Preferred Language
Articles
/
8xhTLJUBVTCNdQwCWSnt
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.

Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
FTIR and Electrical Behavior of Blend Electrolytes Based on (PVA/PVP)
...Show More Authors

Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 16 2024
Journal Name
International Journal Of Analysis And Applications
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jun 03 2017
Journal Name
International Journal Of Science And Research
The Sealing Ability of New Bioceramic Material Used to Repair Furcal Perforation Compared with the Traditional Repair Materials: UV Spectrophotometer Analysis
...Show More Authors

Abstract: Iatrogenic furcal root perforations are serious complications during dental treatment. This study was aimed to compare the sealing ability of new bioceramic root repair material TotalFill® with the other perforation repair materials (GIC, MTA and Biodentine) using a dye- extraction method.Materials and Methods: Forty extracted, human mandibular molars with non-fused well developed root were collected. Artificial perforations were made from the external surface of the teeth. Then the teeth were randomly divided into 4 experimental groups (n= 10) according to the type of repair material used in this study; Medifil glass ionomercement, TotalFill® bioceramic root repair material, BiodentineTM and MTA Plus. The specimens were then im

... Show More
Preview PDF
Publication Date
Tue May 17 2022
Journal Name
Egyptian Journal Of Chemistry
Determination of Ferrous Ion in Pure & Pharmaceutical Preparation by Continuous Flow Injection Analysis Via Turbidmetric Utilizing NAG-4SX3-3D Analyzer
...Show More Authors

Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The effect of Analysis of internal environment in the quality of health care service survey study at AL_Elwiya Maternity Teaching Hospital
...Show More Authors

he current research aims at showing the correlation and effect of the internal environment analysis in the quality of health service in AL_Elwiya Maternity Teaching Hospital, researcher depended on the integral method in the "analytical descriptive method" for the study of the relation between the main variables and the sub-variables throughout data collection required by the theme of this study, a case study" in tackling the data and information related to the financial aspects of the internal environment.

The problem of the study was manifested in the essential question, that is (is there internal struc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Systematic analysis of artistic work as an introduction to planning training for teaching art education to students of Sultan Qaboos University
...Show More Authors

The current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using Factor Analysis In Determine the Important Influenced Factors In Student Outcomes Pheonema From Primary School In The Province Of Baghdad
...Show More Authors

Abstract

The Purpose of This Research is The  Main Factors  In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.

In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included  (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.

Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بين الطريقة التقليدية Classical Method وطريقة تحليل الطيف Spectral Analysis لإيجاد ثابت التمهيد التكيفي عند وجود قيم شاذة Outlier Values
...Show More Authors

   In this paper , two method which deal with finding the optimal value for adaptive smoothing constant, are compared .This constant is used in adaptive Single Exponential Smoothing (ASES).

The comparing is between a method uses time domain and another uses frequency domain when the data contain outlier value for autoregressive model of order one AR(1) , or Markov Model, when the time series are stationary and non stationary with deferent samples .    

View Publication Preview PDF
Crossref