In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
Abstract: Polarization beam splitter (PBS) integrated waveguides are the key components in the receiver of quantum key distribution (QKD) systems. Their function is to analyze the polarization of polarized light and separate the transverse-electric (TE) and transverse-magnetic (TM) polarizations into different waveguides. In this paper, a performance study of polarization beam splitters based on horizontal slot waveguide has been investigated for a wavelength of . PBS based on horizontal slot waveguide structure shows a polarization extinction ratio for quasi-TE and quasi-TM modes larger than with insertion loss below and a bandwidth of . Also, the fabrication tolerance of the structure is analyzed.<
... Show MoreIn this article we study the variance estimator for the normal distribution when the mean is un known depend of the cumulative function between unbiased estimator and Bays estimator for the variance of normal distribution which is used include Double Stage Shrunken estimator to obtain higher efficiency for the variance estimator of normal distribution when the mean is unknown by using small volume equal volume of two sample .
Time crosses one of the most important principles that are agreed upon in contracts, because the temporal dimension has a significant impact on all contract provisions and is not limited to a certain group of them. French and Arab legal jurists alike called for this dimension to be given special attention. That is the term of the contract term; To try to limit the temporal elements, clarify their provisions and distinguish between them, but in the Arab world it did not receive the same attention that it received in the West.
The present investigation deals with experimental study of three-phase direct-contact heat exchanger, for water-Freon R11 system, where water is the continuous phase (liquid) and Freon R11 (liquid-gas) is the dispersed phase. The test section consisted of a cylindrical Perspex column with inner diameter 8cm and 1.2m long, in which, water was to be confined. Liquid Freon R11 drops were injected into the hot water filled column, through a special design of distributors at the bottom of the column. The liquid Freon R11 drops rose on their way up and evaporated into two-phase bubbles at atmospheric pressure. The study was devoted to express the effect of process variables such as c
... Show MoreThis research describes the design & implementation of frequency synthesizer using single loop Phase lock loop with the following specifications: Frequency range (1.5 – 2.75) GHz,Step size (1 MHz), Switching time 36.4 µs, & phase noise @10 kHz = -92dBc & spurious -100 dBc
The development in I.C. technology provide the simplicity in the design of frequency synthesizer because it implements the phase frequency detector(PFD) , prescalar & reference divider in single chip. Therefore our system consists of a single chip contains (low phase noise PFD, charge pump, prescalar & reference divider), voltage controlled oscillator , loop filter & reference oscillator. The single chip
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreIn this work, some of new 2-benzylidenehydrazinecarbothioamide derivatives have been prepared by condensation of thiosemicarbazide and different substituted aromatic benzaldehydes in presence of glacial acetic acid to give compounds (1-6), these compounds have characterized by its physical properties and spectroscopic methods. This work also included theoretical study to prove the ability of these compounds as corrosion inhibitors; The program package of Gaussian 09W with its graphical user interface GaussView 5.0 had used for this purpose; the methods of Density Functional Theory (DFT) with basis set of 6-311G (d,p) / hybrid function of B3LYP and semiempirical method of PM3 have been used, the study included theoretical simulation
... Show More