The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Suffer most of the facilities of the high cost of inventory , which affects the high cost of the product and thus affects many administrative decisions , as well as suffer the facilities of the systems developed by the provisions of inventory control , and this problem is exacerbated in the construction sector where the inventory in the form of Construction spin of the Year for another it becomes difficult to control the cost effectively , and is the research problem in question follows: What are the implications of the use of the system in time inventory accounting system for the contracting company does kills Alrkaah to the provisions of the cost of inventory and what is the optimal approach to inventory control ? Find assumed
... Show MoreThe mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th
... Show MoreBackground: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the therm
... Show MoreBackground: Fruits and their by-products are the primary sources of bioactive chemicals in plants. Because of its phytochemical richness, Annona squamosa fruits have gained the alertness of people willing in health-promoting diets. The purpose of this in vitro study was to evaluate the cytocompatibility effect of ethanolic crude extract of Annona squamosa pulp against a human normal cell line as a mouthwash for children. Material and method: The ethanolic extract of Annona squamosa pulp was extracted using the ultrasonic method and then lyophilized to make it powder. The MTT (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl-2H-tetrazolium bromide) test was performed to investigate the cytotoxic activity of the pulp extract on a human normal cell l
... Show MoreArab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac
... Show MoreThis study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreThe research aims to measure the impact of envy on job stress because the topic of envy represents a negative emotion that exists at all organizational levels, which may cause stress in the work environment.
The Research problem is represented by the lack of perception of most of the faculty staff on the negative effects of envy on their well-being in the Technical College of Management - Baghdad, and what is the impact level of envy on their job stress.
To achieve this, the scale of envy was based on two dimensions (being envied, Envying others), While the job stress scale was based on seven dimensions (workload, conflict role, Family factors, work environment, work relationships
... Show MoreAfter the Napoleonic Code of 1804 came without any legal rules specific to the duration of the contract, and was content to refer to it in scattered legal texts, Legislative Decree No. 2016-131 came to establish a comprehensive legal system for the duration of the contract, starting from the period of its formation, through the period of its implementation, and ending with its continuation after the expiration of its term, in the third section of the fourth chapter related to the effects of the contract (Articles 1210 - 1215), relying on judicial precedents on the one hand - which are many, as will be shown through the research pages - and contractual practices on the other hand. Perhaps the main motive that prompted the French legislator t
... Show More