The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This study involves the investigation of the effect of nitrogen laser with 337.1 nm wavelength on the sensitivity of Staphylococcus aureus bacteria by using local therapeutic due to burns. Thirty six isolate of Staphylococcus aureus bacteria were isolated from 25 patients suffering from sever burns, each isolate of bacteria was irradiated with nitrogen laser at (5, 10, 15 and 30) pulses/second repetition rates for 1, 5, 10, 20 and 30 minutes for each repetition rate. The effects of nitrogen laser on the local therapeutics sensitivity of bacteria were obtained using Kirby Baur method. Changes in the sensitivity of bacteria to local therapeutics (Tetracyclin, Chloramphenicol, Flumizin and Fucidin) occur at high repetition rate(30 pulses/seco
... Show MoreLength of plasma generated by dc gas discharge under different vacuum pressures was studied experimentally. The cylindrical discharge tube of length 2m was evacuated under vacuum pressure range (0.1-0.5) mbar at constant external working dc voltage 1500V. It was found that the plasma length (L) increased exponentially with increasing of background vacuum air pressure. Empirical equation has been obtained between plasma length and gas pressure by using Logistic model of curve fitting. As vacuum pressure increases the plasma length increases due to collisions, ionizations, and diffusions of electrons and ions.
In this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.
This study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil
... Show MoreThe present work aims to improve the flux of forward osmosis with the use of Thin Film Composite membrane by reducing the effect of polarization on draw solution (brine solution) side.This study was conducted in two parts. The first is under the effect of polarization in which the flux and the water permeability coefficient (A) were calculated. In the second part of the study the experiments were repeated using a circulating pump at various speeds to make turbulence and reduce the effect of polarization on the brine solution side.
A model capable of predicting water permeability coefficient has been derived, and this is given by the following equations:
Z=Z0 +C.R.T/9.8(d2/D2+1) [Exp. [-9.8(d
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe study was conducted during the spring season of 2000 and2001. The objective was to study the changes in leaves number of sunflower plants and its leaf area during growth stages under hardening conditions to drought tolerance. Agricultural practices were made according to recommendations.Asplit-split plots design was used with three replications.The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available water.The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments:Control(unsoaking), soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature
... Show MoreThe research aims to improve operational performance through the application of the Holonic Manufacturing System (HMS) in the rubber products factory in Najaf. The problem was diagnosed with the weakness of the manufacturing system in the factory to meet customers' demands on time within the available resources of machines and workers, which led to time delays of Processing and delivery, increased costs, and reduced flexibility in the factory, A case study methodology used to identify the reality of the manufacturing system and the actual operational performance in the factory. The simulation was used to represent the proposed (HMS) by using (Excel 2010) based on the actual data and calculate the operational performance measures
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
The aim of this paper is to demonstrate the effect of Na2[Fe(CN)5.NO].2H2O impurity (0.1 M) concentration on the dielectrical properties of poly (P-Aminobenzaldehyde) terminated by pheneylenediamine in the frequency and temperature ranges (1-100)KHz and (283-348) K respectively.These properties include dissipation factor, series and parallel resistance, series and parallel capacitance, real and imaginary part of the dielectric constant, a.c conductivity and impedance (real and imaginary) part, that have been deduced from equivalent circuit. The investigation shows that adding Na2[Fe(CN)5.NO].2H2O as additive to the polymer lead to increase of the dielectric constant with increasing temperature and it is decreasing with increasing the freq
... Show More