The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Subjects took physical fitness for health imposed on the area of research that have become an important and clear answer to the many problems resulting from the nature of dealing with modern life current actions that were needed to be hours of manual work has become accomplished by modern technology circumstance minutes, and mediated equipment And machinery. The lack of traffic rights and further burdens the intellectual and psychological pressures and the typical method of work has led to the identification of kinetic activity, thereby threatening public health in many ways stands at the forefront of these threats the problem of smoking, which causes many types of cancers, notably lung cancer. The most important reasons that led to This dr
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
Allah Almighty has aggrandized the position of orphans and elevated their status in the society and has given the graces for those who sponsor the orphan and care for and protecting them, even those who rub their heads. The divine care is manifested in the verses of the Holy Bible and the Holy Quran. Therefore, the whole world cared for the orphan, and called for the rights of the orphans in the conferences and the channels. But all that was little effort that does not meet what the orphan need and some were only ink on paper that were not applied. All that mentioned above is necessary in dealing with the study (the rights of orphans in the Old Testament and Islam, a Comparative Study). The study was divided into a Preface and four inquirie
... Show MoreFormulations based on nanomaterials have the ability to reduce the consuming of hazardous pesticides and theirimpact on human health and environment. The present study focused on a comparative investigation of histological effects of nanocapule acetamiprid (NACMP) in vivoand commercial parental bulk form of acetamiprid (ACMP) on albino mice. Nanoformulations of pesticides have the potential to improve food productivity without compromising with the ecosystem. In the present study, nanocapsules containing acetamiprid were prepared from two natural macromolecules, alginate and chitosan. The characterization of the nanocapsules were investigated by Dynamic Light Scattering(DLS), T ransmission Electron Microscopy (TEM) and Atomic force
... Show MoreA quadruped (four-legged) robot locomotion has the potential ability for using in different applications such as walking over soft and rough terrains and to grantee the mobility and flexibility. In general, quadruped robots have three main periodic gaits: creeping gait, running gait and galloping gait. The main problem of the quadruped robot during walking is the needing to be statically stable for slow gaits such as creeping gait. The statically stable walking as a condition depends on the stability margins that calculated particularly for this gait. In this paper, the creeping gait sequence analysis of each leg step during the swing and fixed phases has been carried out. The calculation of the minimum stability margins depends up
... Show MoreBack ground: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, so the aim of the study was to evaluate its effect as a separating medium on some physical properties such as (surface roughness, water sorption and solubility) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separat
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More