The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This study focused on treatment of real wastewater rejected from leather industry in Al-Nahrawan city in Iraq by Electrocoagulation (EC) process followed by Reverse Osmosis (RO) process. The successive treatment was applied due to high concentration of Cr3+ ions (about 1600 ppm) rejected in wastewater of this industry and for applying EC with moderate power consumption and better results of produced water. In Electrocoagulation process (EC), the effect of NaCl concentration (1.5, 3 g/l), current density (C.D.) (15-25 mA/cm2), electrolysis time (1-2 h), and distance between electrodes (E.D.) (1-2 cm) were examined in a batch cell by implementing Taguchi experimental design. According to the results obtained from multiple regression and signa
... Show MoreThe present study aims at knowing the reasons of the student of secondary school abstention from participation in the theatrical activity, and to know the reasons that resulted in this abstention. In addition to that, the study aims at knowing the differences according to variables (gender, scholastic stage, and major of study). The sample of the study was chosen from the secondary schools in Baghdad in the random manner from Al-Karakh and Al-Rusafa districts of (147) students. The questionnaire was used to collected data.
The result showed that all the items are intense, the item of (Students do not know how to use their leisure time) obtained the hi
... Show MoreEnvironment suffered in recent years a large corrupting by human; and because of his ignorance of the dimensions of Caliphate in the ground and ignore what it means gearing. The gearing is that the son of Adam, which will benefit the board of Allah Almighty to him in the land of the causes of life, without exaggeration or negligence and without prejudice to the cosmic Balnoames enacted by the Almighty Creator, has urged verses of the Quran Muslim to preserve and protect the environment which is a religious duty, as it showed a great verses he is the author and the splendor and beauty of workmanship and manufacturer greatness of the Almighty, who created all things beautiful.
Koran played a major role in the consolidation of environmen
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreA land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.