This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.
The study aims to study the geographical distribution of electricpower plants in Iraq, except the governorates of Kurdistan Region (Dohuk, Erbil, Sulaymaniyah) due to lack of data.
In order to reach the goal of the research was based on some mathematical equations and statistical methods to determine how the geographical distribution of these stations (gas, hydropower, steam, diesel) within the provinces and the concentration of them as well as the possibility of the classification of power plants in Iraq to facilitate understanding of distribution in a scientific manner is characterized by objectively.
The most important results of the research are that there are a number of factors that led to the irregular distribution
... Show MoreMicrobial Desalination Cell (MDC) is capable of desalinating seawater, producing electrical power and treating wastewater. Previously, chemical cathodes were used, which were application restrictions due to operational expenses are quite high, low levels of long-term viability and high toxicity. A pure oxygen cathode was using, external resistance 50 and 150 k Ω were studied with two concentrations of NaCl in the desalination chamber 15-25 g/L which represents the concentration of brackish water and sea water. The highest energy productivity was obtained, which amounted to 44 and 46 mW/m3, and the maximum limit for desalination of saline water was (31% and 26%) for each of 25 g / L and 15 g / L, respectively, when using an ex
... Show MoreA non-zero submodule N of M is called essential if N L for each non-zero submodule L of M. And a non-zero submodule K of M is called semi-essential if K P for each non-zero prime submodule P of M. In this paper we investigate a class of submodules that lies between essential submodules and semi-essential submodules, we call these class of submodules weak essential submodules.
larization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface
... Show MoreThis research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
Theoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulu
... Show MoreIn this paper we introduce new class of open sets called weak N-open sets and we study the relation between N-open sets , weak N-open sets and some other open sets. We prove several results about them.
l
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.