The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
n this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best. The effect of temperature on the adsorption process was studied
... Show Moreأن التطور العلمي الحاصل فيما يخص المجال الرياضي أرسى آفاق جديدة لمواكبة التطور الكبير في مجا ل الألعاب والفعاليات الرياضية المختلفة ,و أن تحقيق النتائج الجيدة في فعاليات العاب القوى بشكل عام والثلاثية بشكل خاص في التدريب الرياضي يتطلب إتباع الأساليب العلمية الدقيقة والموضوعية بشكل سليم ومخطط له،فضلا عنة تطبيق نظريات ومنحى جديد لمواكبة الاتجاهات الحديثة في تحقيق النتائج الجيدة للوصول إلى المستويات العالية
... Show MoreThe aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
The comparative study tries to find the common points in two different authors’ works and in this kind of studying so many other common but the hidden points may be revealed. Postwar literature is somehow one of the best literary genres for finding the common factors and features that the poets have tried to present in their works elements such as desire to be winner, cruelty, inhumanity, and absurdity of the war. The Iranian poet late Qaisar Aminpour(1961-2007) and Yusef Komunyakaa ( 1947) from Bogalusa, Louisiana, are among the great American and Iranian poets whose works so many times have been interpreted and analyzed. The finding the outstanding and the most important points and themes in the postwar poems of these
... Show MoreMedicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea
... Show MoreSchiff bases, named after Hugo Schiff, are aldehyde- or ketone-like compounds in which the carbonyl group is replaced by imine or azomethine group. They are widely used for industrial purposes and also have a broad range of applications as antioxidants. An overview of antioxidant applications of Schiff bases and their complexes is discussed in this review. A brief history of the synthesis and reactivity of Schiff bases and their complexes is presented. Factors of antioxidants are illustrated and discussed. Copyright © 2016 John Wiley & Sons, Ltd.
The research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on
... Show MoreAcquisition provisions in Islamic jurisprudence
HTH Ahmed Dheyaa Al-Obaidi,", Ali Tarik Abdulwahid', Mustafa Najah Al-Obaidi", Abeer Mundher Ali', eNeurologicalSci, 2023