Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show MoreThe research has arrived to the following results:
1. There were critical views that accompanied the beginnings of (Muwashah). These
views were derived from literary criticism that handled the ancient Arabic poetry, especially
its kinds that were concerned with artificiality in addition to the views based on rivalry
among makers of (Muwashah) in front of the audience so as to judje who is the best
according to artistic response.
2. There existed new critical views, their originality was shown through the new critical
theories that appeared especially those concerned with receiving the text and reading theory.
3. The Muwashah was one of the most important poetic arts that reproduced previous
text, not in the tra
The appropriateness of the verses and surahs of the Qur’an, and the connection of their structures, is one of the aspects of the miraculousness of the Holy Qur’an, and it is an honorable knowledge by which the intellect guesses, and by which the value of the one who says what he says is known, and this science was written to appear in the early fourth century AH.
The occasion makes the parts of speech entwined with each other, so that connection is strengthened, and the composition becomes the same as the case of a tight construction that is compatible with the parts.
The Holy Qur’an has adopted a unique approach in its presentation of issues, in contrast to all previous and subsequent approaches. Sometimes he mentions a part