Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show MoreIntroduction: Dental fear is defined as the patient’s specific reaction towards stress related to dental treatment in which the stimulus is unkn..
In this investigation, water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals), utilizing N-acetyl cysteine as a stabilizer, were prepared to assess their potential in differentiating between DNA extracted from pathogenic bacteria (e.g. Escherichia coli isolated from urine specimen) and intact DNA (extracted from blood of healthy individuals) for biomedical sensing prospective. Following the optical characterization of the synthesized QDs, the XRD analysis illustrated the construction of NAC-CdTe-QDs with a grain size of 7.1 nm. The prepared NAC-CdTe-QDs exhibited higher PL emission features at of 550 nm and UV-Vis absorption peak at 300 nm. Additionally, the energy gap quantified via PL and UV–Vis were 2.2 eV
... Show MoreBackground: The aim of the present study is to evaluate the esthetic smile in sample of Iraqi adults and to assess the gender differences. Materials and Methods: 100 persons (50malesand 50 females had class I normal dental and skeletal selected for this study.Clinical examination and digital photograph with posed smile were performed for each individual. Six linear soft tissue parameters in each photograph using AutoCAD program 2011. Five visual and four quantitative evaluations of the smile were studied for eachsubject. The smile arch and index, buccal corridor spaces (BCSs) were studied.Descriptive statistics of the measurements were calculated. Independent student’s ttestswere used to evaluate the gender differences. Statistics: Desc
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Praise be to Allah , the Lord of Heavens , Who revealed His Scripture in plain Arabic, and prayers and peace be upon the Master of all creatures and the chosen one , Muhammad (PBUH).Pushkin was known as a poet in Russia, the sun of its poetry that set, the father of the Russian literature and the founder of its literary language. When he published his poems, trying to express his inner poetic feelings and creative visions, he presented them with creativity and special touch. The reason behind the selection of Pushkin as the subject of this study is that he was affected by Islam and Arabs. For the purpose of this study, the dissertation has been divided into introduction and three chapters; each chapter includes two topics. In the introdu
... Show MoreThere is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used
... Show MoreThis study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin