In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
The aim of this paper to study the effect of the implicit factors on the entrepreneurial spirit of the students of the Algerian university. Our structural model was proposed based on the model (Shapiro et Sokol, 1982) and the model (Ajzen, 1991). We tested it on a sample of 163 university students at the University of Algiers 3. The model consists of a set of variables (the intention of contracting as a dependent variable, structural and social educational support as independent variables). The results showed that educational and social support factors affect the entrepreneurial spirit of students more than structural support. The Applied Impacts are the enhancing of knowledge capacities of university stu
... Show MoreViolence occurs as a daily human action all over the world; it may cause so many kinds of damage to individuals as well as to society: physical, psychological, or both. Many literary authors of different genres have tried their best to portray violence by showing its negative effects, especially playwrights because they have the chance to show people the dangers of violence through performance on stage to warn them against such negatively affected action. It has been a human action since the beginning of human life on this planet when the first crime happened on earth when Cane killed his brother Abel. In our modern world, people are witnessing daily violent actions as a result of destructive wars that turned the humans into brutal beings.
... Show MoreVisualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott
Aqueous Two Phase System (ATPS) or liquid-liquid extraction is used in biotechnology to recover valuable compounds from raw sources. In Aqueous Two-Phase Systems, many factors influence the Partition coefficient, K, (which is the ratio of protein concentration in the top phase to that in the bottom phase) and the Recovery percentage (Rec%). In this research, two systems of ATPS were used: first, polyethylene glycol (PEG) 4000/Sodium citrate (SC), and the second, PEG8000/ Sodium phosphate (SPH), for the extraction of Bovine Serum Albumin (BSA). The behavior of Rec% and K of pure (BSA) in ATPS has been investigated throughout the study by the effects of five parameters: temperature, concentration of polyethylene glycol (P
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreThe present work deals with an experimental investigation of charging and discharging processes in thermal storage system using a phase change material PCM. Paraffin wax was used as the PCM which is formed in spherical capsules and packed in a cylindrical packed column which acted as an energy storage system. Air was used as the heat transfer fluid HTF in thermal storage unit. The effect of flow rate and inlet temperature of HTF on the time of charging and discharging process were studied. The results showed that the faster storage of thermal energy can be made by high flow rate of heat transfer fluid HTF and high inlet temperature of heat transfer fluid. It was found that at 65°C HTF inlet temperature, the melting and solidification pr
... Show MoreAbstraet
Students dropout from the Education has a negative phenomena on individual and society and even on different aspects of life especially on the economic aspect , Thus our research tries studying and analyzing the relation between the size of dropout and human development level in Iraq and as (research sample) the first decade of this century as a studying period, the study includes the dropout in Secondary schools and depending the formal records as a main source to evaluate the size of this problem in Iraq , which shows an increase in the size of dropout in this period in comparison with the last decades of the twentieth century, this produces a negative effect on human developme
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show More