Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The art of adornment and make-up in the ancient civilizations of Mesopotamia and the old country of Yemen as a model
...Show More Authors

This research sheds light on those discrepancies in the use of ornaments, adornment and perfumes, as well as the art of cosmetics, in two important civilizations, namely, the Mesopotamian civilization as the earlier civilization, and the civilization of Yemen, which represents the first Arab civilization. Through the foregoing, our research includes two topics, the first topic included the history of the use of decorations, ornaments and perfumes in the civilization of Mesopotamia, while the second topic included the study of ornaments, adornment and cosmetic art in the ancient civilization of Yemen. And then the research came out with a number of conclusions that the researcher considers very important to highlight the differences and f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Pharyngeal airway volume and its relationship to the facial morphology in nasal breathing and mouth breathing subjects (A comparative computerized tomography study)
...Show More Authors

Background: The value of lateral cephalometric radiographs to evaluate the pharyngeal airway is limited because it provided 2-dimensional (2D) images of complex 3-dimensional (3D) anatomic structures. Three dimensional analyses of the airway volumes are required to understand oral and pharyngeal adaptations in mouth breathing and nasal breathing subjects. The aim of this study was to measure the pharyngeal airway volume and the size of the face, then compare between pharyngeal airway volume in mouth breathing and nasal breathing subjects and find the gender difference in each group, also to study the relation between pharyngeal airway volume and the size of the face. Material and Methods: Fifty patients including 28 males and 22 females wit

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Beta angle in a sample of Iraqi adults with Class I skeletal and dental relations and its correlation with other craniofacial measurements
...Show More Authors

Background: This study aimed to determine the value of Beta angle for a sample of Iraqi adults with class I skeletal and dental relations and to verify the existence of sexual dimorphism and to find out the relation between this angle and other craniofacial measurements. Materials and Methods: Sixty dental students (23 males and 37 females) with an age ranged between 20-31 years old and having class I skeletal and dental relations were chosen for this study. Each student was subjected to clinical examination and digital true lateral cephalometric radiograph. The radiographs were analyzed using AutoCAD 2007 computer program to measure the angular and linear variables. Descriptive statistics were obtained for the measurements for both genders

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Research In Social Sciences And Humanities
A DISCOURSE ANALYSIS STUDY OF THE TRUTH AND REALITY IN NEWS WEBSITES ABOUT THE WARIN SYRIABETWEEN AL-JAZEERA ENGLISH AND BBC WORLD
...Show More Authors

BN Rashid, International Journal of Research in Social Sciences and Humanities, 2019 - Cited by 1

View Publication
Publication Date
Wed Jul 01 2020
Journal Name
Medico-legal Update
Evaluation of technical quality and procedural errors of root canal treatment performed by undergraduate and postgraduate dental students: A retrospective radiographic analysis
...Show More Authors

Scopus (3)
Scopus
Publication Date
Fri Oct 25 2024
Journal Name
The Review Of Contemporary Scientific And Academic Studies
The Representation of Men and Women in the Black and White Streams of the Second Wave of Feminism: A Corpus Stylistic Analysis
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Proposing a Scheme for Human Interactive Proof Test using Plasma Effect
...Show More Authors

            Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
A study of Fermi hole and partial Fermi hole for Li- and C-Atoms in different states 1s 2p, 1s 3p, 1s 3d and 2s 2p
...Show More Authors

The electron correlation effect for inter-shell have been analysed in terms of Fermi hole and partial Fermi hole for Li-atom in the excited states (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). Fermi hole Δf(r12) and partial Fermi hole Δg(r12 ,r1) were determined in position space. Each plot of the physical properties in this work is normalized to unity. The calculation was performed using Mathcad 14 program.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The economic dimensions of the railway link between Iraq and Kuwait and the role of national alternatives (Faw port and the dry canal as a model(
...Show More Authors

   Decision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats. 

  Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref