The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The relationship between pollution levels in river sediment and fluctuating asymmetry of resident silurid fish species,
This research focus on studying 3 types of Bakhour in the markets of Baghdad city and assessing their impact on the quality of life for asthmatic whom used Bakhour at their houses through investigating particles physical properties, also estimating the levels of heavy metals (Cd, Cu, Mn, Pb and Zn), Particulate Matter PM2.5, PM10, Total Volatile Organic Compounds (TVOC) and formaldehyde (HCHO). The quality of life for asthmatic patients whom use Bakhour was assessing by Mini Asthma Quality of Life Questionnaire. The results indicated that shapes of Bakhour particles were irregular or spherical. Burning process generated the higher percent of PM ˂1μm. Type 2 Bakhour showed the highest percent of <1μm which was 73%.The amount of
... Show MoreBacteriocins were partially purified by ammonium sulphate 50% concentraction, bacteriocin activity of Pediococcus acidilactici-FMAC278 was 25600 U/ml with 5.8 folds and 7.6% yeild, the activity decrease to 12800 U/ml after dialysis with 6.3 folds and 3% yield, On the other hand the bacteriocin activity of Weissella paramesenteroides-DFR6 was 12800 U/ml with 2.7 folds and 8.8% yeild, after dialysis the activity became 6400 U/ml with 5.1 fold and 3.4% yield, Chicken Sausage were made by adding 0.25, 0.5 and 1% particaly purified bacteriocin to study its effect on microorganisms and increasing shelf life of Sausage. It is found that bacterial numbers were decreased after 3 days of storage at refrigerator at 0.5% conc. While the molds decrea
... Show More
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an ob
... Show MoreCodes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an object under de
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe current research aims to answer the following questions: what is the substance of democracy? What is the content of a democratic society? What is the role of university professor in the democratic development of the student university in light of the new Iraqi society? In order to achieve the goals of the research, the researcher developed an a questionnaire based on literature, Iraq's draft constitution in 2005, and his experience of the field of teaching human rights and public freedoms and the teaching of democracy. It was applied to a sample of faculty members in Department of Education and Psychology / College of Education / University Baghdad for the year 20014 were obtained their answers were then processed statistically. Henc
... Show More