Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThe use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
In the current century, nanotechnology has gained great interest due to its ability to modify the size of metals to the nanoscale, which dramatically changes the physical, chemical, and biological characteristics of metals relative to their bulk counterparts. The approaches used to create nanoparticles (NPs) are physical, و chemical and وbiological. The shortcomings in physical and chemical synthesis approaches, such as the generation of toxic by-products, and energy consume as they require high temperature, pressure, power and lethal chemicals, contributed to an increased interest in biological synthesis by plants. Scientists have created a new filed called as "green nanotechnology" by fusing the idea of sustainability with nanotechno
... Show MoreBack ground : Coronary artery diseases are not uncommon in the presence of right bundle branch block.
Aim : The aim of this study is to assess the findings of coronary angiography in patients with chest pain and right bundle branch block.
Methods : The study involved review of case sheets and coronary angiography of one hundred patients, who underwent coronary angiography due to chest pain suspected to have
coronary artery diseases (CAD) , fifty patients of them had right bundle branch block (RBBB) , the other fifty did not have RBBB , those 100 patients were presented to Ibin Al Bitar hospital
for cardiac surgery from January 2004 to June 2006. History, clinical examinations, electrocardiogram (ECG)
Wireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener
... Show MoreThe concrete industry consumes millions of tons of aggregate comprising of natural sands and gravels, each year. In recent years there has been an increasing trend towards using recycled aggregate to save natural resources and to produce lightweight concrete. This study investigates the possibility of using waste plastic as one of the components of lead-acid batteries to replace the fine aggregate by 50 and 70% by volume of concrete masonry units. Compared to the reference concrete mix, results demonstrated that a reduction of approximately 32.5% to 39.6% in the density for replacement of 50% to 70% respectively. At 28 days curing age, the compressive strength was decreased while the water absorption increased by increas
... Show More