Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreIn this work, the methods (Moments, Modified Moments, L-Moments, Percentile, Rank Set sampling and Maximum Likelihood) were used to estimate the reliability function and the two parameters of the Transmuted Pareto (TP) distribution. We use simulation to generate the required data from three cases this indicates sample size , and it replicates for the real value for parameters, for reliability times values we take .
Results were compared by using mean square error (MSE), the result appears as follows :
The best methods are Modified Moments, Maximum likelihood and L-Moments in first case, second case and third case respectively.
Background: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical
... Show MoreHartree-Fock calculations for even-even Tin isotopes using
Skyrme density dependent effective nucleon-nucleon interaction are
discussed systematically. Skyrme interaction and the general formula
for the mean energy of a spherical nucleus are described. The charge
and matter densities with their corresponding rms radii and the
nuclear skin for Sn isotopes are studied and compared with the
experimental data. The potential energy curves obtained with
inclusion of the pairing force between the like nucleons in Hartree-
Fock-Bogoliubov approach are also discussed.
In this paper, a new class of harmonic univalent functions was defined by the differential operator. We obtained some geometric properties, such as the coefficient estimates, convex combination, extreme points, and convolution (Hadamard product), which are required
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreBackground: Leukemia isba type of cancer of the blood or bone marrow that is characterized by an abnormal increase of white blood cells.
model is derived, and the methodology is given in detail. The model is constructed depending on some measurement criteria, Akaike and Bayesian information criterion. For the new time series model, a new algorithm has been generated. The forecasting process, one and two steps ahead, is discussed in detail. Some exploratory data analysis is given in the beginning. The best model is selected based on some criteria; it is compared with some naïve models. The modified model is applied to a monthly chemical sales dataset (January 1992 to Dec 2019), where the dataset in this work has been downloaded from the United States of America census (www.census.gov). Ultimately, the forecasted sales
This review explores the Knowledge Discovery Database (KDD) approach, which supports the bioinformatics domain to progress efficiently, and illustrate their relationship with data mining. Thus, it is important to extract advantages of Data Mining (DM) strategy management such as effectively stressing its role in cost control, which is the principle of competitive intelligence, and the role of it in information management. As well as, its ability to discover hidden knowledge. However, there are many challenges such as inaccurate, hand-written data, and analyzing a large amount of variant information for extracting useful knowledge by using DM strategies. These strategies are successfully applied in several applications as data wa
... Show More