Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Bridging the Gap between Graphemes and Phonemes in the Phonetic Transcription
The aim of this paper is to construct cyclic subgroups of the projective general linear group over from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of into disjoint lines is discussed.
The Iraqi political and social arena has been characterized, subjectively and objectively, by the weakness of leadership building. This has led to a leadership crisis, which is reflected in the quality of the outcome of the process of rebuilding the state in Iraq. Thus, this building process has lacked the simplest requirements and conditions of success. It has suffered from a major and obvious failure: the situation in Iraq has raised conflict leaders, not constructive leaders, and this confirms the existence of a cultural crisis in the production of conscious, aware leadership compatible with democratic action. The weakness of leadership in Iraq is reflected in a series of ongoing crises that require radical solutions in accordance with l
... Show MoreThis study was design to characterize the immune response in experimentally Pseudomonas aeruginosa mastitis mice treated probiotic bifidocin and cazacin of Bifidobacterium spp. and Lactobacillus casei. We quantified the level of the IFN-γ and TNF-α cytokines in blood by ELISA technique. IFN-γ level was significantly higher in infected group compared to control (340.21 ± 41.61, 8.45 ± 0.83 pg/ml, respectively). While the level of IFN-γ was significantly higher in mastitis mice than bifidocin and cazacin treated mice. Also, TNF-α level showed a significant increase in mastitis mice compared to controls (320.11±40.33, 8.45±0.83pg/ml, respectively). Among mastitis and bifidocin (9 and 18 mg/ml), cazacin (11 and 22 mg/ml) treate
... Show MoreThere is limited data and evidence about the effects of COVID-19 on Maternal health, especially when new information is emerging daily, through pregnancy, child birth and post natal period, women are vulnerable to have the infection, this article, aimed to show the suitable measures that should be applied for women at reproductive age who are suspected /confirmed with COVID -19 infection,
During pregnancy it is advisable to continue the antenatal care schedule, although reducing face to face visit is recommended (unless the pregnant condition required that ),and prioritize ANC at health facilities for high-risk pregnancy and during second half of pregnancy with adequate infection prevention control measures.
Regardi
... Show MoreTwo types of adsorbents were used to treat oily wastewater, activated carbon and zeolite. The removal efficiencies of these materials were compared to each other. The results showed that activated carbon performed some better properties in removal of oil. The experimental methods which were employed in this investigation included batch and column studies. The former was used to evaluate the rate and equilibrium of carbon and zeolie adsorption, while the latter was used to determine treatment efficiencies and performance characteristics. Expanded bed adsorber was constructed in the column studies. In this study, the adsorption behavior of vegetable oil (corn oil) onto activated carbon and zeolite was examined as a function of the concentr
... Show MoreThe current study deals with one of the ancient and modern techniques of ceramic art, which has evolved dramatically. This technique is interested in the muddy Body and its coloring, rather than interesting in the coloring of the layer on the surface of the glass port on the ceramic object. It is classified as ceramic techniques of the single heartburn, where use many coloring oxides. As well as, the use of (Pigment), which is often made of metal compounds, or metal oxides such as iron and manganese, copper and cobalt and more others.
The first chapter includes the problem, the importance, the goal, and the boundaries of the study. In addition, focuses on determining the terms such as (Sgrafitto). The second chapter consists of two to
The recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli
... Show More