In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
This study was conducted to describe a protocol for the callus establishing culture of Lavandula angustifolia plant and estimating their content of volatile oil. The quantity of volatile oil callus tissues was compared with that of leaves production. Callus was induced from leaf explants on Murashige and Skoog medium (MS) supplemented with Naphthalene acetic acid (NAA) and Benzyl adenine (BA) in different concentrations. Maximum callus fresh weight was obtained in the combination of 10 mg/L BA and 3 mg/L NAA which reached 18 g after four weeks. The results of this work showed that the quantity of volatile oil from the highest fresh weight callus was 6 ml compared with quantity of 18g of leaves which gave 0.5 ml. Volatile o
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreThe research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distribut
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreMy research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreIn this paper, we present some numerical methods for solving systems of linear FredholmVolterra integral equations of the second kind. These methods namely are the Repeated Trapezoidal Method (RTM) and the Repeated Simpson's 1/3 Method (RSM). Also some numerical examples are presented to show the efficiency and the accuracy of the presented work.
This paper is interested in comparing the performance of the traditional methods to estimate parameter of exponential distribution (Maximum Likelihood Estimator, Uniformly Minimum Variance Unbiased Estimator) and the Bayes Estimator in the case of data to meet the requirement of exponential distribution and in the case away from the distribution due to the presence of outliers (contaminated values). Through the employment of simulation (Monte Carlo method) and the adoption of the mean square error (MSE) as criterion of statistical comparison between the performance of the three estimators for different sample sizes ranged between small, medium and large (n=5,10,25,50,100) and different cases (wit
... Show MoreIn this paper, Bayes estimators for the shape and scale parameters of Weibull distribution have been obtained using the generalized weighted loss function, based on Exponential priors. Lindley’s approximation has been used effectively in Bayesian estimation. Based on theMonte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s).
The analysis of survival and reliability considered of topics and methods of vital statistics at the present time because of their importance in the various demographical, medical, industrial and engineering fields. This research focused generate random data for samples from the probability distribution Generalized Gamma: GG, known as: "Inverse Transformation" Method: ITM, which includes the distribution cycle integration function incomplete Gamma integration making it more difficult classical estimation so will be the need to illustration to the method of numerical approximation and then appreciation of the function of survival function. It was estimated survival function by simulation the way "Monte Carlo". The Entropy method used for the
... Show MoreIn this paper, suggested formula as well a conventional method for estimating the twoparameters (shape and scale) of the Generalized Rayleigh Distribution was proposed. For different sample sizes (small, medium, and large) and assumed several contrasts for the two parameters a percentile estimator was been used. Mean Square Error was implemented as an indicator of performance and comparisons of the performance have been carried out through data analysis and computer simulation between the suggested formulas versus the studied formula according to the applied indicator. It was observed from the results that the suggested method which was performed for the first time (as far as we know), had highly advantage than t
... Show More