The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
This research dealt with the analysis of murder crime data in Iraq in its temporal and spatial dimensions, then it focused on building a new model with an algorithm that combines the characteristics associated with time and spatial series so that this model can predict more accurately than other models by comparing them with this model, which we called the Combined Regression model (CR), which consists of merging two models, the time series regression model with the spatial regression model, and making them one model that can analyze data in its temporal and spatial dimensions. Several models were used for comparison with the integrated model, namely Multiple Linear Regression (MLR), Decision Tree Regression (DTR), Random Forest Reg
... Show MoreMany water supplies are now contaminated by anthropogenic sources such as domestic and agricultural waste, as well as manufacturing activities, the public's concern about the environmental effects of wastewater contamination has grown. Several traditional wastewater treatment methods, such as chemical coagulation, adsorption, and activated sludge, have been used to eliminate pollution; however, there are several drawbacks, most notably high operating costs, because of its low operating and repair costs, the usage of aerobic waste water treatment as a reductive medium is gaining popularity. Furthermore, it is simple to produce and has a high efficacy and potential to degrade pollu
... Show MoreThe applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show Moresummary
In this search, we examined the factorial experiments and the study of the significance of the main effects, the interaction of the factors and their simple effects by the F test (ANOVA) for analyze the data of the factorial experience. It is also known that the analysis of variance requires several assumptions to achieve them, Therefore, in case of violation of one of these conditions we conduct a transform to the data in order to match or achieve the conditions of analysis of variance, but it was noted that these transfers do not produce accurate results, so we resort to tests or non-parametric methods that work as a solution or alternative to the parametric tests , these method
... Show MoreThis research aims to test the relationship between "relational leadership as an independent variable and organizational energy as a dependent variable. The current research variables are among the recent and important variables for the development of organizations, and for the purpose of explaining the relationship and influence between the variables, a set of goals has been formulated, including providing the interested and scientific and theoretical information explaining the nature of the variables The research, and the extent to which its causes are reflected in the research sample to increase the interest of the research organization’s organization and make it more appropriate to the required performance in light of a cha
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreBackground: Hyperthyroidism occurs due to over production of thyroid hormones, one types of hyperthyroidism was Graves, disease. Hyperthyroidism is characterized by high level of serum thyroxin, triiodothyronine and low level of thyroid stimulated hormones. Material and Methods: fifty two hyperthyroid patients, thirty patients under treatment with carbimazole and other twenty two patients under treatment with radioactive iodine, and sixty healthy control group. The average salivary flow rate was calculated as ml/5mint.The concentration of calcium, potassium, and total protein were determined in the salivary supernatant sample. This is done through different biochemical tests. Determination of salivary IgA is done by ELIZA. Results: The most
... Show MoreBackground: Primary healthcare in Egypt has undergone significant reforms since the 1990s, including the pioneering Family Health Program (FHP). However, limited evaluation exists regarding the FHP's impact on enhancing the delivery of primary healthcare services. The primary objective of this study was to analyze and understand the efficiency and effectiveness of the FHP in altering the delivery of primary healthcare in Egypt. We aimed to outline the fundamental characteristics of the primary healthcare system, compare them between the conventional and the newly reformed FHP centers, and gauge the awareness level of these variances among key decision-makers, focusing specifically on Cairo, Egypt. Methods: This cross-sectional study employe
... Show MoreObjective This study aimed to compare the biomechanics of three-point shooting between elite Iraqi basketball players and international players, in order to identify key biomechanical differences that may impact shooting performance. Methods A total of 80 male basketball players participated in the study (40 elite Iraqi players and 40 international elite players). Kinematic data were collected using advanced motion analysis systems, force plates, and high-speed video analysis. The measured variables included joint angles, angular velocity, release speed, ball release angle, and ground reaction forces during three-point shooting. Each player performed 20 consecutive shots under controlled conditions. Group comparisons were conducted using st
... Show More