This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.
In this work we investigate and calculate theoretically the variation in a number of optoelectronic properties of AlGaAs/GaAs quantum wire laser, with emphasis on the effect of wire radius on the confinement factor, density of states and gain factor have been calculated. It is found that there exist a critical wire radius (rc) under which the confinement of carriers are very weak. Whereas, above rc the confinement factor and hence the gain increase with increasing the wire radius.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreRecent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show MoreFemtosecond laser pulse propagation in monomode optical fibers is demonstrated and investigated numerically (by simulations) and experimentally in this paper. A passively mode locked Nd:glass laser giving a pulse duration of about 200 fsec at 1053 nm wavelength and 120 mW average optical power with 100 MHz repetition rate is used in the experimental work. Numerical simulations are done by solving the nonlinear Schrödinger equation with the aid of Matlab program. The results show that self phase modulation (SPM) leads to compression of the spectral width from 5 nm to 2.1 nm after propagation of different optical powers (34, 43, 86 and 120 mW) in fibers of different length (5, 15, 35 m). The varying optical powers produced a varying
... Show MoreChemiluminescenc (CL), light emitted during chemical reaction, is one of the accurate methods used to detect directly oxygen free radicals. In this study, luminol was used as CL detector, to detect the concentration of free radicals formed in whole blood exposed to high power microwave pulses. The changes in the intensity of CL signal gives a clear relation between the concentration of free radicals formed by radiation in blood and changes in blood properties such as hemolysis of blood cells. This is done by measuring the electrical sytoplsimic electrical properties, the results are substituted in Maxwell-Wagner equation, to obtain electrical conductivity of cytoplasm, which is 18.3 ms/cm, while at suspension med
... Show MoreIn this paper, we introduce weak and strong forms of ω-perfect mappings, namely the ï±-ω-perfect, weakly ï±-ω-perfect and stronglyï±-ω-perfect mappings. Also, we investigate the fundamental properties of these mappings. Finally, we focused on studying the relationship between weakly ï±-ω-perfect and stronglyï± -ω-perfect mappings.
In this paper, we provide some types of - -spaces, namely, - ( )- (respectively, - ( )- , - ( )- and - ( )-) spaces for minimal structure spaces which are denoted by ( -spaces). Some properties and examples are given.
The relationships between a number of types of - -spaces and the other existing types of weaker and stronger forms of -spaces are investigated. Finally, new types of open (respectively, closed) functions of -spaces are introduced and some of their properties are studied.