Preferred Language
Articles
/
8xhTLJUBVTCNdQwCWSnt
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.

Crossref
View Publication
Publication Date
Wed Feb 18 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Photogrammetric analysis of facial soft tissue profile of Iraqi adults sample with Class II div.1 and Class III malocclusion: (A comparative study)
...Show More Authors

Background: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class II div.1 and class III malocclusion using standardized photographic techniques and to verify the existence of possible gender differences. Materials & methods: Seventy five Iraqi adult subjects, 50 class II div.1 malocclusion (24 males and 26 females), 25 class III malocclusion (14 males and 11 females), with an age range from 18-25 years. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position. The photographs were analyzed using AutoCAD program 2007 to measure the distances and angles used in t

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Biotechnology Research Center
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
International Journal Of Body, Mind & Culture (2345-5802)
Comparative analysis of the conventional primary healthcare services and family health program in Cairo, Egypt
...Show More Authors

Background: Primary healthcare in Egypt has undergone significant reforms since the 1990s, including the pioneering Family Health Program (FHP). However, limited evaluation exists regarding the FHP's impact on enhancing the delivery of primary healthcare services. The primary objective of this study was to analyze and understand the efficiency and effectiveness of the FHP in altering the delivery of primary healthcare in Egypt. We aimed to outline the fundamental characteristics of the primary healthcare system, compare them between the conventional and the newly reformed FHP centers, and gauge the awareness level of these variances among key decision-makers, focusing specifically on Cairo, Egypt. Methods: This cross-sectional study employe

... Show More
Scopus
Publication Date
Wed Feb 18 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Oral manifestation biochemical and IgA analysis of saliva in hyperthyroid (Grave’s disease) patients(Comparative study)
...Show More Authors

Background: Hyperthyroidism occurs due to over production of thyroid hormones, one types of hyperthyroidism was Graves, disease. Hyperthyroidism is characterized by high level of serum thyroxin, triiodothyronine and low level of thyroid stimulated hormones. Material and Methods: fifty two hyperthyroid patients, thirty patients under treatment with carbimazole and other twenty two patients under treatment with radioactive iodine, and sixty healthy control group. The average salivary flow rate was calculated as ml/5mint.The concentration of calcium, potassium, and total protein were determined in the salivary supernatant sample. This is done through different biochemical tests. Determination of salivary IgA is done by ELIZA. Results: The most

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 05 2025
Journal Name
Journal Of Sport Biomechanics
Comparative Biomechanical Analysis of Three-Point Shooting Between Elite Iraqi Basketball Players and International Counterparts
...Show More Authors

Objective This study aimed to compare the biomechanics of three-point shooting between elite Iraqi basketball players and international players, in order to identify key biomechanical differences that may impact shooting performance. Methods A total of 80 male basketball players participated in the study (40 elite Iraqi players and 40 international elite players). Kinematic data were collected using advanced motion analysis systems, force plates, and high-speed video analysis. The measured variables included joint angles, angular velocity, release speed, ball release angle, and ground reaction forces during three-point shooting. Each player performed 20 consecutive shots under controlled conditions. Group comparisons were conducted using st

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Parallel Computing for Sorting Algorithms
...Show More Authors

The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 04 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
A Comparative Study on the Probability of Diabetes and Psychosocial Deficiency of Badminton Players Youth Category
...Show More Authors

Many people believe that diabetes appears after a psychological crisis, which is a misconception but it could be in them before having a crisis ore the crisis. But emotion increases the appearance of symptoms, and athletes are at risk of developing diabetes. Hypoglycemia is not unusual for athletes, and during physical activity the sugar level changes in the blood. Therefore, it is important to conduct tests for the measurement of sugar before and immediately after the activity, for the purpose of detecting the sharp drop in the sugar level and treating it, and the early detection is necessary to avoid the possibility of diabetes, the concept of psychological immunity in psychology is considered a positive concepts that maintain the balance

... Show More
View Publication Preview PDF