The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t
... Show MoreThe goal (purpose) from using development technology that require mathematical procedure related with high Quality & sufficiency of solving complex problem called Dynamic Programming with in recursive method (forward & backward) through finding series of associated decisions for reliability function of Pareto distribution estimator by using two approach Maximum likelihood & moment .to conclude optimal policy
The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreNon-thermal or cold plasma create many reactive species and charged particles when brought into contact with plant extracts. The major constituents involve reactive oxygen species, reactive nitrogen species and plasma ultra-violets. These species can be used to synthesize biologically important nanoparticles. The current study addressed the effect of the green method-based preparation approach on the volumetric analysis of Zn nanoparticles. Under different operating conditions, the traditional thermal method and the microwave method as well as the plasma generation in dielectric barrier discharge reactor were adopted as a preparation approach in this study. The results generally show that the type of method used plays an important role in d
... Show MoreTwo oil wells were tested to find the abnormal pressure zones using sonic log technique. We found that well Abu-Jir-3 and Abu-Jir-5 had an abnormal pressure zones from depth 4340 to 4520 feet and 4200 to 4600 feet, respectively. The maximum difference between obtained results and the field measured results did not exceed 2.4%.
In this paper, the formation pressures were expressed in terms of pressure gradient which sometimes reached up to twice the normal pressure gradient.
Drilling and developing such formations were dangerous and expensive.
The plotted figures showed a clear derivation from the normal trend which confirmed the existence of abnormal pressure zones.
In this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.