In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show MoreVol. 6, Issue 1 (2025)
This research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreThe house flies Musca domestica )Diptera:musidae) are the primary carrier of many pathogens such as cholera, typhoid, anthrax, and others. The use of chemical pesticides as a basic method of control leads to many problems at the environmental and health level. The use of safe alternatives to chemical pesticides has become an urgent necessity. The research aims to find biological alternatives that are environment-friendly and non-pathogenic to humans in controlling house flies through the possibility of extracting and diagnosing some secondary metabolites produced by the fungus Metarhizium anisopliae and testing their effects on the second larval stage of house flies using different treatment methods that include
... Show MoreProducing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreIn this paper a new idea was introduced which is finding a new distribution from other distributions using mixing parameters; wi where 0 < wi < 1 and . Therefore we can get many mixture distributions with a number of parameters. In this paper I introduced the idea of a mixture Weibull distribution which is produced from mixing two Weibull distributions; the first with two parameters, the scale parameter , and the shape parameter, and the second also has the scale parameter , and the shape parameter, in addition to the location parameter, . These two distributions were mixed using a new parameter which is the mixing parameter w which represents the proportion
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreMosquitoes like Culex quinquefasciatus are the primary vector that transmits many causes of diseases such as filariasis, Japanese encephalitis, and West Nile virus, in many countries around the world. The development in the scientific fields, such as nanotechnology, leads to use this technique in control programs of insects including mosquitoes through the use of green synthesis of nanoemulsions based on plant products such as castor oil. Castor oil nanoemulsion was formulated in various ratios comprising of castor oil, ethanol, tween 80, and deionized water by ultrasonication. Thermodynamic assay improved that the formula of (10 ml) of castor oil, ethanol (5ml), tween 80 (14 ml) and deionized water (71ml) was mor
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show More