In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 protocol based on polarizing encoding with consideration of the optical fiber and free-space quantum channel imperfections and losses by estimating the quantum bit error rate and final secure key. This work shows a general repeatable modeling process for significant performance evaluation. The most remarkable result that emerged from the simulated data generated and detected is that the modeling process provides guidance for optical quantum channels design and characterization for other quantum key distribution protocols.
In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in any wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar
... Show MoreThrough the history of art movements, abstraction has been rotating between appearance and disappearance, mounting and stillness while its performances differed between reduction and simplification on the one hand and between the use of chromatographic and linear abstraction on the other. As a result, to what is mentioned, abstraction has appeared in many different artistic forms underlying the systematicity of the plastic art history.However, according to a contemporary point of view that comes up with the scientific revolution, the art of optical deceiving (illusion) appeared to find a hybrid art form that locates between the geometricity of abstraction and the scientific, visual and psychological foundations that are linked with the i
... Show MoreThis paper deals with constructing mixed probability distribution from exponential with scale parameter (β) and also Gamma distribution with (2,β), and the mixed proportions are ( .first of all, the probability density function (p.d.f) and also cumulative distribution function (c.d.f) and also the reliability function are obtained. The parameters of mixed distribution, ( ,β) are estimated by three different methods, which are maximum likelihood, and Moments method,as well proposed method (Differential Least Square Method)(DLSM).The comparison is done using simulation procedure, and all the results are explained in tables.
This paper investigate a sensorless speed control of a separately excited dc motor fed from a buck type dc-dc converter. The control system is designed in digital technique by using a two dimension look-up table. The performance of the drive system was evaluated by digital simulation using Simulink toolbox of Matlab.
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreAbstract:
This Research aims to define role of the system of evaluating the performance for higher leadership in determining the level of institutional work quality in the Ministry of Agriculture, by measuring system efficiency of evaluating the performance for higher leadership and its effect in institutional work quality, the searcher reached through the theoretical framing and involved studies to build default plan define the relation between Research variables formed from system of evaluating leadership performance as independent variable contains six subsidiary dimensions: (Polarization, evaluating the performance of personnel, training, motivation, se
... Show MoreThe research focused on (balanced performance and structural mechanisms in industrial product design systems) by focusing on product development in a manner that is able to meet the human requirements through the effect of smart technology on the systems of product designs and its effectiveness in achieving the design and functional variables that have an effective effect in User and industrial products, correspond to the requirements of the user life at the level of daily interaction. The first chapter ensures the problem of research is the following question: What are the mechanisms to achieve balanced performance in some systems design to fit with the variables B N User and industrial products? The objective of the research was to ide
... Show MoreThis work predicts the effect of thermal load distribution in polymer melt inside a mold and a die during injection and extrusion processes respectively on the structure properties of final product. Transient thermal and structure models of solidification process for polycarbonate polymer melt in a steel mold and die are studied in this research. Thermal solution obtained according to solidify the melt from 300 to 30Cand Biot number of 16 and 112 respectively for the mold and from 300 to 30 Cand Biot number of 16 for die. Thermal conductivity, and shear and Young Modulus of polycarbonate are temperature depending. Bonded contact between the polycarbonate and the steel surfaces is suggested to transfer the thermal load. The temperat
... Show MoreThe removal of cadmium ions from simulated groundwater by zeolite permeable reactive barrier was investigated. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. Many operating parameters such as contact time, initial pH of solution, initial concentration, resin dosage and agitation speed were investigated. The best values of these parameters that will achieved removal efficiency of cadmium (=99.5%) were 60 min, 6.5, 50 mg/L, 0.25 g/100 ml and 270 rpm respectively. A 1D explicit finite difference model has been developed to describe pollutant transport within a groundwater taking the pollutant sorption on the permeable reactive barrier (PRB), which i
... Show MoreThe harvest of hydrocarbon from the depleted reservoir is crucial during field development. Therefore, drilling operations in the depleted reservoir faced several problems like partial and total lost circulation. Continuing production without an active water drive or water injection to support reservoir pressure will decrease the pore and fracture pressure. Moreover, this depletion will affect the distribution of stress and change the mud weight window. This study focused on vertical stress, maximum and minimum horizontal stress redistributions in the depleted reservoirs due to decreases in pore pressure and, consequently, the effect on the mud weight window. 1D and 4D robust geomechanical models are