Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThis study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreBackground: Periodontal diseases are inflammatory diseases affecting the supporting tissues of the teeth. One of the leading environmental factors that are closely related not only to the risk but also to the prognosis of periodontitis is smoking. This study aimed to evaluate the influence of smoking on periodontal health status and to measure the levels of matrix metalloproteinase-9 in smokers and nonsmokers chronic periodontitis patients, also it aimed to test the correlation between the levels of matrix metalloproteinase-9 and the clinical periodontal parameters. Materials and Methods: Five milliliters samples of un-stimulated whole saliva and full-mouth clinical periodontal recordings (plaque index, gingival index, bleeding on probing,
... Show MoreBackground: There are many congenital anomalies associated with cleft lip and/or palate. This research is to study the prevalence of congenitally missing teeth and supernumerary teeth in this population group. Materials and Method: One hundred eight cleft lip and/or palate Iraqi patients had participated in this study (57 male, 51 female), 3-12 years of age. 26 of them had orthopantomogram were within (6-12) years of age were inspected for congenitally missing teeth and supernumerary teeth. Patients whom age range 3-5 years were checked for the congenitally missing teeth by clinical examination with strongly insisting the teeth were not missed due to caries or trauma. Results: There were 19(73.076%) patients with 41 congenitally missing tee
... Show MoreDensity Functional Theory (DFT) method of the type (B3LYP) and a Gaussian basis set (6-311G) were applied for calculating the vibration frequencies and absorption intensities for normal coordinates (3N-6) at the equilibrium geometry of the Di and Tetra-rings layer (6, 0) zigzag single wall carbon nanotubes (SWCNTs) by using Gaussian-09 program. Both were found to have the same symmetry of D6d point group with C--C bond alternation in all tube rings (for axial bonds, which are the vertical C--Ca bonds in rings layer and for circumferential bonds C—Cc in the outer and mid rings bonds). Assignments of the modes of vibration IR active and inactive vibration frequ
... Show Morerhabditid Mesorhabditis franseni Fuchs, 1933 (Family, Mesorhabditidae) and pratylenchid nematode Pratylenchus goodeyi Sher and Allen, 1953 (Family, Pratylenchidae). They were illustrated by molecular aspects. All specimens of both genera were cultured and reproduced for DNA extraction. M. franseni (IRQ.ZAh2 PP528819.1 isolate) was characterized. P. goodeyi (IRQ.ZAh5 PP535537 isolate) was also characterized. Selected specimens of these two species were molecularly characterized using the partial ITS-rRNA gene sequences. The ITS-rRNA sequence of IRQ.ZAh2 PP528819.1 isolate had a range of (98.62%-100%) sequence homology with ITS-rRNA sequence of M. franseni available in NCBI database. While, the ITS-rRNA sequence of IRQ.ZAh5 PP535537 isolate h
... Show MoreBackground: Toxoplasmosis is a very common infection caused by the obligate intracellular protozoan parasite. This parasite is called Toxoplasma gondii widely distributed around the world . Toxoplasma gondii can be vertically transmitted to the fetus during pregnancy and may cause wide range of clinical manifestations in the offspring.
Objective: To determine seroprevalence Immunoglobulin G (IgG) and Immunoglobulin M (IgM ) to toxoplasma gondii among pregnant women and to identify the risk factors.
Type of the study: A cross-sectional study.
Methods: A total of 110 blood samples of pregnant women were collected from
... Show More