The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
This research aims to apply the Performance Focused Activity Based Costing System in the offices of scientific and advisory services at the University of Technology for the purpose of measuring the cost of services provided by these offices in order to reduce costs. To test the hypothesis of the research, the research was applied in the consulting offices of the University of Technology through the financial statements for the year ending 12/31/2017 of the Scientific and Consulting Services Office of the University of Technology, because the data of these years were issued and audited by the Federal Office of Financial Supervision.
A number of
... Show MoreCoronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study pa
... Show MoreThe theme of love has been and still is the interest of authors and writers for it is closely related to people’s lives. That great passion has helped them express genuine thoughts pertinent to that theme that has given rise to many debates, some are vague and others controversial. In his (strait is the gate), (La Porte étroite), André Gide has sought to shed light on his characters perspective of love and its relationship with sacredness and divine happiness. Indeed these characters have found often themselves restrained, chained and exhausted, by tough religious commands that have imposed on them spiritual commitments and duties too hard to break.
André Gide has revealed a protestant deviation from the perfection theme tha
... Show MoreThe aim of the research is to assess the practice of tax administration to diminish the strategic direction of (proactive, analytical, defensive, response) and the nature of its relationship to organizational excellence represented by (leadership, strategic planning, focus on taxpayers, information and analysis and knowledge management, focus on operations, focus on forces. The questionnaire was adopted as a main tool in collecting data and information from the sample members of the General Authority for Taxes (110) who are in the site (m. Second Division Manager, Ms The statistical program (SPSS) was used to calculate (mean, standard deviation, difference coefficient, correlation coefficient, t-test). The research reached a number
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreThe reaction of methyldopa with o-vanillin in refluxing ethanol afforded Schiff base and characterized through physical analysis with a number of spectra also the study of biological activity. The geometry of the Schiff base was identified through using (C.H.N) analysis, Mass, 1H-NMR, FT-IR, UV-Vis spectroscopy. Metal complexes of Cr3+, Mn2+, Co2+, Ni2+, Cu2+, Zn2+, Cd2+ and Hg2+ with Schiff base have been prepared in the molar ratio 2:1 (Metal:L), (L = Schiff base ligand) except Hg2+ at molar ratio 1:1 (Hg:L). The prepared complexes were characterized by using Mass, FT-IR and UV-Vis spectral studies, on other than magnetic properties and flame atomic absorption, conductivity measurements. According to the results a dinuclear octahedral geo
... Show More