Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Bladder cancer (BC) is the predominant malignant neoplasm in the urinary system and ranks as the tenth most prevalent malignant tumor worldwide. Compared with females, males displayed a four-fold more common incidence of bladder cancer. It mainly affects men. Bladder cancer is the fourth most prevalent neoplasm in males. The most important protein that makes up high density lipoprotein (HDL), ApoA-I apolipoprotein A1 is essential in regulating the right amount of cholesterol. Multiple inquiries have demonstrated that APOA1 plays a pivotal role in the progression, infiltration, and spread of tumors. Objectives. The objective of this study was to measure the level of urine to serum apolipoprotein A1 in patients suffering from bladder
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
The study included the collection of 75 bronchial wash samples from patients suspected to have lung cancer. These samples were subjected to a diagnostic cytological study to detect the dominant type of lung cancer. It was noticed that 33 patients proved to have a lung cancer out of 75 (44%) of these, 19 cases (57.6%)were diagnosed having Squamus cell carcinoma,7cases (21.21%) showed Adenocarcinoma ,6 cases (18.18%) were having small cell carcinoma while only one case (3.03%)was large cell carcinoma .Nearly 70% of cases were correlated with smokers .Bacteria were isolated from 53 patients in which 33 isolates were associated with the cancer cases while 20 of them from non infected patients. By using different morphological ,biochemical test
... Show MoreA new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli
... Show MoreIn this research, a novel thin film Si-GO10 and nanopowders Si-GO30 of silica-graphene oxide (GO) composite were prepared via the sol–gel method and deposited on glass substrates using spray pyrolysis. X-ray diffraction (XRD) results showed a relatively strong peak in the graphite layer that corresponds to the (002) plane. Transmission electron microscope (TEM) images showed that SiO2 nanoparticles were randomly distributed on the surface of GO plates, and the particle size in these nanopowders was below 50 nm. Field emission scanning electron microscopy (FESEM) analysis demonstrated that silica nanoparticles on the surface of GO plates exhibited almost spherical and rod-like nanoparticle shape, which in tur
... Show MoreThe research aims to explain the role of the flexible budget in assessing the feedback resulting from deviations by comparing the actual results with the planned performance in light of the economic crisis that the world witnessed during the spread of Corona disease. As most companies, including the Electronic Industries Company, face the problem of controlling production costs and are trying hard to reduce these costs to the lowest level starting from measuring these costs and allocating them and distributing them to products. This helps in controlling deviations and thus the flexible budget becomes a tool that helps in controlling elements Costs
Twenty isolates of Serratia marcescens were isolated from inflammation of the urinary tract (UTI)., These isolates were found to produce hemolysin as indicated by blood agar plates in which the hemolysis of red blood cell indicate a positive result. Isolates were selected according to their hemolysis activity by measuring absorbance of hemoglobin at 405 nm that released from red blood cell. Hemolysin was completely purified using 50-75% saturation of ammonium sulphate followed by ion exchange chromatography with DEAE-cellulose then gel filtration chromatography by sepharose 4B. Accordingly molecular weight for the purified toxin was estimated as 45 KD.
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MorePure SnSe thin film and doped with S at different percentage (0,3,5,7)% were deposited from alloy by thermal evaporation technique on glass substrate at room temperature with 400±20nm thickness .The influences of S dopant ratio on characterization of SnSe thin film Nano crystalline was investigated by using Atomic force microscopy(AFM), X-ray diffraction (XRD), energy dispersive spectroscopy (EDS), Hall Effect measurement, UV-Vis absorption spectroscopy to study morphological, structural, electrical and optical properties respectively .The XRD showed that all the films have polycrystalline in nature with orthorhombic structure, with preferred orientation along (111)plane .These films was manufactured of very fine crystalline size in the ra
... Show More