In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
In this paper, tunable optical band-pass filters based on Polarization Maintaining Fiber –Mach Zehnder Interferometer presented. Tunability of the band-pass filter implemented by applying different mechanical forces N on the micro-cavities splicing regions (MCSRs). The micro-cavity formed by using three variable-lengths of single-mode polarization-maintaining fiber with (8, 16, 24) cm lengths, splice between two segments of (SMF-28) with (26, 13) cm lengths, using the fusion splicing technique. Ellipsoidal shape micro-cavities experimentally achieved parallel to the propagation axis having dimensions between (12-24) μm of width and (4-12) μm of length. A micro-cavity with width and length as high as 24 μm and 12 μ
... Show Morethe electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreIn this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
The aim of this research is to find the impact of the efficiency of Management information systems (MIS) on the effectiveness of governmental organizations performance.
To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research attemped to answer the following question: To achieve the objective of the research, the analytical descriptive method was adopted. A questionnaire was designed consisting of (35) paragraphs, and the sample consisted of (200) individual. The research tried to answer the following question: What is the actual utilization of modern admi
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreA microbial desalination cell (MDC) is a new approach to bioelectrochemical systems. It provides a more sustainable way to electrical power production, saltwater desalination, and wastewater treatment at the same time. This study examined three operation modes of the MDC: chemical cathode, air cathode, and biocathode MDC, to give clear sight of this system's performance. The experimental work results for these three modes were recorded as power densities generation, saltwater desalination rates, and COD removal percentages. For the chemical cathode MDC, the power density was 96.8 mW/m2, the desalination rate was 84.08 ppm/hr, and the COD removal percentage was 95.94%. The air cathode MDC results were different
... Show MoreThis paper introduces a non-conventional approach with multi-dimensional random sampling to solve a cocaine abuse model with statistical probability. The mean Latin hypercube finite difference (MLHFD) method is proposed for the first time via hybrid integration of the classical numerical finite difference (FD) formula with Latin hypercube sampling (LHS) technique to create a random distribution for the model parameters which are dependent on time [Formula: see text]. The LHS technique gives advantage to MLHFD method to produce fast variation of the parameters’ values via number of multidimensional simulations (100, 1000 and 5000). The generated Latin hypercube sample which is random or non-deterministic in nature is further integ
... Show More
