The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThirty swabes of medical implants were collected from Al-Yarmouk's hospital which were cultured on manitole agar to isolate Staphelococcus aureus . Only four samples gave positive results with this media. It was used ten types of antibiotics to test the sensitivity of this bacterium against them. All isolates of S. aureus were recorded as multidrug resistant and were considered as MRSA. One pledge alternative therapy is the utilize of certain pure bacterocin MIC (32.5 to 62.5 μg/ml) and it was compared with vancomycin (200-400 μg/ml) with average of (8 – 15) mm diameter of inhibition zones recpectively. The first reduction of biofilm formation ability has been proved in catheters when treatedby pure bacterocin. The test shows the highes
... Show MoreThis review examines how artificial intelligence (AI) including machine learning (ML), deep learning (DL), and the Internet of Things (IoT) is transforming operations across exploration, production, and refining in the Middle Eastern oil and gas sector. Using a systematic literature review approach, the study analyzes AI adoption in upstream, midstream, and downstream activities, with a focus on predictive maintenance, emission monitoring, and digital transformation. It identifies both opportunities and challenges in applying AI to achieve environmental and economic goals. Although adoption levels vary across the region, countries such as Saudi Arabia, the UAE, and Qatar are leading initiatives that align with global sustainability targets.
... Show MoreSports management is a fundamental pillar that supports sports institutions and plays a pivotal role in achieving advanced levels of success in talent development. The Talent Development Project is one of the key strategic initiatives of the Ministry of Youth and Sports. This study compares department heads with effective managerial competence to those with ineffective competence to highlight differences in performance quality. Through this comparison, the urgent need to assess the administrative performance skills of the heads of sports talent departments becomes evident, particularly their ability to lead and manage the Sports Talent Development Project. The objective is to identify strengths and weaknesses, establish a clear framework fo
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreThe issue, the existence of God Almighty, and the creativity of the universes including the whale, and assets and how diversified, and faith in him and his lordship and divinity, is a delicate issue, and very important and dangerous, and it occupied human thought old and new, and still occupy it until God takes the land and on it. Many complex issues of thought, behavior, and ethics have resulted in the belief of many communities in the existence of the Almighty, having ruled their minds, depicting their beliefs and distancing their thoughts about slippage and abuse. When they looked at the wonders of creatures and the minutes of the assets, they thought about the planetary and astronomical motion systems. His existence was denied by ath
... Show MoreThis work introduces a new electrode geometry for making holes with high aspect ratios on AISI 304 using an electrical discharge drilling (EDD) process. In addition to commercially available cylindrical hollow electrodes, an elliptical electrode geometry has been designed, manufactured, and implemented. The principal aim was to improve the removal of debris formed during the erosion process that adversely affects the aspect ratio, dimensional accuracy, and surface integrity. The results were compared and discussed to evaluate the effectiveness of electrode geometry on the machining performance of EDD process with respect to the material removal rate (MRR,) the electrode wear rate (EWR), and the tool wear ratio (TWR). Dimensional features an
... Show More