Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
In this research, the problem of multi- objective modal transport was formulated with mixed constraints to find the optimal solution. The foggy approach of the Multi-objective Transfer Model (MOTP) was applied. There are three objectives to reduce costs to the minimum cost of transportation, administrative cost and cost of the goods. The linear membership function, the Exponential membership function, and the Hyperbolic membership function. Where the proposed model was used in the General Company for the manufacture of grain to reduce the cost of transport to the minimum and to find the best plan to transfer the product according to the restrictions imposed on the model.
The aim of this study was extraction of jojoba oil using different solvents. A mixture of waterhexane and water-ethanol are used as solvents to extract jojoba oil in a batch extraction process and compared with a pure solvent extraction process. The effects of particle size of crushed seeds, solvent-to-water ratio and time on jojoba oil extraction were investigated. The best recovery of oil was obtained at the boiling temperature of the solvent and four hour of extraction time. When seed particle size was 0.45 mm and a pure ethanol was used (45% yield of oil extraction), whereas, it was 40% yield of oil at 25% water-hexane mixture. It was revealed that the water-ethanol and water-hexane mixtures have an effect on the oil extraction yield. T
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Background: Immediate implant placement in the maxillary anterior region was challenging, especially with the jumping gap and limited primary implant stability. Objective: To assess the autogenous dentin graft biomaterial's ability to improve the esthetic outcomes of an immediately inserted implant. Methods: Twenty patients with non-restorable retained roots in the maxillary non-molar region surrounded by natural sound teeth were included in this study after a complete clinical and radiological examination, including patient health and clinical fitness for the immediate dental implant procedure. A single dental implant was inserted for each patient, and the resulting jump distance was filled with the mineralized dentin graft and co
... Show More
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreLiquefied petroleum gas (LPG), Natural gas (NG) and hydrogen were all used to operate spark ignition internal combustion engine Ricardo E6. A comparison of CO emissions emitted from each case, with emissions emitted from engine fueled with gasoline as a fuel is conducted.
The study was accomplished when engine operated at HUCR for gasoline n(8:1), was compared with its operation at HUCR for each fuel. Compression ratio, equivalence ratio and spark timing were studied at constant speed 1500 rpm.
CO concentrations were little at lean ratios; it appeared to be effected a little with equivalence ratio in this side, at rich side its values became higher, and it appeared to be effected by equivalence ratio highly, the results s
... Show MoreSingle Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.
This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.