The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
Continuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll
... Show MoreThe past several years have seen an increase in awareness of the pervasiveness of medications as pollutants in the aquatic environment. The main reason for concern regarding the release of pharmaceuticals into the environment is the possibility that biological agents may become opposing to them. The development of precise and reliable analytical techniques for pharmaceutical determination in a range of samples is necessary for their safe use in the pharmaceutical industry and medical treatments. This review offers a summary of chromatographic techniques for identifying and quantifying the examination of pharmaceuticals in a range of environmental samples. Both the general public and the scientific community are currently very intere
... Show MoreCoronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.
The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.
COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.
COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019. Since then it spreads leading to a pandemic.
... Show MoreBackground: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis. Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications. Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis. Conclusion: As new viruses emerge, diagnostic techniques advan
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe city of Karbala is one of the most important holy places for visitors and pilgrims from the Islamic faith, especially through the Arabian visit, when crowds of millions gather to commemorate the martyrdom of Imam Hussein. Offering services and medical treatments during this time is very important, especially when the crowds head to their destination (the holy shrine of Imam Hussein (a.s)). In recent years, the Arba'in visit has witnessed an obvious growth in the number of participants. The biggest challenge is the health risks, and the preventive measures for both organizers and visitors. Researchers identified various challenges and factors to facilitating the Arba'in visit. The purpose of this research is to deal with the religious an
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show More