Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
The dose rate for bremsstrahlung radiation from beta particles with energy (1.710) MeV and (2.28) MeV which comes from (32P and 90Y) beta source respectively have been calculated through six materials (polyethylene, wood, aluminum, iron, tungsten and lead) for first shielding material with thickness (x=1) mm which are putting between beta sources and second shield (polyethylene, aluminum and lead) with thickness (1, 2 &4) mm have been calculated. The distance between beta source and second shield is constant (D=1) cm. This dose rate was found by program called Rad Pro Calculator (version 3.26). The results of dose rate of beta particles were plotted as a function to the atomic number (Z) for first shield materials for each
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThis study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
This research is devoted to study the effect of different in weight percentage of Sio2 particles and glass fibers (5, 10, 15, 20) wt. % on the wear rate epoxy resin. The results show that the value of hardness increase with the increase for the weight percentage of reinforcing particles and fibers, while the wear rate decrease with the increase the load level of the reinforcing particles and fibers . The largest value of the hardness, and the lowest value of the wear rate for epoxy reinforced with 20% of SiO2, the wear rate increase in general with increasing the applied load.
A partial temporary immunity SIR epidemic model involv nonlinear treatment rate is proposed and studied. The basic reproduction number is determined. The local and global stability of all equilibria of the model are analyzed. The conditions for occurrence of local bifurcation in the proposed epidemic model are established. Finally, numerical simulation is used to confirm our obtained analytical results and specify the control set of parameters that affect the dynamics of the model.
Background: One of the drawbacks of vital teeth bleaching is color stability. The aim of the present study was to evaluate the effects of tea and tomato sauce on the color stability of bleached enamel in association with the application of MI Paste Plus (CPP-ACPF). Materials and Methods: Sixty enamel samples were bleached with 10% carbamide peroxide for two weeks then divided into three groups (A, B and C) of 20 samples each. After bleaching, the samples of each group were subdivided into two subgroups (n=10). While subgroups A1, B1 and C1 were kept in distilled water, A2, B2, and C2 were treated with MI Paste Plus. Then, the samples were immersed in different solutions as follow: A1 and A2 in distilled water (control); B1 and B2 in black
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreAIM: To analyse our experiences in the management of traumatic retroperitoneal hematoma (RPH), highlighting the various challenges faced and to report on the outcome of these patients. METHODS: From May 2014 to May 2017, all patients with traumatic RPH who underwent surgical treatment were retrospectively analysed. The kind of injury, intraoperative findings, sites of hematoma, postoperative morbidity and the overall outcomes were recorded. RESULTS: Ninety-six patients; 53 with blunt trauma and 43 with penetrating injury, were included in this study. The centre-medial hematoma was observed in 24 (25%) patients, lateral hematoma in 46 (47.9%) patients, pelvic hematoma in 19 (19.8%) patients, and multiple zone hematomas in
... Show More