The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation technique .. It was obse
... Show MoreIn this paper a comparison of the experimental of evacuated tube solar water heater systems with and without mirror flat reflector. The aim of using the reflector to improve thermal efficiency, and the data gathered which are (temperature, solar irradiation and time) for three days were compared. the results from compared data the temperature lower increase in evacuated tube solar water heater system without reflector than the temperature increase in evacuated tube solar water heater system with reflector .The results show (53, 39, 35) % for three days respectively that the evacuated tube solar water heater system with reflector has higher thermal efficiencies than the results (47, 28, 30) % for three days respectively thermal efficiencies
... Show MoreThe process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process
Zygapophyseal joints (or facet joints), are a plane synovial joint which located between the articular facet processes of the vertebral arch which is freely guided movable joints. Ten dried vertebrae were used for the lumbar region and taking (L4) as a sample to reveal stress pathways across the joints by using ANSYS program under different loading conditions which used Finite Elements Analysis model. Results obtained from the ANSYS program are important in understanding the boundary conditions for load analysis and the points of stress concentration which explained from the anatomical point of view and linked to muscle and ligament attachments. This model used as a computational tool to joint biomechanics and to prosthetic im
... Show MoreThe subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this article it is proved experimentally that the photon is a particle that has mass and constant wavelength by explaining the effect of refractive index on the wavelength and the natural mass of photon. It is very difficult to measure the mass of photon, a simple and easy process was proposed in this paper to calculate the mass length of photon in vacuum (Y) and in medium (Y*), by measuring the length of laser beam in air (Lair) and in medium (Lmed). A new method was postulated to calculate refractive index by using these relations (n = Y*/Y), and (n = Lmed / Lair) which supposed a new theory of light.
Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreGas sensors are essential for detecting noxious gases that have a detrimental effect on people's health and welfare. Carbon quantum dots (CQDs) are the fundamental component of gas detectors. CQDs and graphene (Gr) were prepared using the electrochemical method. The gas sensitivity of these materials was evaluated at different temperatures (150, 200, 250 °C) to assess their effectiveness. Subsequently, experiments were conducted at different temperatures to ascertain that the combination of CQDs and Gr, with various percentages of Gr and CQDs, exhibited superior gas sensitization properties compared to CQDs alone. This was evaluated based on criteria such as sensitivity, recovery time, and reaction time. Interestingly, the combination was
... Show More