Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The current world is observing huge developments in presenting the opportunity for organizations and administrative units to use information and communication technology and their adoption by administrative work due to its importance in the achievement of work with higher efficiency, speed, and facility of communication with all individuals and companies using various means of communication Depending on the Internet networks. Therefore, the research dealt with the study of electronic systems designed and adopted in the creation or construction of a database for archiving data, which is the main method in organizations and administrative units in developed countries. Where this system works to convert documents, and manual processes and t
... Show MoreBackground: Chronic kidney disease is a gradual loss of kidney function with diabetes and hypertension as the leading cause. Chronic kidney disease is one of these systemic diseases that can affect salivary contents. Aims: This study aimed to assess salivary immunoglobulin A, interleukin-6 and C- reactive protein in chronic kidney disease patients on hemodialysis and those on conservative treatment in comparison with control subjects. Materials and methods: Ninety subjects were included in this study divided into three groups: 30 patients with chronic kidney disease on hemodialysis for at least 6 months ago; 30 patients with chronic kidney disease on conservative treatment and 30 healthy control subjects. Secretory immunoglobulin A, inte
... Show MoreAbstract
The research aims to examine the relationship between psychological flow, psychological well-being, and self-management among a sample of fine artists in the Makkah region and its governorates. The research also aims to examine the mean group differences in psychological flow, psychological well-being, and self-management due to demographic variables (sex and years of practicing arts). The sample consists of (110) male and female fine artists. The descriptive correlational approach was performed to collect the data by using the psychological flow scale developed by Payne et al (2011), which was translated by the researcher, the Oxford happiness questionnaire developed by Hills and Argyle (2002), it has t
... Show MoreThe dubbing process for the Foreign Dramas by the Kurdish language became a serious phenomenon in the Kurdish satellite TV, especially in the past few years. It attracted a wide audience, especially young adolescents. And prepared by some breakthrough hostile to Kurdish culture and value coordinated by others remedy for the structural gaps and lapses have, as a result of climate which is brought into existence globalization and secretions variety dimensional, saturated value and cognitive effects bearing a strong identity of its elements. From here, the problem of this research is the ambiguity of their role in a series of developmental processes Kurdish awareness of young people and the extent of the impact that caused it.
This
... Show MoreThe aim of this paper is to study the Zariski topology of a commutative KU-algebra. Firstly, we introduce new concepts of a KU-algebra, such as KU-lattice, involutory ideal and prime ideal and investigate some basic properties of these concepts. Secondly, the notion of the topology spectrum of a commutative KU-algebra is studied and several properties of this topology are provided. Also, we study the continuous map of this topological space.
Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
The concept of the order sum graph associated with a finite group based on the order of the group and order of group elements is introduced. Some of the properties and characteristics such as size, chromatic number, domination number, diameter, circumference, independence number, clique number, vertex connectivity, spectra, and Laplacian spectra of the order sum graph are determined. Characterizations of the order sum graph to be complete, perfect, etc. are also obtained.
We used to think of grammar as the bones of the language and vocabulary as the flesh to be added given that language consisted largely of life generated chunks of lexis. This “skeleton image” has been proverbially used to refer to that central feature of lexis named collocation- an idea that for the first 15 years of language study and analysis gave a moment‟s thought to English classroom material and methodology.
The work of John Sinclair, Dave Willis, Ron Carter, Michael McCarthy, Michael Lewis, and many others have all contributed to the way teachers today approach the area of lexis and what it means in the teaching/learning process of the language. This also seems to have incorporated lexical ideas into the teaching mechanis
A 20 year-old male was admitted with a history of recurrent palpitations from 5 years. Baseline ECG revealed premature ventricular contractions (PVCs) with delta waves. Stress ECG showed short non-sustained Ventricular tachycardia (VT). Echocardiography showed moderate dilation of the left ventricle with mild reduced systolic function and Ejection fraction was estimated to be 42%. Right ventricle was mildly dilated and hypokinetic. Both atria were mildly dilated. The patient referred to CVC for EP study with possible ablation. The ablation of the focus led to complete suppression of the ectopy. Post-procedure ECG and echocardiography showed normalized rhythm and systolic function.