The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
This study was carried out in order to determine the toxic, mutagenic and antimutagenic effects for Mallow (Malva parviflora) in comparison to its mutagenic effect of Ultraviolet (UV) because it is consider physical mutagen by using parameters for the extract pri , with , post UV exposure by using bacterial system (G-system). The used system consisted of three isolates G3 Bacillus spp., G12 Arthrobacter spp. and G27 Brevibacterium spp.. The study depended on recording survival fraction (Sx) for studying the effects and induction of Streptomycin and Refampicin resistance mutants as a genetic markers.Water Extract was prepared from fresh and dry mallow leaves, stems, flowers and roots, in optimum concentration equal to (125µg/ml) which is
... Show MoreIn this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.
The buildup factor of cylindrical samples (shields) for Brass, Copper & lead (Brass, Cu, Pb (was studied, where buildup factor were calculated with thickness between (0-12) m.f.p. for Co60 and Cs137sources with activities (30) & (41) MBq respectively , using scintillation detector NaI(T?) with (3"×3")volume .The results shows increases of buildup factor for low atomic number(Z) samples where the energy of radiation source was constant, also shows increases of buildup factor with decreases the energy of radiation source. An empirical equation was obtained using Matlab7 program this equation have agreements with most obtained data for 96%.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThis research deals with increasing the hardening and insulating the petroleum pipes against the conditions and erosion of different environments. So, basic material of epoxy has been mixed with Ceramic Nano Zirconia reinforcement material 35 nm with the percentages (0,1,2,3,4,5) %, whereas the paint basis of broken petroleum pipes was used to paint on it, then it was cut into dimensions (2 cm. × 2 cm.) and 0.3cm high. After the paint and percentages are completed, the samples were immersed into the paint. Then, the micro-hardness was checked according to Vickers method and thermal inspection of paint, which contained (Thermal conduction, thermal flux and Thermal diffusivity), the density of the painted samples was calculate
... Show MoreIn this work, a method for the simultaneous spectrophotometric determination of zinc which was precipitated into deionized water that is in a commercial distribution systems PVC pipe, is proposed using UV-VIS Spectrophotometer. The method based on the reaction between the analytes Zn2+ and 2-carboxy-2-hyroxy-5-sulfoformazylbenze (Zincon) at an absorption maximum of 620nm at pH 9-10. This ligand is selective reagent. Since the complex is colored (blue), its stoichiometry can be established using visible spectrometry to measure the absorbance of solutions of known composition. The stoichiometry of the complex was determined by Job’s method and molar ratio method and found to be 1:2 (M: L). A series of synthetic solution containing different
... Show MoreExperimental results for the density of states of hydrogenated amorphous silicon due to Jackson et al near the valence and conduction band edges were analyzed using Levenberg-Marquardt nonlinear fitting method. It is found that the density of states of the valence band and the conduction band can be fitted to a simple power law, with a power index 0.60 near the valence band edge, and 0.55 near the conduction band edge. These results indicate a modest but noticeable deviation from the square root law (power index=0.5) which is found in crystalline semiconductors. Analysis of Jackson et al density of states integral J(E) data over about (1.4 eV) of photon energy range, showed a significant fit to a simple power law with a power index of 2.11
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
This paper is devoted to compare the performance of non-Bayesian estimators represented by the Maximum likelihood estimator of the scale parameter and reliability function of inverse Rayleigh distribution with Bayesian estimators obtained under two types of loss function specifically; the linear, exponential (LINEX) loss function and Entropy loss function, taking into consideration the informative and non-informative priors. The performance of such estimators assessed on the basis of mean square error (MSE) criterion. The Monte Carlo simulation experiments are conducted in order to obtain the required results.