The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Objectives To compare the clinical efficacy of microvascular decompression surgery (MVD) and gamma knife radiosurgery (GKR) as a treatment for patients with primary trigeminal neuralgia (TN) and evaluate the outcome regarding pain relief, recurrence, and complications with both modalities of treatment. Patients and Methods A randomized prospective study conducted in SaadAlwitry Neurosciences Hospital, Baghdad, Iraq. Eighty-four patients with TN from January 2016 to January 2018, 45 patients had GKR while 39 patients treated with MVD. The pain evaluated pre-and post-operatively using the Barrow Neurological Institute Pain Intensity scale (BNIPI), visual analog scale (VAS) and Brief Pain Inventory Facial (BPI-Facial) scoring systems. In GKR p
... Show MoreBootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show MoreThe researchers reached many conclusions, the most important of which was the distinction of practitioners of sports activity with high degrees in the trait (social). At the same time, it was low in the trait (aggression –restraint-desisting) and non-practitioners were distinguished by sports activity with high degrees in the trait (aggression –restraint-desisting). In contrast, the degree was low in the trait (social), and there were significant differences in favor of practitioners of the activity of the athlete, Through the conclusions, the researchers recommend the need for university students to practice sports activities because of their positive impact on their health in general and on the deve
... Show MoreAmidst the changes resulting from the subject matter of expression in art. The necessity of searching for the expressive features of thought that leaves different imprints with aesthetic features and values which called for re-modifying the expressive vision of contemporary drawings. Therefore, this research has been concerned with the study of (abstract expressive features in the drawings of (Serwan Baran) and (Eric Barto) - a comparative study), and the research includes four chapters. The first chapter is devoted to explaining the research problem, its importance, need, purpose, and limits, then determining the most important terms mentioned in it. Where the research problem dealt with the subject of abstract expressive feature
... Show MoreWireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreThis work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
This paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreThe purpose of this study is to evaluate the effect of hydrated lime addition methods as filler replacement on fatigue performance of Hot Mix Asphalt (HMA). Three types of addition methods of hydrated lime were introduced namely dry HL on dry aggregate and saturated surface aggregate above 3% and slurry HL on dry aggregate, ordinary Lime stone powder was reduced by three HL percentage (1.0, 2.0 and 3.0 %). The effect of different methods were investigated on the fatigue properties of HMA using, third-point flexural fatigue bending Test. Pneumatic Repeated Load System (PRLS) was carried out to establish the effect of hydrated lime on the fatigue failure criteria and to select the proper hydrated lime application methods on fatigue behavior o
... Show More