The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Imidacloprid is systemic insecticide (1-[(6-chloro-3-pyridinyl) methyl]-N-nitro-2-imidazolidinimine) and the world’s most widely used has significant efficacy against a broad variety of pests and a unique mode of action by using it spreader and irrigation. The persistence of this pesticide in the soil means that it causes environmental damage that must be cleaned up. In this study collected and identified the best bacteria isolate that breakdown imidacloprid from the Plant Protection Director in Baghdad, which has been using neonicotinoid pesticides for years in their own greenhouse for pest control. Using high-performance liquid chromatography HPLC to measuring the residual concentrations of imidacloprid in MSM media at a concentration o
... Show MorePesticide biodegradation can be accomplished by the technique of bioremediation, which makes use of microorganisms’ ability to degrade pesticide residues. This study aimed to separate and identify imidacloprid-biodegradable from botanical fields soil of greenhouses in the Plant Protection Directorate /Ministry of Agriculture in Baghdad, which has been using imidacloprid pesticides for many years. Using high-performance liquid chromatography, residual imidacloprid concentrations in MSM medium at a concentration of 25 mg/L after 21 days were measured to identify the best degrading bacterial isolates. Isolate No.37 the best bacterial isolate was able to degrade 63% of imidacloprid. was
The long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreThe target of this study was to synthesize several new Ciprofloxacin drug analogs by providing a nucleophilic substitution procedure that provides new functionality at the carboxylic group location. The analogs were synthesized, designed, and characterized by 1HNMR, and FTIR. The synthetic path began from the reaction of ciprofloxacin drug with morpholine to give compound[B], ciprofloxacin derivative was linked with a variety of primary and secondary amines to give compounds[B1-B9]. The above-mentioned prepared compounds [B3 and B5] were applied to liver enzymes, and the increase in the activity of these enzymes was observed. In addition, a theoretical study was conducted to study the energies and properties of the prepared co
... Show MoreEach sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreGlobal Navigation Satellite Systems (GNSS) have become an integral part of wide range of applications. One of these applications of GNSS is implementation of the cellular phone to locate the position of users and this technology has been employed in social media applications. Moreover, GNSS have been effectively employed in transportation, GIS, mobile satellite communications, and etc. On the other hand, the geomatics sciences use the GNSS for many practical and scientific applications such as surveying and mapping and monitoring, etc.
In this study, the GNSS raw data of ISER CORS, which is located in the North of Iraq, are processed and analyzed to build up coordinate time series for the purpose of detection the
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show More