Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Abstract
The methods of the Principal Components and Partial Least Squares can be regard very important methods in the regression analysis, whe
... Show MoreBackground: occult blood loss must be considered as a
possible cause in every case of iron deficiency anemia.
Objective: to evaluate upper gastrointestinal endoscopy
in finding a potential cause for iron deficiency anemia
among children in Al-Anbar governorate.
Methods: Twenty five children aged 2-14 years, referred
to the gastroenterology unit in Al-Ramadi General Hospital
for upper gastrointestinal endoscopy had iron deficiency
anemia. Fiberoptic endoscopy was used under general
anesthesia and endoscopic tissue biopsies were taken from
22 patients for histopathological examination.
Results: The main presenting signs and symptoms were
pallor, abdominal pain, and stunting. The upper
gastrointestinal
Genus Salix is among family Salicaceae, distributing in the northern hemisphere. It is represented in Egypt by two species (Salix mucronata and Salix tetrasperma). The classification of Salix at the generic and infra-generic levels is still outstanding. We have agreed to list the Egyptian species of this genus. We collected them during field trips to most Egyptian habitats; fresh and herbarium specimens were subjected to taxonomic revision based on morphological characters; scanning electron microscope (SEM) for pollen grains; isozyme analysis using esterase and peroxidase enzymes and genetic diversity using random amplified polymorphic DNA (RAPD). We recorded that both sexes of S.
Four new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,
... Show MoreIn this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More