The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This paper addresses the new coloring in the concept of dystopian society as represented by the positive role of one of the characters vs. the passive role of the government and its mutual effect on the people of the society. In addition, it describes how all men in the dystopian society victimize and degrade the other through unlawful acts, like: stealing, rape, and fear, which are the lowest points in a moral decay. However, it offers hope by illustrating a positive sense, as exemplified by the doctor's wife out of Saramago's optimistic view that men may be descended from good women. Accordingly, the paper aims to examine the effect of the government’s role in the lives of the people who have later turned into blind in a dystopi
... Show MoreThe appliance of milligauss meter was designed by Qusay Ismail to measure the induce of electromagnetic field for home appliance which are put at a distance from milligauss meter (15-30-60)cm .The results showed some appliance has recorded higher than normal acceptable level of electromagnetic radiation emissions and produced radiation of (350650)milligauss as for the rest of appliances has recorded values which are ranged between (1200)milligauss ,laptop was recorde radiation generally lower than from desktop and computer moniter (CRT).The radiation ,intensity decrease with increasing distance.
This paper addresses the new coloring in the concept of dystopian society as represented by the positive role of one of the characters vs. the passive role of the government and its mutual effect on the people of the society. In addition, it describes how all men in the dystopian society victimize and degrade the other through unlawful acts, like: stealing, rape, and fear, which are the lowest points in a moral decay. However, it offers hope by illustrating a positive sense, as exemplified by the doctor's wife out of Saramago's optimistic view that men may be descended from good women. Accordingly, the paper aims to examine the effect of the government’s role in the lives of the people who have later turned into blind in a dystopian so
... Show MorePorous silicon was prepared by using electrochemical etching process. The structure, electrical, and photoelectrical properties had been performed. Scanning Electron Microscope (SEM) observations of porous silicon layers were obtained before and after rapid thermal oxidation process. The rapid thermal oxidation process did not modify the morphology of porous layers. The unique observation was the pore size decreased after oxidation; pore number and shape were conserved. The wall size which separated between pore was increased after oxidation and that effected on charge transport mechanism of PS
Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreThe aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid
... Show MoreLeishmania species are the causative agent of a tropical disease known as leishmaniasis. Previous studies on the old world species Leishmania major, showed that the amastigotes form which resides inside the macrophage of the vertebrate host, utilize host’s sphingolipids for survival and proliferation. In this study, gene expression of serine palmitoyltransferase (SPT) subunit two (MmLCB2) of the mouse macrophage cell line (RAW264.7), which is the first enzyme in the de novo sphingolipid biosynthesis, was detected in both infected and non-infected macrophages. This was detected under condition where available sphingolipid was reduced, with the new world species Leishmania mexicana. Results of qPCR analysis showed that there was no differen
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More