The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de
... Show MoreA reliable and environmental analytical method was developed for the direct determination of tetracycline using flow injection analysis (FIA) and batch procedures with spectrophotometric detection. The developed method is based on the reaction between a chromogenic reagent (vanadium (III) solution) and tetracycline at room temperature and in a neutral medium, resulting in the formation of an intense brown product that shows maximum absorption at 395 nm. The analytical conditions were improved by the application of experimental design. The proposed method was successfully used to analyze samples of commercial medications and verified throughout the concentration ranges of 25–250 and 3–25 µg/mL for both FIA and batch procedures, respecti
... Show More‘Ode to a Nightingale’(1819) is a typical poem of a Romantic poet like John Keats, but
‘The Nightingale’(1798) is an uncharacteristic poem of a Romantic poet like Coleridge.
The paper proposes a comparison between Coleridge’s ‘The Nightingale’ and Keats’
‘Ode to a Nightingale’.Coleridge’s poem diverges from the Romantic norm; it carries some
characteristics new to Romantic poetry like the realistic and objective portrayals of nature and
the nightingale, while Keats’ poem adhere to the characteristics of Romantic poetry; it
portrays nature and the nightingale subjectively and unrealistically. Coleridge’s poem is very
much influenced by the scientific approaches to environment, and natural his
The textbook is the primary means of creativity and thinking, which has a major role in the development of the readership and mental abilities of the student. It is the basic tool in education in Iraq for the teacher and the student, which cannot be dispensed in any educational program. The current study aimed at the book of the biology of the sixth grade of science in Iraq (comparative study). It was compared to the book of biology for the twelve grade in the Kingdom of Jordan to identify the ratio of similarity and differences between them, in addition, to identify the weaknesses in the Iraq curriculum and developing appropriate solutions and suggestions to address them. The sample was represented with books of biology (six-science cla
... Show MoreNutlets of 22 taxa of Stachys (13 species and seven subspecies and two varieties), representing seven of the currently recognized sections distributed in northern Iraq were examined by light microscope. The basic shape of nutlets in most taxa studied is Obovoid, but Oblong also found in S.megalodanta Hausskn.& Bornm. ex P.H.Davis, S.setirefa C.A.Mey. subsp daenensis (Gandog.) Rech.f.and S. kurdica Boiss.& Hohen. var.kurdica, while the Subgloboid shape found in S. iberica M.Bieb. and S. inflata Benth., more over the Broad triangular shape was found in S. nephrophylla Rech.f. and S.lanigera (Bornm.) Rech.f.., the biggest size of nutlets was found in S.inflata L. and the smallest was in S.melampyroides Hand.-Mzt. Regarding sculpturing pa
... Show MoreThe right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?
This paper presents the intricate issues and strategies related to the translation of children's books, and it particularly focuses on the comparative analysis of "The Tale of Peter Rabbit" by Beatrix Potter and "Le Petit Prince" (The Little Prince) by Antoine de Saint-Exupéry. The study finds that the typical problems in translation are, idiomatic expressions, cultural reference, and the voice preservation, along side-sheet-specific challenges which each of the text faces. The translator of Potter's work should have skills of transposing all culturally oriented peculiarities of the UK land to the international audience to keep it accessible. On the contrary, "Le Petit Prince" translation will be the process of capturing the abstra
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More