Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The study intends to explore the obstacles that encounter a program of rehabilitating released prisoners as perceived by prisoners themselves in tubas' province. To this end, the researcher used a questionnaire as an instrument which was applied on (150) prisoner had chosen randomly to collect the study data. The findings revealed no significant differences among obstacles the encounter program regarding to the following variables: age, detention period, and number of detention, additionally, the findings found that there is a variance of obstacles mean according to the prisoners themselves, rehabilitation program, and the facility of that program.
The main topic of this study is central around the independence of Jordanian central bank and the extent of the effectiveness at the bank in leading the monetary policy without interferences or pressures from side of the government. the degree of independence of Jordanian central bank was based on the following based hypothesis following ,there is relationship between the independence of the central bank and the legislative and economical indices. the most important recommendations are degree of independence of the Jordan central bank 43.5% is a good one, but it possible to reach a higher degree than this one by to making some modification on the Jordanian central bank law and by the central bank should be more rigid
... Show MoreIn this paper the concept of (m, n)- fully stable Banach Algebra-module relative to ideal (F − (m, n) − S − B − A-module relative to ideal) is introducing, we study some properties of F − (m, n) − S − B − A-module relative to ideal and another characterization is given
This paper aims to study the effect of circular Y-shaped fin arrangement to improve the low thermal response rates of a double-tube heat exchanger containing Paraffin phase change material (PCM). ANSYS software is employed to perform the computational fluid dynamic (CFD) simulations of the heat exchanger, including fluid flow, heat transfer, and the phase change process. The optimum state of the fin configuration is derived through sensitivity analysis by evaluating the geometrical parameters of the Y-shaped fin. For the same height of the fins (10 mm), the solidification time is reduced by almost 22%, and the discharging rate is enhanced by almost 26% using Y-shaped fins compared with the straight fins. The results demonstrate that the sol
... Show MoreAbstract
This research aims to study human error effects in the banking risks in the private banks through the measurement and testing of human error effect in every kind of banking risks types and stand on the most closely associated with the risks in order to focus on them and make appropriate processors have with respect to and increase the availability of skills and expertise required to carry out banking operations of error-free manner.
Find dealt with human error in terms of meaning and understandable, classifications and types, causes and consequences and its approaches and theories. Also addressed placed banking risks in terms of meaning and concept, species and entr
... Show MoreObjective: To assess the impact of a social support for pregnant women upon their pregnancy outcome Methodology: A descriptive purposive study was used to assess the impact of a social support on their pregnancy outcomes. The study was conducted from (22 \ September \ 2020 to 15 \ February \ 2021). A non-probability sample (purposive sample) was selected from 100 women. Data were collected through an interview with the mother in the counseling clinic, during the third trimester of pregnancy, as well as after childbirth in the labor wards to assess the outcome of pregnancy. Data were analyzed through descriptive statistics (frequency and percentages). Results: The most important thing observed in this study was the positive pregnancy outcome
... Show MoreHands have consistently been an important vehicle in the transmission of disease (1). Thus, thorough hand-washing remains the single most important factor in preventing infection specially in hospitals and labs.Twenty-nine non-clinical volunteers (do not work or come in contact with a clinical or hospital setting) that lacked visible skin injuries, eczema or apparent skin disease were used, those subjects were all tested by a material of each of the three used in the study weekly and laboratory tests were done pre- and post washing.All three material were effective , Eugenol extract as effective as the bar and lotion soap. And this was confirmed statistically.Eugenol has a great antibacterial action even in small concentration and t
... Show More