In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
In this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between
... Show MoreNowadays, many new technologies developed in a lot of countries. These technologies are promising in many areas such as environmental monitoring, precision agriculture as well as in animal production. The purpose of this study was to define a better understanding of how new and advanced technologies affect the agriculture and livestock sector alike. Although agriculture and animal husbandry are among the most important sectors, advanced equipment and information technology cannot be used adequately. This situation leads to low production efficiency. It is also known that there can be a significant difference in temperature between the position of the climate control sensor (room temperature) and the area occupied by the animal. This study e
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreSkin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreOrganic soil is problematic soils in geotechnical engineering due to its properties, as it is characterized by high compressibility and low bearing capacity. Therefore, several geotechnical techniques tried to stabilize and improve this soil type. In this study, sodium silicate was used to stabilize sand dune columns. The best sodium silicate concentration (9%) was used, and the stabilized sand dune columns were cured for seven days. The results for this soil were extracted using a numerical analysis program (Plaxis 3D, 2020).In the case of studying the effect of (L/D) (where ‘’L” and ‘’D’’ length and diameter of sand dune columns) of a single column of sand dunes stabilized with sodium silicate with a diff
... Show MoreThe methods used by the print media (press) is varied in conveying its messages and its orientations to the readers. But language takes the leading method among these methods, or a real competitor - so far - due to the characteristics and advantages of languages, including: ease, abbreviation, and development, etc.
In the midst of such events, political tensions, and what they carry of the global developments, and among which was the most important the fall of the former Iraqi regime in the spring of 2003, the press had the greatest share, and a large portion on the level of monitoring, analyzing, and interpreting the various consequences of the event. The interpreting of the news varies according to the evolving political trends
... Show MoreThis study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr
... Show More