Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Journal Of Physical Education
Proactive leadership and its relationship to managing the organizational error of the Iraqi Handball Federation from the point of view of the clubs participating in the Iraqi Elite League for the season 2023-2024
...Show More Authors

This research seeks to study the role of proactive leadership as an essential element that helps all federations that lead the wheel of sports, including the Iraqi Handball Federation, so that it builds a correct environment that helps manage the organizational errors that the Handball Federation may fall into, and this in turn helps in early detection of errors and obstacles that may occur. It is likely that the Federation will fall into the process of managing and organizing the Iraqi Handball League, in addition to increasing the clubs’ ability to assist the Iraqi Handball Federation by being proactive so as not to make mistakes. The research community included the administrative bodies of the clubs participating in the Iraqi E

... Show More
View Publication
Crossref
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of The College Of Education For Women
The Sources of Organizational Power Prevailing among Academic Leaders at University of Tabuk and its Relationship to Institutional Creativity from the Viewpoint of Faculty Members: شروق بنت عبد الخالق الأسمري , علي بن حسن القرني
...Show More Authors

This study aims to examine the sources of organizational power prevailing among the academic leaders at the University of Tabuk from the faculty members’ viewpoint. The purposes behind such an aim are: to reveal the level of administrative and technical institutional creativity, the nature of the relationship between the reality of organizational power and the level of institutional creativity, and to disclose statistically the significant differences between the averages of faculty members’ responses attributed to the demographic variables (gender,  years of experience, academic degree). The study used the descriptive approach, both survey and correlational. A questionnaire was used to collect data from a simple random sample o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 21 2019
Journal Name
Journal Of The College Of Languages (jcl)
LAS TENDENCIAS MODERNAS EN LA CRÍTICA LITERARIA: EL ESTRUCTURALISMO Y EL FORMALISMO EN LA INTERPRE TACIÓN DE TEXTOS LITERARIOS RECENT TRENDS IN LITERARY CRITICISM: THE STRUCTURAL AND FORMALISM IN THE INTERPRETATION OF LITERARY TEXTS
...Show More Authors

El estudio se clasifica dentro los estudios teóricos sobre literatura que se ocupa del estudio de los métodos de la crítica literaria: El Estructralismo literario francés y el Formalismo ruso del siglo XX que se utilizan en la interpretación literaría. Las dos corrientes literarias estudian la literatura como ciencia que busca aplicar un método científico al estudio de la literatura. Dicho estudio trata de exponer las teorías críticas que surgen en el debate de la interpretación de los textos literarios como el de Susan Sontag, Ricoeur Paul y Mijail Bajitin, etc. Además se incluye algunos ejemplos implican el análisis estructuralista y formalista como Kafka y la tragedia Judía. y Sur Racine.

ABSTRACT:

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the use of automated accounting systems technology in enhancing the efficiency and effectiveness of the internal control system.: دراسة تحليلية لعينة من الموظفين العاملين في اقسام المحاسبة والتدقيق في الجامعات البحرينية
...Show More Authors

The research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the                                       electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Eurasian Chemical Communications
Assessment of hypoxemia status by measuring serum level of hypoxia inducible factor 1 alpha in relation to tumor suppression protein p53, estradiol and tumor proliferation markers of breast cancer in Thi-Qar province/Iraq
...Show More Authors

Scopus (9)
Scopus Clarivate
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Theoretical Study, and Biological Evaluation of Some Metal Ions with Ligand "Methyl -6-[2-(4-Hydroxyphenyl) -2-((1-Phenylethylidene) Amino) Acetamido] -2,2-Dimethyl-5—Oxo-1-Thia-4-Azabicyclo [3.2.0] Heptane-3-Carboxyylate
...Show More Authors

Schiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Spectrophotometric Determination of Micro Amount of Chromium (III) Using Sodium 4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate in the Presence of Surfactant, Study of Thermodynamic Functions and Their Analytical Applications
...Show More Authors

          Using sodium4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate (SDPIHN) as a chromogenic reagent in presence of non-ionic surfactant (Triton x-100) to estimate the chromium(III)  ion if the wavelength of this reagent 463 nm to form a dark greenish-brown complex in wavelength 586 nm at pH=10,the complex was stable for longer than 24 hours. Beer's low, molar absorptivity 0.244×104L.mol-1.cm-1, and Sandal's sensitivity 0.021 µg/cm2 are all observed in the concentration range 1-11 µg/mL. The limits of detection (LOD) and limit of quantification (LOQ), respectively, were 0.117 µg/mL and 0.385µg/mL. (mole ratio technique, job's method) were employed to

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Sep 03 2010
Journal Name
Journal Of The College Of Education For Women
Analysis of Grammatical Forms and Semantic Functions of Hedging in Political Discourse: American Presidential Debate: تحلیل نماذج نحویة ذات وظائف دلالیة مستعملة في الخطاب السیاسي بوصفھ اسلوباً تحوطیاً: المناظرة الرئاسیة الاولى في الانتخابات الامریكیة
...Show More Authors

Hedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to

... Show More
View Publication Preview PDF