Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
This paper is concerned with the numerical solutions of the vorticity transport equation (VTE) in two-dimensional space with homogenous Dirichlet boundary conditions. Namely, for this problem, the Crank-Nicolson finite difference equation is derived. In addition, the consistency and stability of the Crank-Nicolson method are studied. Moreover, a numerical experiment is considered to study the convergence of the Crank-Nicolson scheme and to visualize the discrete graphs for the vorticity and stream functions. The analytical result shows that the proposed scheme is consistent, whereas the numerical results show that the solutions are stable with small space-steps and at any time levels.
In this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.
Biotreatment using immobilized cells (IC) technology has proved to be the most promising and most economical approach for the removal of many toxic organic pollutants found in petroleum-refinery wastewater (PRW) such as phenol. This study was undertaken to evaluate the degradation of phenol by Pseudomonas cells individually immobilized in two different bio-carrier matrices including polyvinyl alcohol-guar gum (PVA-GG) and polyvinyl alcohol-agar agar (PVA-AA). Results of batch experiments revealed that complete removal of phenol was attained in the first cycle after 150 min using immobilized cells (IC) in both PVA-GG and PVA-AA. Additional cycles were confirmed to evaluate the validity of recycling beads of immob
... Show MoreIn this work, a solid core photonic crystal fibre (SC-PCF) has been designed with endlessly single mode of which both centerd core and holes in the cladding are organized by circles. The designed SC-PCF has a single solid centerd core which is ringed by a six rings hexagonal cladding. The computation of SC-PCF is achieved by using the finite element method (FEM) with perfectly matched layer (PML) boundary condition. All the designed factors like dimensions and distance of both core and cladding areas have varied with an optimized structure. After ending the numerical calculation, the results shows that there are a link between the air hols in the cladding , and the different normaliz
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe aim of present work is to improve mechanical and fatigue properties for Aluminum alloy7049 by using Nano composites technique. The ZrO2 with an average grain diameter of 30-40 nm, was selected as Nano particles, to reinforce Aluminum alloy7049 with different percentage as, 2, 4, 6 and 7 %. The Stir casting method was used to fabricate the Nano composites materials due to economical route for improvement and processing of metal matrix composites. The experimental results were shown that the adding of zirconium oxide (ZrO2) as reinforced material leads to improve mechanical properties. The best percentage of improvement of mechanical properties of 7049 AA was with 4% wt. of ZrO2 about (7.76% ) for ultim
... Show More