The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
It has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlighting the diff
... Show MoreThyroid hemiagenesis (THA) is a rare congenital anomaly in which one lobe of thyroid gland fails to develop during embryological stage. Agenesis may be unilateral, total or isthmic. Left thyroid lobe is more commonly involved than right lobe in hemiagenesis. Agenesis of the isthmus was seen in 50% of cases. Left sided hemiagenesis is more common than right sided hemiagenesis with a Left to right ratio of 4:1. Clinically patients can be euthyroid, hypothyroid or hyperthyroid. Often it is diagnosed as an incidental finding during ultrasonography (USG) study of neck, which can easily diagnose this condition.
Actual incidence of THA is unknown; most cases are diagnosed in patients admitted for thyroid scan or thyroid surgery because
... Show MoreThe equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the
... Show MoreThis study aimed to make an inventory of leguminous plants for the purpose of identifying the plants that were collected over long periods and stored in the herbarium of Iraq Natural History Museum. It was found that the herbarium contains a large and varied number of plants from different parts of Iraq and in different and varied environments. It was collected and arranged according to a specific system in the herbarium to remain an important source for all graduate students and researchers to take advantage of these plants. Also, the flowering and fruiting periods of these plants in Iraq were recorded for different regions. Most of these plants begin to flower in the spring and thrive in fields and farms.
The process of discharging the quantities of dyes resulting from industrial processes with wastewater leads to the occurrence of a serious environmental problem that threatens the environmental health security of humans. Therefore, a number of studies have been addressed that include presenting many physical and chemical treatment methods to get rid or reduce the proportion of pigments such as biological decomposition, ion exchange, and sedimentation. Chemotherapy, reverse osmosis, coagulation, Toxic sludge generation, flocculation. In addition to the above, this review deals with a number of studies that present activated carbon of plant origin, methods of obtaining it, types and advantages of it being cheap and environmentally friendly. A
... Show MoreIt has increasingly been recognised that the future developments in geospatial data handling will centre on geospatial data on the web: Volunteered Geographic Information (VGI). The evaluation of VGI data quality, including positional and shape similarity, has become a recurrent subject in the scientific literature in the last ten years. The OpenStreetMap (OSM) project is the most popular one of the leading platforms of VGI datasets. It is an online geospatial database to produce and supply free editable geospatial datasets for a worldwide. The goal of this paper is to present a comprehensive overview of the quality assurance of OSM data. In addition, the credibility of open source geospatial data is discussed, highlight
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe concept of Assemblage appeared obviously in Postdramatic works, where a character or a text may stand as an assemblage of potentialities in the sense that it signifies unidentified subjectivity. Assemblages are constituted essentially of heterogeneous elements yet fused without specific demarcations. In order to enjoy the desired productivity at a "smooth pace," the regularities of political and societal institutionalization are disseminated. To achieve this dissemination, Deleuze-Guattari suggest an unsatiated platform of a "Body without Organs' (BwO), where desire escapes identification. Martin Crimp (b. 1956) defines his off-stage characters in Attempts on Her Life (1997), Anne, or whatever the name is, as a 'BwO', upon which
... Show More