of the main heads, number of side heads were not significantly affected. 13nt, refl
... Show MoreIn this study, pebble bed as an absorber and storage material was placed in a south facing, flat plate air-type solar collector at fixed tilt angle of (45°). The effect of this material and differ- ent parameters on collector efficiency has been investigated experimentally and
theoretically. Two operation modes were employed to study the performance of the solar air heater. An inte- grated mode of continuous operation of the system during the period of (11:00 am – 3:00 pm) and non-integrated mode in which the system stored the solar energy through the day then used the stored energy during the period of (3:00 pm – 8:00 pm). The results of parametric study in case of continuous operating showed that the maximum average temperatur