Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThis contribution aims to investigate volume-dependent thermal and mechanical properties of the two most studied phases of molybdenum nitride (c-MoN and h-MoN) by means of the quasi-harmonic approximation approach (QHA) via first-principles calculations up to their melting point and a pressure of 12 GPa. Lattice constants, band gaps, and bulk modulus at 0 K match corresponding experimental measurements well. Calculated Bader’s charges indicate that Mo–N bonds exhibit a more ionic nature in the cubic MoN phase. Based on estimated Gibbs free energies, the cubic phase presents thermodynamic stability higher than that detected for hexagonl, with no phase transition observed in the selected T–P conditions as detected experimentall
... Show MoreAll domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
Praise be to Allah, Lord of the Worlds, and peace and blessings be upon our master Muhammad and his good and pure family. At the end of this research, we summarize some of the most important findings of our research, namely:
Raising a child properly from childhood leads to integrity in the life of the individual society, and if the young raised bad education, this education will affect itself and society negatively, so on parents and government institutions in any country to take care of children, and Islamic countries Specifically to give the child great attention; he is raised on the Koran and watered from its fountains, and armed with a weapon of morality from a young age, and to understand the biography of Mustafa (peace be upon h
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show Morehemorrhagic fever (VHF), one of which is Filoviridae. The Filoviridae family includes the Ebola virus , is responsible for the current VHF outbreak in West Africa. Viral hemorrhagic fevers (VHFs) occur in various regions around the world, yet traditional diagnostic testing for these diseases has typically been conducted in major reference laboratories located in Europe and the United States. In this review, we explore the current understanding of the mechanisms driving the pathogenesis of viral hemorrhagic fevers (VHFs) and examine the progress in developing preventive and therapeutic strategies for these infections.
This research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show Moreكان لنهاية الحرب الباردة وعولمة العالم على وفق رؤية كونية تتجاوز حدود ومفاهيم السيادة الوطنية والقومية الاثر الواضح في ترتيب العلاقات الدولية , واصبحت تلك العلاقات تدور حول محورين الاول .. هو الاعتماد المتبادل بين الدول من اجل الوصول الى خطوط مشتركة للمصالح المختلفة بين هذه الدول . والآخر.. هو تبعية الدول الضعيفة للدول القوية لافتقار الاولى توفير الحاجيات الى مواطنيها . هذا يشير الى نشأة علا
... Show MorePatch in transdermal drug delivery(TDDS) used to overcome the hypodermic drawback, but these patch also have absorption limitation for hydrophilic and macromolecule like peptide and DNA. So that micronized projection have the ability for skin penetration developed named as microneedle. Microneedle drug delivery system is a novel drug delivery to overcome the limitation of TDDS like skin barrier restriction for large molecule. Microneedle patch can penetrate through skin subcutaneous into epidermis, avoiding nerve fiber and blood vessel contact. There are many type of microneedle patch like solid, polymer, hallow, hydrogel forming microneedle and dissolving microneedle with different method of microfabrication