The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreThe adoption of many mathematical concepts contributes to the construction of models of sports and the population can be interpreted to explain the movement and growth of the population lead to proper planning to manage the requirements of the population and meet their needs of providing education or providing medical services, health and others. In this study, the number of births in the Governorate of Basrah for the period (1998-2050) is estimated to be based on the assumption that the population of the visually impaired is a stable society. If the rate of growth is (0.0492), some demographic indicators are important for maintaining the average age of women at pregnancy (27.817). Each woman will give birth (3.74) female birth d
... Show MoreA low-cost reverse flow plasma system powered by argon gas pumping was built using homemade materials in this paper. The length of the resulting arc change was directly proportional to the flow rate, while using the thermal camera to examine the thermal intensity distribution and demonstrating that it is concentrated in the centre, away from the walls at various flow rates, the resulting arc's spectra were also measured. The results show that as the gas flow rate increased, so did the ambient temperature. The results show that the medium containing the arc has a maximum temperature of 34.1 ˚C at a flow rate of 14 L/min and a minimum temperature of 22.6 ˚C at a flow rate of 6 L/min.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreGypsum Plaster is an important building materials, and because of the availabilty of its raw materials. In this research the effect of various additives on the properties of plaster was studied , like Polyvinyl Acetate, Furfural, Fumed Silica at different rate of addition and two types of fibers, Carbon Fiber and Polypropylene Fiber to the plaster at a different volumetric rate. It was found that after analysis of the results the use of Furfural as an additive to plaster by 2.5% is the optimum ratio of addition to that it improved the flexural Strength by 3.18%.
When using Polyvinyl Acetate it was found that the ratio of the additive 2% is the optimum ratio of addition to the plaster, because it improved the value of the flexural stre
A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreExponential Distribution is probably the most important distribution in reliability work. In this paper, estimating the scale parameter of an exponential distribution was proposed through out employing maximum likelihood estimator and probability plot methods for different samples size. Mean square error was implemented as an indicator of performance for assumed several values of the parameter and computer simulation has been carried out to analysis the obtained results
The present research aims to measure concentration of lead Pb214 in soil using remote sensing and GIS, associated radiological hazards in Baghdad, Iraq. Concentration of specific radioactivity of radioactive elements was measured and analyzed naturally and artificially in 48 soil samples for separate sites from Baghdad, Iraq using crystalline spectroscopy to detect germanium. The average radioactivity concentrations of lead were found, as it was found to have varying values from one site to another, as most of them exceeded the international permissible limit, as the highest concentration was recorded at 180 Bq in the sample H28 in Waziriyah district. Battery Lab (1), and the lowest concentration valu
... Show MoreBy using governing differential equation and the Rayleigh-Ritz method of minimizing the total potential energy of a thermoelastic structural system of isotropic thermoelastic thin plates, thermal buckling equations were established for rectangular plate with different fixing edge conditions and with different aspect ratio. The strain energy stored in a plate element due to bending, mid-plane thermal force and thermal bending was obtained. Three types of thermal distribution have been considered these are: uniform temperature, linear distribution and non-linear thermal distribution across thickness. It is observed that the buckling strength enhanced considerably by additional clamping of edges. Also, the thermal buckling temperatures and
... Show More