A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
Many isolated rural communities are located in regions where there is an abundant and reliable supply of solar energy, but where the distance to the nearest power station is many tens or even hundreds of kilometre. It is therefore mainly in these areas that rural electrification is now being provided by PV generators. since Stand-Alone PV generator can offer the most cost-effective and reliable option for providing power needed in remote places. Accordingly these isolated rural canters are fitted with PV for lighting, a refrigerator, a television and socket to supply kitchen appliances
Three types of medical commercial creams Silvazine, Cinolon Tar and Hydroquinon Domina were incorporated in this study. The medical creams were taken directly and placed uniformly on the glass slide. Each type of pharmaceutical was weighed at 1 mg and dispersed on an area of 1x1 cm. This process ensures same thickness for all samples. The creams were analyzed by using double-beam UV/visible spectrophotometer Metertech SP8001. The absorption spectrum for each of samples was measured against wavelength range of 300–700 nm.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreApart from graduating five-star doctors, a particular medical college has the mission to motivate and offer researchers the opportunity to publish high-quality researches on various health problems and disseminate updated medical knowledge to a wide range of local and international readers. This could be accomplished by establishing a medical journal and releasing issues regularly
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove
... Show MoreSequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show MoreThis article investigates the decline of language loyalty in the age of audiovisual nearness. It is a socio-linguistic review of previous literature related to language disloyalty. It reviews the current theoretical efforts on the impact of audiovisual nearness created by social media and language loyalty. The descriptive design is used. The argument behind this review is that the audiovisual nearness provided by social media negatively affects language loyalty. This article concludes that the current theoretical efforts have paid much attention to the relationship between the audiovisual nearness and language loyalty. Such efforts have highlighted the fact that the social media platforms have provided unprecedented nearness that provoke in
... Show MoreThe purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to
... Show More