The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe aim of this project was to study the in vitro effect of antineoplastic drugs (vincristine and vinblastine) on mice spermatozoa. Eighteen adult (age 8-9 weeks) male mice were divided into three groups equally. The animals in each group were slain by cervical dislocation, the testes were removed and two tails of epididymides isolated. Spermatozoa were obtained from the two tails of epididymides by mincing in 500 µl TCM-199.The first group non-treated (unadded) as a control group, second group added 10 µg/ml of vincristine to TCM-199 and the third group added 10 µg/ml of vinblastine to TCM-199. After 10 minutes from added of vincristine and vinblastin measured the following test: spermatozoa activity, percentage dead spermatozoa and mor
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreTaxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,
... Show MoreThe archaeological and religious sites play a prominent role in the rest of the other tourist activities as cultural and spiritual needs that can not be dispensed with. Archaeological sites represent cultural origins of the nation. Religious sites represent the state of man's orientation to God in places of worship . The focus was on the city of Babylon because it is an ancient city and tourist because of its characteristics and elements. The importance of the city of Babylon is illustrated by highlighting its archeological and religious status through its geographical distribution. This gives the subject special importance for the purpose of knowing the city's important sites. And come out with a number of results and a set of recommend
... Show MoreThis study was conducted in a laboratory experiment at the University of Baghdad, College of Science, computing Department, 5 km from the center of Baghdad city, in 2021 to evaluate the sorting method for the tomato crop. The experiments were conducted in a factorial experiment under a complete randomized design with three replications and using SAS analysis, artificial neural network, image processing, the study of external characteristics, and physical features; fruit surface area and fruit circumference were 1334.46 cm2,57.53 cm2 and free diseases. The error value was less than zero, while training with outputs recorded the highest value and which was 5. The neural network's performance between the input and the mean square of th
... Show MoreThe use of appropriate and accurate language is of utmost importance when describing people on the move and their dilemma, particularly refugees and displaced persons who have unique legal protection. So, there are a lot of scholars who have investigated the United Nations High Commissioner for Refugees’ (UNHCR) reports, but no one has examined representational and interactional meanings of UNHCR reports. Accordingly, this research aims to explore the role of UNHCR reports in enhancing the value of the humanitarian, which is attributed to the uniqueness of its use of language. The current study investigates the manner in which the textual content interacts with the images that are associated with the category of the UNHCR reports. Four re
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175