The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Background: This in vitro study was carried out to evaluate the effects of various veneering dentin ceramic thicknesses and repeated firings on the color of lithium disilicate glass-ceramic (IPS e.max Press) and zirconium-oxide (IPS ZirCAD) all-ceramic systems, measured by clinical spectrophotometers (Easyshade Advance 4.0) . Materials and methods: The 72specimens cube-shaped have the dimension of about 11 mm in width, 14 mm in length, 1mm in thickness, these cores divided into 3 groups according to the type of material each group have (24)core specimens. Each group had been divided into three sub-groups (each having 8 specimens) according to veneering with dentin ceramic thicknesses: as 0.5, 1, or 2 mm (n=8). IPS e.max press and ZirCAD c
... Show MoreIt is an established fact that substantial amounts of oil usually remain in a reservoir after primary and secondary processes. Therefore; there is an ongoing effort to sweep that remaining oil. Field optimization includes many techniques. Horizontal wells are one of the most motivating factors for field optimization. The selection of new horizontal wells must be accompanied with the right selection of the well locations. However, modeling horizontal well locations by a trial and error method is a time consuming method. Therefore; a method of Artificial Neural Network (ANN) has been employed which helps to predict the optimum performance via proposed new wells locations by incorporatin
The problem of solid waste from domestic, industrial, commercial and medical sources is one of the most important problems facing the local administration in all Iraqi cities. The danger of this problem increases with the rapid increase in the population, changing lifestyles, consumption patterns, limited land suitable for landfill, and high costs of collection and disposal. This research aims to solve these problems by determining the locations of current landfills located in the outskirts of Baghdad Governorate. The ArcGIS program was used, where the sites of the landfills were determined on the map and through the available data about the areas. it was concluded that the existing landfill sites do not meet environmental conditions and
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreEstimation of the tail index parameter of a one - parameter Pareto model has wide important by the researchers because it has awide application in the econometrics science and reliability theorem.
Here we introduce anew estimator of "generalized median" type and compare it with the methods of Moments and Maximum likelihood by using the criteria, mean square error.
The estimator of generalized median type performing best over all.
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More