Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Fri Sep 24 2021
Journal Name
Applied Sciences
The Impact of Calcitriol on Orthodontic Tooth Movement: A Cumulative Systematic Review and Meta-Analysis
...Show More Authors

A cumulative review with a systematic approach aimed to provide a comparison of studies’ investigating the possible impact of the active form of vitamin D3, calcitriol (CTL), on the tooth movement caused by orthodontic forces (OTM) by evaluating the quality of evidence, based on collating current data from animal model studies, in vivo cell culture studies, and human clinical trials. Methods: A strict systematic review protocol was applied following the application of the International Prospective Register of Systematic Reviews (PROSPERO). A structured search strategy, including main keywords, was defined during detailed search with the application of electronic database systems: Medline/Pubmed, EMBASE, Scopus, Web of Science, and

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Telecommunication Systems
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends
...Show More Authors

View Publication
Scopus (30)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Scheduling projects using dynamic programming style and smart algorithm
...Show More Authors

The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.

It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 19 2021
Journal Name
Annals Of Telecommunications
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper
...Show More Authors

Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de

... Show More
View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Using of Constructed Wetlands in The Treatment of Wastewater: A Review for Operation and Performance: Review for Using of Constructed Wetlands in The Treatment of Wastewater: Operation and Performance
...Show More Authors

Wastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Aspirin Derivatives Exploration: A Review on Comparison Study with Parent Drug
...Show More Authors

In recent decades, drug modification is no longer unusual in the pharmaceutical world as living things are evolving in response to environmental changes. A non-steroidal anti-inflammatory drug (NSAID) such as aspirin is a common over-the-counter drug that can be purchased without medical prescription. Aspirin can inhibit the synthesis of prostaglandin by blocking the cyclooxygenase (COX) which contributes to its properties such as anti-inflammatory, antipyretic, antiplatelet and etc. It is also being considered as a chemopreventive agent due to its antithrombotic actions through the COX’s inhibition. However, the prolonged use of aspirin can cause heartburn, ulceration, and gastro-toxicity in children and adults. This review article hi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Journal Of Advanced Pharmacy Education And Research
Review of interleukin-6 polymorphisms in rheumatoid arthritis: a genetic implications
...Show More Authors

The objective review is to inspect the involvement of Interleukin-6 (IL-6) in rheumatoid arthritis (RA) and to highlight the role of IL-6 and its variants in the pathogenesis of RA and response to anti-IL-6 agents. Several genetic and environmental risk factors and infectious agents contributed to the development of RA. Interleukin-6 is engaged in self-targeted immunity by modifying the equilibrium between T regulatory (T-reg) and T helper-17 (Th-17) cells. The evidences reported that IL-6 parti

View Publication Preview PDF