The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
The novel Vierordt’s approach, or simultaneous equation method, was created and validated for the concurrent determination of vincristine sulfate (VCS) and bovine serum albumin (BSA) in pure solutions utilizing UV spectrophotometry. It is simple, precise, economical, rapid, reliable, and accurate. This method depends on measuring absorbance at two wavelengths, 296 nm and 278 nm, which correspond to the λmax of VCS and BSA in deionized water, respectively. The calibration curves of VCS and BSA are linear at concentration ranges of 10–60 μg/mL and 200–1600 μg/mL, with correlation coefficient values (R2) of 1 and 0.999, respectively. The limits of detection (LOD) and quantification (LO
... Show MoreThe basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).
In this paper, An application of non-additive measures for re-evaluating the degree of importance of some student failure reasons has been discussed. We apply non-additive fuzzy integral model (Sugeno, Shilkret and Choquet) integrals for some expected factors which effect student examination performance for different students' cases.
This paper displays a survey about the laboratory routine core analysis study on ten sandstone core samples taken from Zubair Reservoir/West Quarna Oil Field. The Petrophysical properties of rock as porosity, permeability, grain's size, roundness and sorting, type of mineral and volumes of shales inside the samples were tested by many apparatus in the Petroleum Technology Department/ University of Technology such as OFITE BLP-530 Gas Porosimeter, PERG-200TM Gas Permeameter and liquid Permeameter, GeoSpec2 apparatus (NMR method), Scanning Electron Microscopy (SEM) and OFITE Spectral Gamma Ray Logger apparatus. By comparing all the results of porosity and permeability measured by these instruments, it is clear a significant vari
... Show MoreThe method of operational matrices is based on the Bernoulli and Shifted Legendre polynomials which is used to solve the Falkner-Skan equation. The nonlinear differential equation converting to a system of nonlinear equations is solved using Mathematica®12, and the approximate solutions are obtained. The efficiency of these methods was studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as increases. Moreover, the obtained approximate solutions are compared with the numerical solution obtained by the fourth-order Runge-Kutta method (RK4), which gives a good agreement.
In this article, the nonlinear problem of Jeffery-Hamel flow has been solved analytically and numerically by using reliable iterative and numerical methods. The approximate solutions obtained by using the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM). The obtained solutions are discussed numerically, in comparison with other numerical solutions obtained from the fourth order Runge-Kutta (RK4), Euler and previous analytic methods available in literature. In addition, the convergence of the proposed methods is given based on the Banach fixed point theorem. The results reveal that the presented methods are reliable, effective and applicable to solve other nonlinear problems.
... Show MoreThe aim of the research is to identify the methods of achieving mental health from an Islamic perspective by using an analytical approach. The methods that were explained: strengthen the spiritual side to control the motives and emotion s overcome the whims of the soul, fear of God and treat mental illness from an Islamic point of view by recognizing self, assurance, foresight, learning and acquiring new trends. Conclusion: we can achieve mental health by optimism, not despair, the compatibility of the Muslim with himself and with others, Consistency, emotional balance, and patience in difficult situations. Islam has attributes that make an individual feels psychological security. Thus, all these elements achiev
... Show More