Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Background: Economic Globalization affects work condition by increasing work stress. Chronic work stress ended with burnout syndrome.
Objectives: To estimate the prevalence of burnout syndrome and the association of job title, and violence with it among physicians in Baghdad, and to assess the burnout syndrome at patient and work levels by structured interviews.
Subjects and Methods: A cross section study was conducted on Physicians in Baghdad. Sampling was a multistage, stratified sampling to control the confounders in the design phase. A mixed qualitative and quantitative
... Show MoreThe research (Anthropology and Representations of magic in Arab Theatrical Text, Harut and Marut's play as a Model) is concerned with studying magic and the forms of its presence in the theatrical text in different human cultures where it belongs. The research consists of four chapters.
The first chapter includes the research problem that revolves around the following questions: (what is the mechanism of employing magic anthropology and its representations in the Arab theatrical text Harut and Marut's play as a model?), and the research importance which is attributed to the necessity of studying (magic) in the Arab theatrical text as it is considered the inauguration of one of the social phenomena that many researchers in the field o
Objective: Comprehending microbial diversity and antibiotic resistance patterns is essential for efficient treatment protocols. This study sought to determine the incidence of bacterial and fungal pathogens responsible for burn and wound infections and their antibiotic susceptibility profiles. Methods: This cross-sectional study involved 140 patients with burn or wound infections. Sterile swabs and pus aspiration were employed to collect samples, which were subsequently processed using standard microbiological procedures. Antibiotic resistance was determined using the Kirby-Bauer disc diffusion method, following Clinical and Laboratory Standards Institute (CLSI) guidelines. Data was analysed using IBM SPSS version 25.0, and the Chi-
... Show MoreAge, hypertension, and diabetes can cause significant alterations in arterial structure and function, including changes in lumen diameter (LD), intimal-medial thickness (IMT), flow velocities, and arterial compliance. These are also considered risk markers of atherosclerosis and cerebrovascular disease. A difference between right and left carotid artery blood flow and IMT has been reported by some researchers, and a difference in the incidence of nonlacunar stroke has been reported between the right and left brain hemispheres. The aim of this study was to determine whether there are differences between the right and left common carotid arteries and internal carotid arteries in patient
Numerical study is adapted to combine between piezoelectric fan as a turbulent air flow generator and perforated finned heat sinks. A single piezoelectric fan with different tip amplitudes placed eccentrically at the duct entrance. The problem of solid and perforated finned heat sinks is solved and analyzed numerically by using Ansys 17.2 fluent, and solving three dimensional energy and Navier–Stokes equations that set with RNG based k−ε scalable wall function turbulent model. Finite volume algorithm is used to solve both phases of solid and fluid. Calculations are done for three values of piezoelectric fan amplitudes 25 mm, 30 mm, and 40 mm, respectively. Results of this numerical study are compared with previous b
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThe present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks
... Show MoreThe aims of research is to identify the role of strategic human resource management Practices in organizational performance improvement in the Baghdad soft drinks company, as well as the implications of the results for both managers and practitioners.
In order to achieve the objectives of the research, the researcher designed questionnaire included (40) items to collect the initial data from the research sample consisting of (53) Single. In light of that has been collecting and analyzing data and test hypotheses using the statistical package for Social Sciences (SPSS21), and use a number of statistical methods to achieve the goal of the research, including the means, standard deviations and simple correla
... Show MoreEven though in recent decades a bulk of studies have been accomplished on the use of communicative language teaching (CLT) in English as a foreign language (EFL) environments, fairly a limited numbers of studies precisely dealt with investigating the attitudes of language teachers, students and supervisors concerning the principals of CLT in the context of Iraq. Henceforth, this study was designed to delve into the attitudes of teachers, learners and supervisors about the implementation. To this end, the study was accomplished using a mixed method design. The present study was carried out in two phases: designing and using a questionnaire plus interviewing the teachers, students and supervisors (51 language learners, 41 teachers and
... Show More