Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreCo-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreDeveloping countries have depended since long time on the developed countries to increase the levels of development and improving rates of growth direction to the best way where taking this dependence many shapes influenced by the evolution form of international relations and this dependence shows how the great deficiencies in sources of local financing, which called developing countries to increase their reliance on external funding sources, represented in the form of grants, subsidies, loans and foreign investment, pursuing States in that the application of economic reform policies in pursuit of faster economic growth and restructure its economy and achieve economic stability. In the early eighties of the last
... Show MoreAbstract
The entities responsible for regulating the financial market are seeking to provide high quality accounting information, to provide appropriate protection to investors, and thus encourage them and attract them to increase their investments. the research reached several conclusion, the most prominent of which comes :-
1-The production of high quality accounting information reduces investment costs and costs of processing accounting information.
2- The production of high quality accounting information helps investors identify the best investment opportunities.
3- The results of the statistical analysis showed that there is significant
... Show MoreThe research problem is dedicated to investigate reservoirs irrational economic behavior adopted by the ruling elites in developing countries about the investment methodology of human capital and operating policies is based on the terms of reference of economic theory and standards governing the market, which led to a chronic structural imbalance in the workforce structure and lack of consistency with different production structure, in turn, which had a reported effects in the emergence of the phenomenon of unemployment and that they involved a certain privacy, as has become the issues of unemployment and employment in the various countries of the world are issues more important due to the presence of large numbers of the workforce in th
... Show MoreThe primary objective of this study was to identify the obstacles and problems encountered in the work of sports clubs according to the reality of the application of administrative automation. The present study was conducted in the sports club headquarters of Baghdad within the timeframe of October 2021 to December 2021. In the present study, a descriptive approach was used by the researchers in an analytical style according to the nature of the problem to be studied. The research community of the current study was composed of 100 sports clubs in the governorate of Baghdad. A total of 80 questionnaires were filled by the sample participants, who represented a percentage of 80% of the research community. After processin
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show Moreفي تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5