Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
A total of (25) stool samples were collected from children and adults (2- 4) years old suffering from diarrhea to isolate E. coli strains that produce heat-stable enterotoxin a (STa), and after performing microscopic examination, cultural characterization and biochemical identification only (11) isolates showed positive E. coli. STa activity was estimated by using suckling mouse assay (SMA) and from these (11) isolates only (5) showed STa activity and the one with the highest STa activity was selected for large scale production of STa, which was followed by partial purification using ion-exchange chromatography (normal phase) using DEAE sephadex A-50 column. After purification and determination of protein concentration by using the standard
... Show MoreThe skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show MoreThis work presents a design for a pressure swing adsorption process (PSA) to separate oxygen from air with approximately 95% purity, suitable for different numbers of columns and arrangements. The product refill PSA process was found to perform 33% better (weight of zeolite required or productivity) than the pressure equalization process. The design is based on the adsorption equilibrium of a binary mixture of O2 and N2 for two of the most commonly used adsorbents, 5A & 13X, and extension from a single column approach. Zeolite 13X was found to perform 6% better than zeolite 5A. The most effective variables were determined to be the adsorption step time and the operational pressure. Increasing the adsorption step
... Show Morestructural and electrical of CuIn (Sex Te1-x)2
This research is devoted to study the effect of different in weight percentage of Sio2 particles and glass fibers (5, 10, 15, 20) wt. % on the wear rate epoxy resin. The results show that the value of hardness increase with the increase for the weight percentage of reinforcing particles and fibers, while the wear rate decrease with the increase the load level of the reinforcing particles and fibers . The largest value of the hardness, and the lowest value of the wear rate for epoxy reinforced with 20% of SiO2, the wear rate increase in general with increasing the applied load.
Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
This work studied the electrical and thermal surface conductivity enhancement of polymethylmethacrylate (PMMA) clouded by double-walled carbon nanotubes (DWCNTs) and multi-walled carbon nanotube (MWCNTs) by using pulsed Nd:YAG laser. Variable input factors are considered as the laser energy (or the relevant power), pulse duration and pulse repetition rate. Results indicated that the DWCNTs increased the PMMA’s surface electrical conductivity from 10-15 S/m to 0.813×103 S/m while the MWCNTs raised it to 0.14×103 S/m. Hence, the DWCNTs achieved an increase of almost 6 times than that for the MWCNTs. Moreover, the former increased the thermal conductivity of the surface by 8 times and the later by 5 times.
It is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe ongoing COVID‐19 pandemic caused by SARS‐CoV‐2 is associated with high morbidity and mortality. This zoonotic virus has emerged in Wuhan of China in December 2019 from bats and pangolins probably and continuing the human‐to‐human transmission globally since last two years. As there is no efficient approved treatment, a number of vaccines were developed at an unprecedented speed to counter the pandemic. Moreover, vaccine hesitancy is observed that may be another possible reason for this never ending pandemic. In the meantime, several variants and mutations were identified and causing multiple waves globally. Now the safety and efficacy of these vaccines are debatable and recommended to d