The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
The aim of this work is to explore the thermal performance of a tracked tubular solar still (TSS) with a parabolic trough concentrator in Baghdad (33.27° N, 44.37° E) in September 2022. The present tubular still is distinguished by its hexagonal glass cover. The effect of integrating the TSS with a heat pipe, the still tilt angle (10°, 15°), and the depth of saline water inside the still partitions on the productivity of freshwater are investigated. The results showed that using heat pipe enhances the freshwater productivity by 25%–40% and the efficiency by 25%. For the still integrated with heat pipe, as the water depth is increased from 5.5 to 6.5 cm the productivity of freshwater is incre
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreIn the present study, a pressure drop technique was used to identify the phase inversion point of oil-in-water to water-in-oil flows through a horizontal pipe and to study the effect of additives (nanoparticles, cationic surfactant and blend nanoparticles-surfactant) on the critical dispersed volume fraction (phase inversion point). The measurements were carried for mixture velocity ranges from 0.8 m/sec to 2.3 m/sec. The results showed that at low mixture velocity 0.8 and 1 m/sec there is no effect of additives and velocity on phase inversion point, while at high mixture velocities the phase inversion point for nanoparticles and blend (nanoparticles/surfactant) systems was delayed (postponed) to a higher value of the dispers
... Show MoreAt the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system .
Lean Accounting that has appeared as aresponse for changes occurred of economic units adoption for lean accounting system instead of wide production system : through it management of economic units has been changed from management by top departments into management by value flows : has provide new method for accounting costs according to value flow
... Show MoreThe Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's
... Show MoreIn this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.
In this paper, CdO nanoparticles prepared by pulsed laser deposition techniqueonto a porous silicon (PS) surface prepared by electrochemical etching of p-type silicon wafer with resistivity (1.5-4Ω.cm) in hydrofluoric (HF) acid of 20% concentration. Current density (15 mA/cm2) and etching times (20min). The films were characterized by the measurement of AFM, FTIR spectroscopy and electrical properties.
Atomic Force microscopy confirms the nanometric size.Chemical components during the electrochemical etching show on surface of PSchanges take place in the spectrum of CdO deposited PS when compared to as-anodized PS.
The electrical properties of prepared PS; namely current density-voltage charact
... Show MoreBackground: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (
... Show More