The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Polish Academy of Sciences
Iraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method
... Show MoreThe increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Bagh
Background: Stroke defined by diminished cerebral blood flow, results in brain damage and neurological impairments. It often leads to considerable difficulties, such as limited mobility and compromised hand function, usually manifesting as a weakening in the ability to open and shut the hand. Objective: The study evaluates the differences between opening and closing hands when utilizing a soft robot. Methods: The study was conducted in the Mosul Specialist Rehabilitation Center which involved 68 participants, all over 20 years old, with visual impairments. The Iranian Clinical Trials Registry and Ministry of Planning approved the study, The Fugl-Meyer Assessment for Upper Extremity Action Research Arm Test, and Arm Motor Ability Test were
... Show MoreThis work studies the impact of input machining parameters of Electrical Discharge Machining (EDM) on the machining process performance. Tool steel O1 was selected as the workpiece material, copper as the electrode material, and kerosene as the dielectric medium. Experimental runs have been carried out with a Design of Experiment (DOE) technique. Twenty tests are accomplished with the current range of (18 to 24 Ampere), a pulse duration range of (150 to 200 µs), and a pulse-off time range of (25 to 75 µs). Based upon the experimental study's output results, the EDM parameter's effect (voltage of power supply, discharge current, pulse duration, and pulse pause interval) on the responses of the process represented by sur
... Show MoreQuality control charts are limited to controlling one characteristic of a production process, and it needs a large amount of data to determine control limits to control the process. Another limitation of the traditional control chart is that it doesn’t deal with the vague data environment. The fuzzy control charts work with the uncertainty that exists in the data. Also, the fuzzy control charts investigate the random variations found between the samples. In modern industries, productivity is often of different designs and a small volume that depends on the market need for demand (short-run production) implemented in the same type of machines to the production units. In such cases, it is difficult to determine the contr
... Show Morewell log analysis is used to determine the rock properties like porosity, water saturation, and shale volume. Archie parameters in Archie equation, which sometimes considered constants greatly affect the determination of water saturation, also these parameters may be used to indicate whether the rocks are fractured or not so they should be determined. This research involves well logging analysis for Zubair formation in Luhais field which involves the determination of Archie parameters instead of using them as constant.
The log interpretation proved that the formation is hydrocarbon reservoir, as it could be concluded from Rwa (high values) and water saturation values (low values), the lithology of Zubair from cro
... Show More