The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The purpose of this preliminary study is to verify the possibility of using Iraqi Zahdi date palm biomass as a resource for biogas production, methane in particular using thermophilic anaerobic digestion with waste water treatment activated sludge. Moreover, is to investigate the influence of extra nutrients addition to the digestion mixture. Biogas was captured in sealed jars with remote sensing modules connected to computer with integrated program to record the gas pressure continuously. A total gas pressure with 67% Methane was produced from date pulp waste fermentation with a yield of 0.57 Lit for each gram volatile solid of substrate. Addition of 1% yeast extract solution as nutrient increased Methane yield in liters by 5.9%. This i
... Show MoreThe research aims to explore the difficulties that encounter teaching geography of cities as perceived by female students. A total of (113) third stage female students / Geography Dept / college of education for women were chosen as a sample for the study. To collect the required data, a questionnaire was used as an instrument; it consisted of six parts represent teaching difficulties. It was a three-point Likert scale instrument with 1 signifying ‘main difficulty, 2 ‘sub-difficulty, and 3 ‘no difficult'. The difficulties organized in descend order, to analyze data, SPSS tool was used. The results revealed that the difficulties of content ranged (2.15-1.18), difficulties of education techniques ranged (2.47-2.04), difficulties of t
... Show MoreIn this work, a CW CO2 laser was used for cutting samples of the fiber-reinforced
plastics (FRP) of three different types of reinforcing material; aramide, glass and carbon.
Cutting process was investigated throughout the variation of some parameters of cutting
process and their effects on cutting quality as well as the effect of an inert gas exist in the
interaction region and finally using a mechanical chopper in order to enhance the cutting
quality. Results obtained explained the possibility to perform laser cutting with high
quality in these materials by good control of the parameters and conditions of the process.
In the present work, a D.C. magnetron sputtering system was
designed and fabricated. This chamber of this system includes two
coaxial cylinders made from copper .the inner one used as a cathode
while the outer one used as a node. The magnetic coils located on
the outer cylinder (anode) .The profile of magnetic field for various
coil current (from 2Amp to 14Amp) are shown. The effect of
different magnetic field on the Cu thin films thickness at constant
pressure of 7x10-5mbar is investigated. The result shown that, the
electrical behavior of the discharge strongly depends on the values
of the magnetic field and shows an optimum value at which the
power absorbed by the plasma is maximum. Furthermore, the
pl
Abstract. In this research, the uranium concentration in (16) water samples collected from some agricultural areas surrounded with AlTuwitha nuclear site in Baghdad-Iraq was measured by using a CR-39 detector. The concentration of uranium in this study was from (0.6 ± 0.33mg/l) to (2.51 ± 0.49 mg/l), and the weighted average for the concentrations (1.262 ± 0.402 mg/l). The results showed it is a concentration of uranium level in water samples studied is higher than the allowed limit recommended by WHO and ICRP.
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreCommunication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p