The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
The aim of the research is to determine the impact of profit management practices on the quality of profits through the use of flexibility in determining accounting methods and practices profit information is one of the most important information that concerns current users in general and observing users in particular. Some corporations managements manipulate the results of the company's profit or loss (income statement) and financial position statement with multiple reasons, including capital market motivations to raise their share prices in the stock market and attract investors, and on the other hand the motives of funding and borrowing loans, and the use of the flexibility in accounting policies and estimates to change the in
... Show MoreTwo field experiments were carried out for cultivating yellow maize crop Zea mays L. during the autumn planting season 2019 in two sites with soils of different textures. The first site is a loamy texture in one of the fields of the Medhatia Agriculture Division, Babylon Governorate. The second was silty loam by an alluvial mixture in one of the fields of Al-Nouriah Research Station, Ministry of Agriculture located in Al-Nouriah sub-district, Al-Qadisiyah governorate. It was found through the results that the uniformity, efficiency, and adequacy of the irrigation efficiency of the sprinkler irrigation method is better than that of the sprinkler irrigation method, and it ranged between (88.6-88.7) for uniformity and (84-86)% of the irrigatio
... Show MoreThis study examines strategies of cultural domestication in Muravyov and Kistyakovsky’s Russian translation of (The Fellowship of the Ring). It documents transformations of character names, toponyms, dialogues, and cultural references, highlighting systematic Russification and the infusion of Soviet political commentary that reshape the text into cultural rewriting.
The audience is one of the important practical elements in the theatrical show and its importance is not confined to its static activity as a receiver element only, rather it went beyond that issue as an effective and influential element in the proceedings of the show and the process of meaning construction, that it gains an active role in the construction and production of the connotation that influences and is influenced by the actor, where the communication channels are open between the two sides, consequently a kind of watching and joint interaction happens between them. Thus, it has become necessary for the actor to create a suitable environment for the onlookers in order for it to be an essential part of the show system. The
... Show MoreThe logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .
The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result. &nbs
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:
- Is it possible to examine praise poetry as a tagmeme?
- Is this analysis of great help in teaching English and Arabic to students in the College of Education?
The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.
&nbs
... Show MoreWar as a human phenomenon, has its own literature. Poetry is a major genre in this literature. This paper is an attempt to investigate and analyse some stylistic features in two selected, English and Arabic, war poems. These poems share the same theme.Both promote the principle of sacrificing one’s own life for the sake of homeland. This paper limits itself to analyse, thecontent words, tenses, semantic grouping of vocabulary and foregrounding in the two poems. The areas of analysis show great similarities in distributing the general content words (nouns, verbs, adjectives, and adverbs). In the analysis of the semantic areas of each content word, these poems reveal some similarities and some differences in their frequency rates.
... Show MoreDBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020