Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta

Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 24 2021
Journal Name
2021 Ieee Asia Pacific Conference On Postgraduate Research In Microelectronics And Electronics (primeasia)
Review of 3D Networks-On-Chip Simulators and Plugins
...Show More Authors

A comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.

View Publication
Scopus (11)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
J. Pharm. Sci. & Res.
Methods of Synthesis Phthalimide Derivatives and Biological Activity-Review
...Show More Authors

Phthalimide formation of Phthalic anhydride with various amines using microwave or without a method with the difference of the catalyst used in a prepared Phthalimide, either structure general are C6H4CONRCO and used as starting materials in synthesis several compounds derivative phthalimides are an important compounds because spectrum wide biological activities including Antimicrobial activity, anticonvulsant activity, Anti-inflammatory activity,Analgesic activity, Anti- influenza activity and Thromboxane inhibitory activity

Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Science
RETRIEVING DOCUMENT WITH COMPACT GENETIC ALGORITHM(CGA)
...Show More Authors

Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (6)
Scopus Crossref