In this work we investigate and calculate theoretically the variation in a number of optoelectronic properties of AlGaAs/GaAs quantum wire laser, with emphasis on the effect of wire radius on the confinement factor, density of states and gain factor have been calculated. It is found that there exist a critical wire radius (rc) under which the confinement of carriers are very weak. Whereas, above rc the confinement factor and hence the gain increase with increasing the wire radius.
In this work, the linear properties of Vitamin D3-5000IU soft gel were investigated by measuring its absorption and fluorescence spectra. It was observed that there was a shift towards longer wavelength within limits (75 nm), with quantitative efficiency equal to (33.58%). The values of absorbance were used to calculate the extinction coefficient, optical refractive index, optical conductivity and optical dielectric constant values.
The non-linear properties of Vitamin D3-5000IU soft gel was also studied using the Z-Scan technique by using Neodymium-doped Yttrium Garnet (Nd: YAG) continuous laser (CW) emitting in &n
... Show MoreHighly-fluorescent Carbon Quantum Dots (CQDs) are synthesized in simple step by hydrothermal carbonization method of natural precursor such as orange juice as a carbon source. Hydrothermal method for synthesized CQDs requires simple and inexpensive equipment and raw materials, thus this method are now common synthesis method. The prepared CQDs have ultrafine size up to few nanometers and several features such as high solubility in water, low toxicity, high biocompatibility, photo-bleaching resistant, Chemical inertness and ease of functionalization which qualifies it for use in many applications such as bio-imaging, photo-labeling and photo-catalysis.
This research demonstrates the
... Show MoreThis study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreQuantum gates which are represented by unitary matrices have potentials to implement the reversible logic circuits. M and M+ gates are two well-known quantum gates which are used to synthesize the reversible logic circuits. In this work, we have used behavioral description of these gates, instead of unitary matrix description, to synthesize reversible logic circuits. By this method, M and M+ gates are shown in the truth table form.
In this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.