LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreIn this study, dependence of gamma-ray absorption coefficient on the size of Pb particle size ranging from 200µm up to 2.5mm, using different weights of each particle size. The results show that gamma-ray attenuation coefficient is inversely proportional with the size of Pb particle size due to the reduction of the spaces between the lead particles.
Technique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....
Within this work, to promote the efficiency of organic-based solar cells, a series of novel A-π-D type small molecules were scrutinised. The acceptors which we designed had a moiety of N, N-dimethylaniline as the donor and catechol moiety as the acceptor linked through various conjugated π-linkers. We performed DFT (B3LYP) as well as TD-DFT (CAM-B3LYP) computations using 6-31G (d,p) for scrutinising the impact of various π-linkers upon optoelectronic characteristics, stability, and rate of charge transport. In comparison with the reference molecule, various π-linkers led to a smaller HOMO–LUMO energy gap. Compared to the reference molecule, there was a considerable red shift in the molecules under study (A1–A4). Therefore, based on
... Show MoreOlive leaves extract is famous for its antioxidant and protective effects. In this study, the aqueous extract of Iraqi Olea europaea L. Leaves was investigated for its anti-diabetic effects against low double doses of alloxan induced Diabetes Mellitus in rats. Low double doses (75 mg\Kg body weight) of alloxan were injected intraperitoneally at day 1&29 of the experimental period in rats, whereas an aqueous extract of Iraqi Olea europaea L. Leaves was added continuously to their drinking water. Serum malondialdehyde concentration, total oxidative stress and oxidative stress index as oxidoreductive stress biomarker, activities of certain antioxidoreductive stress enzymes (glutathione peroxidase, super oxide dismutase and catalase) and concen
... Show MoreOlive leaves extract is famous for its antioxidant and protective effects. In this study, the aqueous extract of Iraqi Olea europaea L. Leaves was investigated for its anti-diabetic effects against low double doses of alloxan induced Diabetes Mellitus in rats. Low double doses (75 mgKg body weight) of alloxan were injected intraperitoneally at day 1&29 of the experimental period in rats, whereas an aqueous extract of Iraqi Olea europaea L. Leaves was added continuously to their drinking water. Serum malondialdehyde concentration, total oxidative stress and oxidative stress index as oxidoreductive stress biomarker, activities of certain anti-oxidoreductive stress enzymes (glutathione peroxidase, super oxide dismutase and catalase) and concen
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show More