Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The humid and warm conditions in greenhouses provide an excellent environment for pests’ living conditions, and therefore, they provide ideal medium for alien introductions. Molluscs are among the most significant pests that infest plastic covered greenhouses. To identify and report their mollusc species, 23 greenhouses in Iraq were surveyed between March 2023 and April 2024. Of these, 11 were found to be infested with snails. A total of 158 specimens were collected and morphologically identified to seven species: Monacha obstructa (L. Pfeiffer, 1842), Eobania vermiculata (O.F. Müller, 1774), Xeropicta krynickii (Krynicki, 1833), Rumina decollata (Linnaeus, 1758), Polygyra cereolus (Megerle Von Mühlfeld, 1818), Cochlicella barba
... Show MoreAn increasing interest is emerging in identifying natural products to overcome drug resistance in cancer patients. In this context, the present study was conducted to investigate the cytotoxic effects of neem plant (Azadirachta indica) oil in three different biological models (breast cancer cell lines, Allium cepa root tip, and mice vital organs). The cytotoxic potential of the neem oil was evaluated with two human cell lines (MCF7 and MDA-MB231) and an Allum cepa root tip bioassay. Histopathological analysis was conducted on the neem oil-treated and untreated control mice. The results revealed an anti-proliferative effect for neem oil on both estrogen receptor-positive (MCF7) and estrogen receptor-negative (MDA-MB231) breast cancer cell li
... Show MoreVisible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show More<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreZiziphora persica Bunge is recorded as a new Study in Iraq. This species has been collected from Jabal Sinjar in Nineveh province in the north western part of Iraq. The morphological characters, habitat and geographical distribution of the species with a key to Ziziphora L. species in Iraq have been provided.
Background: Diabetic cheiroarthropathy is a term derived from the Greek word “cheiros” meaning “of the hand”, It is characterized by stiff hands with distinctively thick, tight, and waxy skin, especially on the dorsal aspects of the hands. It is part of long term complication of diabetes and many suggest it is associated with microvascular complication. The aim of the study was to determine the prevalence of diabetic cheiroarthropathy in Iraqi patients with diabetes, and to study its association with diabetic retinopathy and glycemic control. Material and Methods: A cross-sectional study in which 110 diabetic patients and 110 non-diabetic healthy people who accepted to take part in the study were ran
... Show MoreThe speech act of refusals has been studied widely either alone or in relation to such areas as apology, requests, promotion, and invitation. The present study aims to investigate the strategies employed by Iraqi females in refusing marriage proposals. It attempts to explore their preferences to respond directly or indirectly in relation to their ages and educational background of the parents. The sample of the study consists of 25 participants; they are learners of English as a foreign language (EFL) at the College of Education for Women/ University of Baghdad. The data are collected by using a discourse completion task (DCT) followed by a follow up interview. The researchers used a Google form shared via emails to get responses from the p
... Show MoreThis paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.