The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreA simple UV spectrophotometric differential derivatization method was performed for the simultaneous quantification of three aromatic amino acids of tryptophan, the polar tyrosine and phenylalanine TRP, TYR and PHE respectively. The avoidance of the time and reagents consuming steps of sample preparation or analyze separation from its bulk of interferences made the approach environmentally benign, sustainable and green. The linear calibration curves of differential second derivative were built at the optimum wavelength for each analyze (218.9, 236.1 and 222.5 nm) for PHE, TRP and TYR respectively. Quantification for each analyze was in the concentration range of (1.0– 45, 0.1–20.0 and 1.0– 50.0 μg/ml) at replicates of (n=3) with a re
... Show MoreThe aim of this scientific paper is to highlight the effective role of women working in economic development, especially those working in the entrepreneurial sector, which we see as encouraging at the macro-economic level and at the personal level, by highlighting their potential to help them enter the private labour market, value them and empower their role in the economic arena in order to win this bet to become productive and effective workers at all levels.
Through this paper, we will try to highlight the role of Algerian women's contribution to economic development through access to the world of entrepreneurship, and we will also try to find statistics on their success levels at the local and interna
... Show More
This study aims to identify maternal death cases caused by Coronavirus infection 2019 pneumonia, including disease progression, fetal consequences, and the fatality cause.
Patients and methodology: A retrospective case collection of Iraqi pregnant women in their second and third trimesters diagnosed with COVID-19 pneumonia and died due to it.
The four cases were all of a young age, had a brief complaint period, and had no comorbidities. Fever, dyspnea, and fatigue were the most common symptoms. Hypoxia was present in all cases and was the cause of mortality in three cases, with thromboembolism being a potential cause in the fourth. Prelabour membrane breakup, fetal growth restriction, and fetal death are al
... Show MoreVitamin D receptor (VDR) is a nuclear transcription factor that controls gene expression. Its impaired expression was found to be related to different diseases. VDR also acts as a regulator of different pathways including differentiation, inflammation, calcium and phosphate absorption, etc. but there is no sufficient knowledge about the regulation of the gene itself. Therefore, a better understanding of the genetic and epigenetic factors regulating the VDR may facilitate the improvement of strategies for the prevention and treatment of diseases associated with dysregulation of VDR. In the present investigation, a set of databases and methods were used to identify putative functional elements in the VDR locus. Histone modifications, CpG I
... Show MoreStructural buildings consist of concrete and steel, and these buildings have confronted many challenges from various aggressive environments against the materials manufactured from them. It contains high water levels and buildings whose concrete cover may be damaged and thus lead to the deterioration and corrosion of steel. It was important to have an alternative to steel, such as the glass fiber reinforced polymer (GFRP), which is distinguished by its great effectiveness in resisting corrosion, as well as its strong tensile resistance. Still, one of its drawbacks is that it has a low modulus of elasticity. This research article aims to conduct a numerical study using the nonlinear fi
Highway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu
... Show Moreأن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More