The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The electron correlation for inter-shells (1s 2p), (1s 3p) and (1s 3d) was described by the inter-particle radial distribution function f(r12). It was evaluated for Li-atom in the different excited states (1s2 2p), (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). The inter particle expectation values for these shells were also evaluated. The calculations were performed using Mathcad 14 program.
In this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically) the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements
HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
In this study a DFT calculation on cyclopropanone, cyclopropandione and cyclopropantrione molecules was performed using the basis function 6-31G ** / MP2 and exchange correlation potential B3-LYP. The results showed that the ground state of all molecules geometry belong to the point group ð¶2ð‘£where a vibronic coupling between the vibrational motion with the electronic ground state in the molecule C3O3 this leads to a reduction in symmetry of the molecule fromð·3â„Žto ð¶2ð‘£, the driving force of this process is accessing to the electronic configuration complies with Hückel aromatic systems with two electrons. Also in this, study the normal modes of vibration, frequencies, intensities and symm
... Show MoreAbstract The League of Arab States took many procedures against the Syrian political system, like suspended Syria's membership in the League of Arab States and sent a team of Arab observers headed by Dabi to discuss the situation there and issued some decisions and statements that called the Syrian regime to stop the use of violence and repression against the Syrian opposition.Through these steps, the Arab League has tried to help the Syrian parties to resolve the crisis. However, the role of the league in the Syrian crisis was characterized by weakness in general, and lack of seriousness, which contributed in the aggravation of the situation in Syria, and the intervention of major powers in the internal affairs of Syria.
In the present work, the nuclear shell model with Hartree–Fock (HF) calculations have been used to investigate the nuclear structure of 24Mg nucleus. Particularly, elastic and inelastic electron scattering form factors and transition probabilities have been calculated for low-lying positive and negative states. The sd and sdpf shell model spaces have been used to calculate the one-body density matrix elements (OBDM) for positive and negative parity states respectively. Skyrme-Hartree-Fock (SHF) with different parameterizations has been tested with shell model calculation as a single particle potential for reproducing the experimental data along with a harmonic oscillator (HO) and Woods-Saxo
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show More