Preferred Language
Articles
/
8xhTLJUBVTCNdQwCWSnt
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.

Crossref
View Publication
Publication Date
Tue Jul 22 2025
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Effectiveness of Intralesional Vitamin D and Bleomycin Injections in Treating Recalcitrant Plantar Wart: A Comparative Study
...Show More Authors

Background: Intralesional injections of vitamin D and bleomycin have gained growing clinical interest in the treatment of recalcitrant plantar warts, with pain as a major limitation associated with their use. Objective: To assess the clinical outcomes of vitamin D and bleomycin in managing treatment-resistant plantar warts. Methods: An interventional comparative study conducted on patients diagnosed with recalcitrant plantar warts over 9 months and not treated for two months. Patients were divided randomly into two groups: group A (24 patients received intralesional vitamin D) and group B (24 patients received intralesional bleomycin). The clearance rate and pain score were estimated by visual analogue scale (VAS). Results: 48 patie

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sat Jan 24 2026
Journal Name
Arab World English Journal
AI in Literary and Non-Literary Discourse: A Systematic Review of Human and Machine Authorship, and Style and Perception
...Show More Authors

Artificial intelligence has quickly invaded the realms of both creative and information-based writing, raising new questions about human originality, authorship and style. Despite its ability to produce writings that are coherent and stylistically varied, there are still concerns over the uniqueness and cultural neutrality of AI programs such as ChatGPT. This review covers significant recent advancements with artificial intelligence applications in both the literary and non-literary fields. It analyzes 35 recent studies contrasting authorship and creativity, or stylistic considerations and impressions, between human and AI texts. These studies range from poetic and fictional writing through essay, news article and academic publicati

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Root and Root Canal Morphology: Study Methods and Classifications
...Show More Authors

Background: Morphology of the root canal system is divergent and unpredictable, and rather linked to clinical complications, which directly affect the treatment outcome. This objective necessitates continuous informative update of the effective clinical and laboratory methods for identifying this anatomy, and classification systems suitable for communication and interpretation in different situations. Data: Only electronic published papers were searched within this review. Sources: “PubMed” website was the only source used to search for data by using the following keywords "root", "canal", "morphology", "classification". Study selection: 153 most relevant papers to the topic were selected, especially the original articles and review pa

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Tikrit Journal For Dental Sciences
Microleakage Evaluation of a Silorane-Based and Methacrylate-Based Packable and Nanofill Posterior Composites (in vitro comparative study)
...Show More Authors

This study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th

... Show More
Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Comparative Study of Pressure Losses and Hole Cleaning Efficiency of Water and Polymer solutions in Horizontal Wells
...Show More Authors

The main objective of this study is to experimentally investigate the effect of the CMC polymeric drag reducer on the pressure drop occurred along the annulus of the wellbore in drilling operation and investigate the optimum polymer concentration that give the minimum pressure drop. A flow loop was designed for this purpose consist from 14 m long with transparent test section and differential pressure transmitter that allows to sense and measure the pressure losses along the test section. The results from the experimental work show that increasing in polymer concentration help to reduce the pressure drop in annulus and the optimum polymer concentration with the maximum drag reducing is 0.8 kg/m3. Also increasing in flow rate a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Us-china Public Administration
Victims of Terrorism between Compensation and Loss of Rights: A Comparative Study between Iraqi Law and French Law
...Show More Authors

The problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which

... Show More
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
A model for incorporating suitable methods of usability evaluation into agile software development
...Show More Authors

The challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
A comparison Some of Methods for Estimating Survival Function for Truncated Exponential Distribution
...Show More Authors

Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.

In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood  methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
A Prevalence study of Entamoeba spp. in Basrah Province using Different Detection Methods
...Show More Authors

This study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref