The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The ground state properties including the density distributions of the neutrons, protons and matter as well as the corresponding root mean square (rms) radii of proton-rich halo candidates 8B, 12N, 23Al and 27P have been studied by the single particle Bear– Hodgson (BH) wave functions with the two-body model of (core+p). It is found that the rms radii of these proton-rich nuclei are reproduced well by this model and the radial wave functions describe the long tail of the proton and matter density distributions. These results indicate that this model achieves a suitable description of the possible halo structure. The plane wave Born approximation (PWBA) has been used to compute the elastic charge form factors.
لمقدمة
الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى واصحابه أجمعين ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :
فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون
... Show MorePraise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which
Leishmania species are the causative agent of a tropical disease known as leishmaniasis. Previous studies on the old world species Leishmania major, showed that the amastigotes form which resides inside the macrophage of the vertebrate host, utilize host’s sphingolipids for survival and proliferation. In this study, gene expression of serine palmitoyltransferase (SPT) subunit two (MmLCB2) of the mouse macrophage cell line (RAW264.7), which is the first enzyme in the de novo sphingolipid biosynthesis, was detected in both infected and non-infected macrophages. This was detected under condition where available sphingolipid was reduced, with the new world species Leishmania mexicana. Results of qPCR analysis showed that there was no differen
... Show MorePregnant women who have rubella may potentially pass the infection on to their unborn offspring. A congenital rubella infection can result in a miscarriage, stillbirth, and congenital rubella syndrome. The only member of the Togaviridae family’s Rubivirus genus, the Rubella virus (RV) is a positive-polarity, single-stranded RNA virus genome surrounded by a lipoprotein envelope with spike-like, hemagglutinin-containing surface projections.The objective: to determine the Rubella virus (1E genotype) in pregnant woman and its relation to spontaneous miscarriage.Materials and methods. A total of 174 women which visited Al-Elweya Teaching Hospital, Baghdad, Iraq, were screened according to the following criteria: women with a history of
... Show MoreThe aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More