The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreThe A2?u-X1?g+ emission band system of 7LiH1 molecule has been calculated for Lambda doubling. The relation between wave number ?p , ?Q , ?R conducted the energies of the state of rotation F (J), and (J + 1) with rotational quantum number J, respectively, of 7LiH1 molecule for statehood A2?u using the rotation, fixed vibrational states of both the ground and raised crossovers vibrational against ???= 0 to V ' = 0-4using rotational levels J = 0 to J = 20 have found.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show Moreالخلاصة: الحكة اليوريمية لدى مرضى غسيل الكلى يؤثر على أكثر من 40٪ من المرضى. وربما ترتبط الحكة المستمرة بمستويات عالية من الإنترلوكين 31. الاهداف: النظر إلى مستويات مصل إنترلوكين 31 لدى مرضى غسيل الكلى المصابين بمرض الكلى في المرحلة النهائية، سواء مع أو بدون حكة يوريمية. النتائج: لم يكن مستوى المصل [الوسيط (] لـ IL-31 في المرضى الذين يعانون من الحكة اليوريميةأو بدون حكة في عينة مصل ما قبل غسيل الكلى مختلفًا بشكل م
... Show MoreAn essential issue in obstetrics is the prevalence of maternal and fetal complications in pregnant women with polycystic ovary syndrome (PCOS). The purpose of the present study was to investigate the prevalence of pregnancy complications among various phenotypes of pregnant women with PCOS.
Background: This in vitro study evaluated the fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different composite restorations (Low-shrinkage Filtek P90, nanohybrid Filtek Z250 XT and SDR bulk fill). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Fifty human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into five groups of ten teeth each (n=10): (Group 1) intact control group, (Group 2) unrestored teeth with endodontic treatment, (Group 3) resto
... Show More