Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
Abstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show MoreThe present research focuses on the study of the effect of mass transfer resistance on the rate of heat transfer in pool boiling. The nucleate pool boiling heat transfer coefficients for binary mixtures (ethanol-n-butanol, acetone-n-butanol, acetone-ethanol, hexane-benzene, hexane-heptane, and methanol-water) were measured at different concentrations of the more volatile components. The systems chosen covered a wide range of mixture behaviors.
The experimental set up for the present investigation includes electric heating element submerged in the test liquid mounted vertically. Thermocouple and a digital indictor measured the temperature of the heater surface. The actual heat transfer rate being obtained by multiplying the voltme
... Show MoreUrinary Tract Infection is an infection that caused by the members of the genus
Proteus that depends mainly on the availability of virulence factors ;Various
virulence factors including biofilm, swarming migration , polysaccharide
,heamolysin,protease, DNase, urease production weredetermined for 45Proteus
isolates that obtained from clinical specimens of Urinry Tract Infection patient .
The distribution of virulence factors was showed variation among the testedisolates
and strain specific in most cases. All Proteus isolates showed 45 (100%)biofilm ,
polysaccharide andSwarming capabilities with different extents. High
ureaseproduction was demonstrated in most isolates 40 (88.8%);In addition, they
were abling to
In this paper, Activated Carbon was successfully prepared from local Iraqi material namely corns stalks .Zinc chloride ZnCl2 was used as activating agent with different concentrations (20%, 40%, 60%) for 72 hours. followed by carbonization at 450 C for (2) hour. UV-Spectrophotometer used for measuring absorbance of methylene blue solutions before and after adsorption. the maximum amount adsorbed for methylene blue material of the prepared activated Carbon was studied by Langmuir adsorption isotherm. Other characteristics of the resulting activated Carbon also discussed, such as pH, Moisture Content and ash content. Finally Activated carbon prepared in this work has good properties compared to the standard samples in such a way it could be
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Some responses to ancient grammarians
And contemporary researchers
In monograms
In this investigation insulator ceramic body was prepared by using iraqi local materials, these are kaolin, silica sand glass, feldspar with weight percentage (45%,25%, 30%)respectively. After the end of treating drying and milling of raw material mixing with different concentrations of sodium silicate(1%,0.7%,0.5%,0.2%,0.1%) while zinc oxide was added at fixed weight percentage. A disc samples was prepared after compaction and then fired by sintering temperatures (1250, 1350)oC respectively.A surface morphology was studied by using optical microscope and measurements of apparent density and porosity was under taken to the sintered samples by using Archimedes method.The study showed that the microscopic images for samples sur
... Show MoreIn this article it is proved experimentally that the photon is a particle that has mass and constant wavelength by explaining the effect of refractive index on the wavelength and the natural mass of photon. It is very difficult to measure the mass of photon, a simple and easy process was proposed in this paper to calculate the mass length of photon in vacuum (Y) and in medium (Y*), by measuring the length of laser beam in air (Lair) and in medium (Lmed). A new method was postulated to calculate refractive index by using these relations (n = Y*/Y), and (n = Lmed / Lair) which supposed a new theory of light.
words of God the Quranic text , is genera words have many faces and connotations a ccording to references, cutures and Ages.That the Quranic text is fixed , But the connotations are moveable the scientists agreed about the miracle of the Qurantic text , But they differd of the Position of miracLe including the muatazala and Al- Ashaira who have adopted the idea of sytem and miracle of linguistic . Most of them were lingustics, grammerians and writers as: AL- Jahith, AL- Faraa Abivbeida , Ibn kutaba , AL -Rumani , AL -katabi , AL- Bakilaai , AL- Gargani and Others.
They also differed in what the words of Allaah mean . Is the Quranic text creature or updated ,it is the issue that exhausted the effort.of muslim scientists though its imbo