Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Grammatical Behaviour and Uses of Negative and Prohibitive Particles in Semitic Languages: A Comparative Semitic Study
...Show More Authors

      Grammatical particles are so important in understanding a text and its meaning in linguistic context. This paper  " Grammatical Behavior and Uses of Negative and Prohibitive Particles in Semitic Languages: A Comparative Semitic Study"

      tackles  a very important topic in Semitic languages. Comparative studies in Semitic languages shed light on  phenomena in different languages that are related or have one common origin. No doubt, such studies have their own effects on language study in general especially when studying a specific phenomenon and explaining it by reliance on the one origin, or by investigating the various phases of its historical development.

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
A comparison study of the Structural and magnetic properties of pure Ni metal and NiZnMn ferrite
...Show More Authors

The magnetic properties of a pure Nickel metal and Nickel-Zinc-Manganese ferrites having the chemical formula Ni0.1(Zn0.4Mn0.6)0.9Fe2O4 were studied. The phase formation and crystal structure was studied by using x-ray diffraction which confirmed the formation of pure single spinel cubic phase with space group (Fd3m) in the ferrite. The samples microstructure was studied with scanning electron microstructure and EDX. The magnetic properties of the ferrite and nickel metal were characterized by using a laboratory setup with a magnetic field in the range from 0-500 G. The ferrite showed perfect soft spinel phase behavior while the nickel sample showed higher magnetic loss an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 19 2024
Journal Name
Mustansiriyah Journal Of Sports Science
Traditional Championships sports (Zurkhaneh and Sumo): a comparative historical study of historical origins and traditional rituals
...Show More Authors

Many societies have some sports that play a pivotal role in enhancing human physical strength and martial arts and preserving religious values and beliefs. The most prominent of these traditional heroic sports are Zurkhaneh and Sumo, two sports that have their historical origins in the Iranian and Japanese cultural heritage. The research aims at shed light on the historical origins, symbolic rituals, and traditional elements of the sports of Zurkhaneh and Sumo, and to highlight the distinctive characteristics of the sports of Zurkhaneh and Sumo through objective analysis and comparison. The methodology used in this research is the historical approach, using the method of comparative analysis. This method includes analyzing information deriv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 04 2022
Journal Name
International Journal Of Gynecology & Obstetrics
Are sexual and reproductive health and rights taught in medical school? Results from a global survey
...Show More Authors
Abstract<p>Our aim was to investigate the inclusion of sexual and reproductive health and rights (SRHR) topics in medical curricula and the perceived need for, feasibility of, and barriers to teaching SRHR. We distributed a survey with questions on SRHR content, and factors regulating SRHR content, to medical universities worldwide using chain referral. Associations between high SRHR content and independent variables were analyzed using unconditional linear regression or χ<sup>2</sup> test. Text data were analyzed by thematic analysis. We collected data from 219 respondents, 143 universities and 54 countries. Clinical SRHR topics such as safe pregnancy and childbirth (95.7%) and contraceptive methods</p> ... Show More
View Publication
Scopus (11)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Applied Thermal Engineering
Simultaneous and consecutive charging and discharging of a PCM-based domestic air heater with metal foam
...Show More Authors

View Publication
Scopus (67)
Crossref (69)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Ceramics International
A first-principles study of the electronic, structural, and optical properties of CrN and Mo:CrN clusters
...Show More Authors

View Publication
Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 17 2016
Journal Name
International Journal Of Computer Applications
Colour Recognizing Robot Arm Equipped with a CMOS Camera and an FPGA
...Show More Authors

In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.

View Publication
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Preparation and Evaluation of Atenolol Floating Beads as a Controlled Delivery System
...Show More Authors

         This study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepared atenolol beads remained f

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More