Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Tuberculosis status as the second leading causes of significant morbidity and mortality from an infectious disease worldwide, after human immunodeficiency virus (HIV). Sample collection was conducted at the Institute of Chest and Respiratory Diseases/Baghdad Medical City in Baghdad. The collection interval was from August to October 2014, 629 suspected TB patients were examined during this period. The results revealed among total 629 specimens, 56 (8.9%) of the specimens were positive by direct examination and 573 (91.1%) negative specimens by smear microscopy. Fifty six DNA samples were extracted from positive ZN smears of sputum specimens and 40 samples from healthy persons (as control) were subjected to molecular diagnosis by real tim
... Show MoreCoronavirus diseases 2021 (COVID-19) on going situation in Iraq is characterized in this paper. The pandemic handling by the government and the difficulties of public health measures enforcement in Iraq. Estimation of the COVID-19 data set was performed. Iraq is endangered to the pandemic, like the rest of the world besides sharing borders with hotspot neighbouring country Iran. The government of Iraq launched proactive measures in an attempt to prevent the viral spread. Nevertheless, reports of new cases keep escalating leaving the public health officials racing to take more firm constriction to face the pandemic. The paper bring forth the current COVID-19 scenario in Iraq, the government measures towards the public health challenges, and
... Show MoreFollowing model educational offenders in collection and Alasbaka of fifth grade students preparatory in history A. M. Dr Prepared by: Dr. Bashaer Mawloud Tawfeeq, The Center of Educational and Psychological Studies Baghdad University - There is no difference statistically significant at the 0.05 level of significance between the average scores of the following students studying using model and offenders and who are studying in the usual manner (traditional) in the collection - There is no difference statistically significant at the 0.05 level of significance between the mean scores for the following students studying using model and offenders and who are studying in the usual manner (traditional) in retention Find limits: Current search
... Show MoreThe control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voic
... Show MoreNanoparticles (NPs) have unique capabilities that make them an eye-opener opportunity for the upstream oil industry. Their nano-size allows them to flow within reservoir rocks without the fear of retention between micro-sized pores. Incorporating NPs with drilling and completion fluids has proved to be an effective additive that improves various properties such as mud rheology, filtration, thermal conductivity, and wellbore stability. However, the biodegradability of drilling fluid chemicals is becoming a global issue as the discharged wetted cuttings raise toxicity concerns and environmental hazards. Therefore, it is urged to utilize chemicals that tend to break down and susceptible to biodegradation. This research presents the pra
... Show MoreStone Matrix Asphalt (SMA) is a gap-graded asphalt concrete hot blend combining high-quality coarse aggregate with a rich asphalt cement content. This blend generates a stable paving combination with a powerful stone-on-stone skeleton that offers excellent durability and routing strength. The objectives of this work are: Studying the durability performance of stone matrix asphalt (SMA) mixture in terms of moisture damage and temperature susceptibility and Discovering the effect of stabilized additive (Fly Ash ) on the performance of stone matrix asphalt (SMA) mixture. In this investigation, the durability of stone matrix asphalt concrete was assessed in terms of temperature susceptibility, resistance to moisture damage, and sensitivity t
... Show MoreTo reduce the effects of discharging heated water disposed into a river flow by a single thermal source, two parameters were changed to get the minimum effect using optimization. The first parameter is to distribute the total flow of the heated water between two disposal points (double source) instead of one and the second is to change the distance between these two points. In order to achieve the solution, a two dimensional numerical model was developed to simulate and predict the changes in temperature distribution in the river due to disposal of the heated water using these two points of disposal.
MATLAB-7 software was used to build a program that could solve the governing partial equations of thermal pollution in rivers by using t
This research explores the themes of identity and alienation in Tsitsi Dangarembga's famous novel, Nervous Conditions, through Kimberlé Crenshaw's intersectionality theory. The story takes place in postcolonial Zimbabwe and delivers a fascinating illustration of the intersecting domains of gender, race, class, and colonial legacies that shape the characters' experiences of identity and alienation. Benefitting from Crenshaw's intersectional paradigm, this article explores the multidimensional interface of societal categorizations and power relations in the novel, revealing the complex dynamics of individuals as they negotiate their identities in a postcolonial context. Through a thorough examination of Tambudzai's journey and the problems o
... Show MorePurpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance. Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis. Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and t
... Show More