The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
Each phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho
... Show MoreBeen Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
One of the most important challenges facing the designers of the sewerage system is the corrosion of sewers due to the influence of sewerage contaminates which lead to failure of the main lines of sewers. In this study, a reference mix of 1: 1.5: 3 was used and the 4% Flocrete PC200 by weight of cement was added to the same mixing ratio in the second mixture. Twenty-four samples were tested for each mixture, 12 of which were used to compression strength test in ages (7, 14 and 28) day and six samples were submerged after 28 days of wet treatment at (5 and 10) % concentrations of sulfuric acid. The other six samples were painted after 28 days of wet treatment with coating Polyurethane and after 24 hours were flooded with a concentrat
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
In this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.
The aim of this work is to evaluate concentrations of natural and artificial radionuclide in nine different samples of condiments from local markets. The concentrations of 238 U , 232 Th ,40k and 137Cs were measured by using gamma spectroscopy with a high- purity germanium detector. The concentrations of 238 U, 232 Th ,40k and 137Cs were found to be in a range of (21.4 - 91.13), (15.7 - 88.11) , (285.56 – 1100) and (5.1 - 27.5) Bq.kg-1 respectively. These concentrations are not hazardous to public health and the activities are within the allowed levels
G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the R
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreIraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.
The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, w
... Show More