The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
We observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and
Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob
... Show MoreAn optimization calculation is made to find the optimum properties of combined quadrupole lens which consists of electrostatic and magnetic lens. Both chromatic and spherical aberration coefficients are reduced to minimum values and the achromatic aberration is found for many cases. These calculations are achieved with the aid of transfer matrices method and using rectangular model of field distribution, where the path of charged-particles beam traversing the field has been determined by solving the trajectory equation of motion and then the optical properties for lens have been computed with the aid of the beam trajectory along the lens axis. The computations have been concentrated on determining the chromatic and spher
... Show MoreDisasters, crises and wars are a serious and unforeseen threat. The capacity of the early warning system to monitor such crises is therefore crucial. The ability to make quick decisions in a short time is necessary to prevent crises from occurring. Here, the role and effectiveness of the early warning system emerges through its ability to monitor, record and analyze signals. It can also be evidenced by its ability to immediately convey these indicators to the concerned authorities to take measures that ensure these conflicts and disasters do not worsen. The system’s ability to detect disasters and crises, identify the crisis and its type, and use the scientific method and common sense to deal with it is something that contributes to findi
... Show MoreThis study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This
... Show MoreBackground BK polyomavirus is one of the common post-transplant viral infections, affecting ∼15% of renal transplantation recipients (RTR), leading to graft loss in more than half of cases. Objectives Study the rate of detection of BK virus (BKV) in RTRs in Pap-stained urine cytology specimens. Methods A single center study, urine samples were collected from 99 RTR patients, with 15 Living Donors (LD) and 15 patients with chronic kidney disease (CKD) were taken as controls. And urine cytology smears were Pap stained for detection of decoy cells (DCs). Results Out of the 99 RTRs, 27 (27.3%) patients were decoy positive, 8 out of these 27 patients had uncommon DCs, and 5 out of these 27 cytology positive patients (18.5%) had biopsy proven B
... Show MoreUntreated municipal solid waste (MSW) release onto land is prevalent in developing countries. To reduce the high levels of harmful components in polluted soils, a proper evaluation of heavy metal concentrations in Erbil's Kani Qrzhala dump between August 2021 and February 2022 is required. The purpose of this research was to examine the impact of improper solid waste disposal on soil properties within a landfill by assessing the risks of contamination for eight heavy elements in two separate layers of the soil by using geoaccumulation index (I-geo) and pollution load index (PLI) supported. The ArcGIS software was employed to map the spatial distribution of heavy element pollution and potential ecological risks. The I-geo values in summe
... Show MoreThe CdS quantum dots were prepared by chemical reaction
of cadmium oleylamine (Cd –oleylamine complex) with the
sulfite-oleylamine (S-oleylamine) with 1:6 mole ratios. The
optical properties structure and spectroscopy of the product
quantum dot were studied. The results show the dependence of the
optical properties on the crystal dimension and the formation of
the trap states in the energy band gap.
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t