Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThis article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a
... Show MoreCommunicating effectively by gaining productive skills in a classroom setting is one of the critical goals of learning the English language. The current study was conducted to explore the correlation of EFL learners’ level of academic intelligence with their productive skills. The study tries to find an answer to what is the correlation between EFL learners’ academic intelligence and level of production skills. The study population represents EFL students at the departments of English language of the Iraqi Colleges of Education for the academic year (2022-2023). The sample includes 310 EFL students selected from the 3rd year of the Department of English of the College of Education, Ibn-Rushd for Human Sciences/University of Bagh
... Show MoreThe aim of this study is modeling the transport of industrial wastewater in sandy soil by using finite element method. A washing technique was used to remove the industrial wastewater from the soil. The washing technique applied with an efficient hydraulic gradient to help in transport of contaminant mass by advection. Also, the mass transport equation used in modeling the transport of industrial wastewater from soil includes the sorption and chemical reactions. The sandy soil samples obtained from Al-Najaf Governorate/Iraq. The wastewater contaminant was obtained from Al- Musyiebelectricity power plant. The soil samples were synthetically contaminated with four percentages of 10, 20, 30 and 40% of the contaminant and these percentages calc
... Show MoreIraq has the second largest proven oil reserves in the world. According to oil experts, it is expected that the Iraq's reserves to rise to 200+ billion barrels of high-grade crude.
Oil is a strategic commodity for producing and exporting countries in general, and Iraq in particular, as demonstrated by the international experience that oil is an important means to achieve economic growth, an important tool in the overall economic, social and political development. It is also an important source of hard currency for any national economy and a means to connect the local economy and the global economy. In this paper we focus our attention on selecting the best regression model that explain the effect of human capita
... Show MoreIn this paper, we have derived Bayesian estimation for the parameters and reliability function of Perks distribution based on two different loss functions, Lindley’s approximation has been used to obtain those values. It is assumed that the parameter behaves as a random variable have a Gumbell Type P prior with non-informative is used. And after the derivation of mathematical formulas of those estimations, the simulation method was used for comparison depending on mean square error (MSE) values and integrated mean absolute percentage error (IMAPE) values respectively. Among of conclusion that have been reached, it is observed that, the LE-NR estimate introduced the best perform for estimating the parameter λ.
: The aim of this research is to investigate the impact of Woods ' strategy in collecting second graders average for physics. To achieve the objective researcher coined the following hypothesis: there was no statistically significant difference at a level (0.05) between the average grades of the experimental group students studying physics as Woods and strategy between the average control group students who are studying the same article in the regular way. Test collection. Search sample amounted to (83) students and (42) students for the experimental group, and (41) students for the control group. Students were subjected to test experiment is composed of (30) after the completion of the experiment. And use appropriate statistical methods re
... Show MoreA session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Abstract:
Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas
... Show MoreA computational investigation has been carried out to describe synthesis optimization procedure of magnetic lenses. The research is concentrated on the determination of the inverse design of the symmetrical double polepiece magnetic lenses whose magnetic field distribution is already defined. Magnetic lenses field model well known in electron optics have been used as the axial magnetic field distribution. This field has been studied when the halfwidth is variable and the maximum magnetic flux density is kept constant. The importance of this research lies in the possibility of using the present synthesis optimization procedure for finding the polepieces design of symmetrical double polepiece magnetic lenses which have the best proje
... Show More