The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
Asthma is a chronic inflammatory disease that involves the narrowing of the lung airways and excessive mucus production. Resveratrol (RES), a polyphenolic stilbene, is known to control asthmatic attacks via different molecular mechanisms. However, no studies have examined the effect of resveratrol on the microbiome in the ovalbumin (OVA)-induced asthma mouse model. In this study, we induced asthma in BALB/c mice by injecting OVA followed by 7 days treatment with RES. Plethysmography showed that the expiratory resistance in the lung tissue was significantly reduced in the RES treated group, while mean volume, peak expiratory flow, and frequency of respiration was increased. Histopathol
The current research aimed to identify the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis. It also aims to identify the recovery and resuming plan to the business environment. The research followed the descriptive survey to find out the views of 34 internal auditors at various functional levels in the Kingdom of Saudi Arabia. Spreadsheets (Excel) were used to analyze the data collected by a questionnaire which composed of 43 statements, covering the tasks that the internal auditors can perform to face the COVID-19 crisis. Results revealed that the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis is to en
... Show MorePurpose: We report a series of 29 pediatric patients who sustained head injuries due to metallic ceiling fans. They all were admitted to the Emergency Department of Neurosurgery Teaching Hospital in Baghdad, Iraq, during January 2015 to January 2017. Results: Pediatric ceiling fan head injuries are characterized by four traits which distinguish them from other types of head injuries; 1- Most of them were because of climbing on or jumping from furniture between the ages of two and five. 2- Most of them sustained compound depressed skull fracture which associated with intracranial lesions and pneumocephalus. 3- The most common indication for surgical intervention was because of dirty wound which mixed with hairs. 4- These variables were stati
... Show MoreThe topic of the research on the Observatory of the Walls on Jurisprudential Matters in the Hanafi Fiqh, by Imam San’a Allah bin Ali bin Khalil Al-Ala’iyya Wai al-Naqshbandi, al-Rumi, who died in 1137 AH, which includes seven chapters, the first section of it concerning division and related matters, and the second section in the adaptation It is the apportionment of benefits in common objects, the third section, which pertains to lines, surfaces, and bodies, the fourth section, which concerns the inclined wall and certification, and the fifth section, which concerns the provisions of the walls and its claims, and the sixth section, which concerns the door of roads and doors, the opening of the skylight, the sails of the wing, the can
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.