Single-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant performance evaluation. The most remarkable result emerged from the simulated data generated and detected by commercial devices is that the modeling process provides guidance for single-photon detectors design and characterization. The validation and testing results of the single-photon avalanche detectors (SPAD) simulator showed acceptable results with the theoretical and experimental results reported in related references and the device's data sheets.
Thin films of microcrystalline and nanocrystalline -silicon carbide and silicon, where deposited on glass substrate with substrate temperature ranging from 350-400C, with deposition rate 0.5nm per pulse, by laser induced chemical vapor deposition. The deposition induced by TEACO2 laser. The reactant gases (SiH4 and C2H4) photo decompose throughout collision associated multiple photon dissociate. Such inhomogeneous film structure containing crystalline silicon, silicon carbide and amorphous silicon carbide matrix, give rise to a new type of material nanocrystalline silicon carbide in which the optical transmittance is governed by amorphous SiC phase while nanocrystalline grain are responsible for the conduction processes. This new m
... Show MoreThe calculation of the oil density is more complex due to a wide range of pressuresand temperatures, which are always determined by specific conditions, pressure andtemperature. Therefore, the calculations that depend on oil components are moreaccurate and easier in finding such kind of requirements. The analyses of twenty liveoil samples are utilized. The three parameters Peng Robinson equation of state istuned to get match between measured and calculated oil viscosity. The Lohrenz-Bray-Clark (LBC) viscosity calculation technique is adopted to calculate the viscosity of oilfrom the given composition, pressure and temperature for 20 samples. The tunedequation of state is used to generate oil viscosity values for a range of temperatu
... Show MoreThis paper introduces a Laplace-based modeling approach for the study of transient converter-grid interactions. The proposed approach is based on the development of two-port admittance models of converters and other components, combined with the use of numerical Laplace transforms. The application of a frequency domain method is aimed at the accurate and straightforward computation of transient system responses while preserving the wideband frequency characteristics of power components, such as those due to the use of high frequency semiconductive switches, electromagnetic interaction between inductive and capacitive components, as well as wave propagation and frequency dependence in transmission systems.
This research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreDandruff and seborrheic dermatitis (SD) are common skin disorders affecting the scalp and extending to other body sites in the case of SD. They are associated with pruritus and scaling, causing an esthetical disturbance in the population affected. Treatment of such conditions involves using a variety of drugs for long terms, thus optimizing drug formulation is essential to improve therapeutic efficacy and patient compliance. Conventional topical formulations like shampoos and creams have been widely used but their use is associated with disadvantages. To overcome such effects, novel topical nanotechnology-based formulations are currently under investigation. In the following article, we highlight recently published formulatio
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More