The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The research is based on the basic idea that companies today are moving towards a new trend towards protecting the environment coupled with the increasing wareness of the pollution damage caused by these companies due to their operations and activities in the environment. The two main reasons that led the researchers to choose this subject is the need to adapt the companies themselves in response to successive developments, The great development was that companies moved from the sole economic responsibility of the business to social responsibility by emphasizing socially responsible profit. The problem of research is the knowledge of the availability of the dimensions of the green processing series in Kirkuk Cement Factory The re
... Show MoreIn this article we study the variance estimator for the normal distribution when the mean is un known depend of the cumulative function between unbiased estimator and Bays estimator for the variance of normal distribution which is used include Double Stage Shrunken estimator to obtain higher efficiency for the variance estimator of normal distribution when the mean is unknown by using small volume equal volume of two sample .
Applications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreAbstract
Documentary credits are considered successful means to reduce imports, especially unnecessary imports that lead to the outflow of foreign currency from the country. However, due to the backwardness of the banking methods, the reintroduction of documentary credits after 2003 did not effectively contribute to reducing import rates. This has had a negative impact on the Iraqi economy and made it vulnerable to external markets. Documentary credits are also considered the best way to ensure payment in international trade, providing independent credit support and sufficient security for exporters and importers against commerci
... Show MoreIn this work the analysis of laser beam profile system ,using a two dimensional CCD (Charge Coupled Device) arrays, is established. The system is capable of producing video graphics that give a two dimensional image of laser beam. The video graphics system creates color distribution that represent the intensity distribution of the laser beam or the energy profile of the beam. The software used is capable of analyzing and displaying the profile in four different methods that is , color code intensity contouring , intensity shareholding, intensity cross section along two dimension x-y, and three dimensional plot of the beam intensity given in the same display.
In the name of God the Merciful
Praise be to God and the Hall and Peace Uncle Prophet Muhammad and blindness Alo and companions
Money is the lifeblood and a reason for living. An individual cannot live without money to make it
It is only through the necessities of life and the state that it can perform its duties and functions only
As money is so important, the state must regulate the balance of revenues
And expenses in order to avoid failure in Mizanitia, but perhaps the country may be exposed to crises
An exception that leads to misappropriation in the general Mizanitia and the Islamic Shari'ah is valid for Makkah
Time and place for all circumstances has created several ways to address the budget defici
As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.