Preferred Language
Articles
/
8xhTLJUBVTCNdQwCWSnt
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.

Crossref
View Publication
Publication Date
Sun Jun 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effects of various beverages on the shear bond strength of light-cured orthodontic composite (An in vitro comparative study)
...Show More Authors

Background: This study was conducted to assess the effects of various beverages on the shear bond strength of light-cured orthodontic composite used to bond stainless steel orthodontic brackets on human teeth and to determine the site of bonding failure of this material. Materials and Methods: Fifty extracted human premolars were selected and randomly divided into five equal groups each with 10 teeth according to the beverage type (Control, One Tiger, Milk, Green tea and Coffee). After bonding, the teeth were immersed in specific beverages for 5 minutes twice daily with equal intervening intervals then washed and stored in distilled water at 37º C for the reminder of the day. The process was carried out for 30 days. The samples were then

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Analyzing indicators of the results of applying forecasting methods for production plans (A case study at the Diyala State Company for Electrical Industries)
...Show More Authors

Economic organizations operate in a dynamic environment, which necessitates the use of quantitative techniques to make their decisions. Here, the role of forecasting production plans emerges. So, this study aims to the analysis of the results of applying forecasting methods to production plans for the past years, in the Diyala State Company for Electrical Industries.

The Diyala State Company for Electrical Industries was chosen as a field of research for its role in providing distinguished products as well as the development and growth of its products and quality, and because it produces many products, and the study period was limited to ten years, from 2010 to 2019. This study used the descriptive approa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Measurement and Analysis of Oil Price Fluctuations and Trends of Government Spending on the Security and Health Sectors in Iraq for the Period (2006-2016)
...Show More Authors

The objective of the study: To diagnose the reality of the relationship between the fluctuations in world oil prices and their reflection on the trends of government spending on the various economic sectors.

The research found: that public expenditures contribute to the increase of national consumption through the purchase of consumer goods by the state for the performance of the state's duties or the payment of wages to employees in the public sector and thus have a direct impact on national consumption

The results of the standard tests showed that there is no common integration between the oil price fluctuations and the government expenditure on the security sector through the A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Numerical Analysis of Laminar Natural Convection in Square Enclosure with and without Partitions and Study Effect of pPartition on the Flow Pattern and Heat Transfer
...Show More Authors

The problem of steady, laminar, natural convective flow in an square enclosure with and without partitions is considered for Rayleigh number (103-106) and Prandtl number (0.7). Vertical walls were maintained isothermal at different temperatures while horizontal walls and the partitions were insulated. The length of partition was taken constant. The number of partitions were placed on horizontal surface in staggered arrangement from (1– 3) and ratio of partition thickness (H/L= 0.033, 0.083, 0.124). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on a program in Fortran 90 with the finite difference method is obtained. Representative results illustrating the effects of the thickn

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Fundamentalist detective On matters of consensus   Of Khala book complete the teacher benefits of Muslim Judge Ayaz (May God have mercy on him): Comparative fundamentalist study
...Show More Authors

Fundamentalist detective
On matters of consensus
  Of Khala book complete the teacher benefits of Muslim
Judge Ayaz
(May God have mercy on him)

View Publication Preview PDF
Publication Date
Fri Feb 17 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
The Association of Genetic Polymorphisms in Tumor Necrosis Factor-Alpha and Interleukins with Disease Severity or Response to Biological Therapy in Iraqi Rheumatoid Arthritis Patients: A Narrative Review
...Show More Authors

Background: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biolo

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
A consensus on measurement
...Show More Authors

Many letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus

Building a blind measuring guide.
 We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
A Survey on Linguistic Interpretation of Facial Expressions and Technologies
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref