Polarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarizer is designed by COMSOL Multiphysics Software to operate in the visible region and transmit the transverse magnetic polarization of light. The same structure can be rotated by different angles, i.e., 90o, 45o, and -45o to mimic the function of polarization modulation in quantum key distribution systems. The designed structure has an extinction ratio of ~ 60000 and a wide angular tolerance range of (-20o - 20o).
Various simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
This research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show More
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show MoreAbstract:
The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s
... Show MoreAbstract: Recently, there is increasing interest in using mode-division multipelexing (MDM) technique to enhace data rate transmission over multimode fibers. In this technique, each fiber mode is treated as a separate optical carrier to transfer its own data. This paper presents a broadband, compact, and low loss three-mode (de)multiplexer designed for C+L band using subwavelength grating (SWG) technology and built-in silicon-on-insulator SOI platform. SWG offers refractive index engineering for wider operating bandwidth and compact devices compared to conventional ones. The designed (de)multiplex deals with three modes (TE0, TE1, and TE2) and has a loss > -1 dB and crosstalk < −15 dB, and its operation c
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show More