The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The main objective of e-learning platforms is to offer a high quality instructing, training and educational services. This purpose would never be achieved without taking the students' motivation into consideration. Examining the voice, we can decide the emotional states of the learners after we apply the famous theory of psychologist SDT (Self Determination Theory). This article will investigate certain difficulties and challenges which face e-learner: the problem of leaving their courses and the student's isolation.
Utilizing Gussian blending model (GMM) so as to tackle and to solve the problems of classification, we can determine the learning abnormal status for e-learner. Our framework is going to increase the students’ moti
In this work silicon solar cell has been used with semicircular grooves to improve its efficiency by reducing reflection of rays and increasing optical path through the cell. Software program for optical design (zemax) has been used by ray tracing mode to evaluate prototype efficiency when using detector beneath the cell. The prototype has aspect ratio (A.R=0.2) which is the best efficiency at incident angle (ϴ=0ͦ) and the best acceptance angle (ϴ=50ͦ).
Transference numbers of the aqueous zinc chloride and zinc sulphate solutions have been measured for the concentrations 0.03, 0.05, 0.07, 0.09 and 0.1 mol.dm-3at 298.15K, by using the modified Hittorf method. The dependence of transference number on concentration of each electrolyte was also investigated in an attempt to explain the value of the limiting transference number. The Longsworth method has been used for the extrapolation of zinc transference number in aqueous solutions, using the values of the limiting transference numbers of the appropriate values of the limiting equivalent conductance, it was possible to determine the corresponding values of the limiting ion conductance for the cations and anions of the electrolytes. The
... Show MoreBackground: Molars and premolars are considered as the most vulnerable teeth of caries attack, which is related to the morphology of their occlusal surfaces along with the difficulty of plaque removal. different methods were used for early caries detection that provide sensitive, accurate preoperative diagnosis of caries depths to establish adequate preventive measures and avoid premature tooth treatment by restoration. The aim of the present study was to evaluate the clinical sensitivity and specificity rates of DIAGNOdent and visual inspection as opposed to the ICDAS for the detection of initial occlusal caries in noncavitated first permanent molars. Materials and Methods: This study examined 139 occlusal surface of the first permanent
... Show MoreDust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so
... Show MoreQuantum calculations on the most stable structure were carried
out for calculating the electronic properties, energies and the charge
density at the Carbon and Hydrogen atoms by Semi-empirical
method (PM3) of zigzag carbon nano tube CNT (9,0) (SWCNTs), at
the equilibrium geometry depending on the pictures of Zigzag
CNT(9,0) which was found to has D3d symmetry point group by
applying for (Gaussian 2003) program. In this work the results
include calculation the relation for axial bonds length, which are the
vertical C-C bonds (annular bonds) in the rings and bonds length
which are in the outer ring that called the circumferential bonds. Also
include a different kind of vibration modes like breathing, puckering
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreThis study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877, Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae is the lesser species.
A summary of the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi
... Show MoreSingle Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.
This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p
... Show More