The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
One of the most important challenges facing the development of laser weapons is represented by the attenuation of the laser beam as it passed through the layers of atmosphere.This paper presents a theoretical study to simulate the effect of turbulence attenuation and calculates the decrease of laser power in Iraq. The refractive index structure C_n^2 is very important parameter to measure the strength of the atmospheric turbulence, which is affected by microclimate conditions, propagation path, season and time in the day. The results of measurements and predictions are based on the Kolmogorov turbulence theory. It was demonstrated by simulations that the laser weapons in Iraq were severely affected due to the large change in temperatures,
... Show MoreThe investigation of the effect of tempering on thermal analysis of
Al-Ti-Si alloy and its composites with MgO and SiC particles was
performed. Thermal analysis was performed before and after
tempering by DSC scan. Optical microscopy was used to identify the
phases and precipitations that may be formed in base alloy and
composites. X-ray diffraction test indicated that the Al3Ti is the main
phase in Al-Ti-Si alloy in addition to form Al5Ti7Si12 phase. Some
chemical reactions can be occurred between reinforcements and
matrix such as MgO.Al2O3 in Al-Ti/MgO, and Al4C3 and Al(OH)3 in
Al-Ti/SiC composite. X-ray florescence technique is used to
investigate the chemical composition of the fabricated specimens.
H
Copper oxide nanoparticles (CuO NPs) were synthesized by two methods. The first was chemical method by using copper nitrate Cu (NO3)2 and NaOH, while the second was green method by using Eucalyptus camaldulensis leaves extract and Cu (NO3)2. These methods easily give a large scale production of CuO nanoparticles. X-ray diffraction pattern (XRD) reveals single phase monoclinic structure. The average crystalline size of CuO NPs was measured and used by Scherrer equation which found 44.06nm from chemical method, while the average crystalline size was found from green method was 27.2nm. The morphology analysis using atomic force microscopy showed that the grain size for CuO NPs was synthesized by chemical and green methods were 77.70 and 89.24
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
There are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show MoreType 2 diabetes mellitus is often characterized by hyperglycemia as a result of increased insulin resistance in hepatic/peripheral tissues and pancreactic B-cell dysfunction. Approximately 92% of patients with type 2 diabetes mellitus demonstrate insulin resistance, however hyperglycemia is always a consequence of insulin deficiency. This study was done on 120 patients newly diagnosed diabetes type 2 characterized by dyslipidemia that is increased triglycerides and decreased HDL. Hypoglycemia and weight gain are common problem with oral sulfonyl urea drugs. In this work three different oral hypoglycemic drugs repaglinide and glibenclamide (insulin secretagogues) and rosiglitazone (insulin sensitizer) were used for treatment of patients w
... Show MoreAbstract: The premise of the study is that populism is a process of building political views and critical intellectual orientations among the general public. It is transformed into mass beliefs by mobilizing the society ideologically and continuously in order to reach or control the circle of authority. We distributed the study topics to four sections: In the second, we will discuss the contents of contemporary populism and how other forms of populism evolved historically. The third is to discuss the political discourse of populism among the military regimes and the comparative Islamic parties in the Middle East, especially in terms of the essence and the intellectual foundations. The fourth section seeks to examine the characteristics o
... Show MoreBoth of the species Typha domengensis and Phragmites communis among the most important plant endemic in flora of Iraq from monocotyledon. Due to the similarity of the two species with each other in many morphological characteristics such as the environment where they live and the form of leaves and type of leaf venation and type of stomata….ets, also both of species belong to monocots plant therefore this research work was conducted find anatomical differences that have the same as taxonomic value to help distinguishing between both species under study. Through this research, we found great importance to the anatomical characteristics which we reached by studying th
... Show MoreFlaxseed from the flax plant (Linum usitatissimum), which has been cultivated for domestic use since prehistoric times. This study aims to investigate presence of antibacterial effect of flaxseed extract against selected oral pathogen in-vitro.