Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.
The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.
I chose the subject of my research the types of Mahjail and
... Show MoreBackground: diagnostic radiology field workers are at elevated risk level for systemic and oral diseases like periodontal diseases. This study was aimed to estimate the periodontal condition and salivary flow rate among diagnostic radiology workers. Material and method: The sample for this study consisted of a study group radiographers (forty subjects) working for 5 years at least and control group consisted of nurses and laboratory workers away from radiation (forty subjects) in Baghdad hospitals. All the 80 subjects aged 30-40 year-old and looking healthy without systemic diseases. Plaque, gingival, periodontal pocket depth and clinical attachment loss indices were used for recording the periodontal conditions. Under standardized condi
... Show MoreMeloxicam is a non-steroidal anti-inflammatory drug. It is practically insoluble in water. It is associated with gastrointestinal side effects at high doses on long term treatment. The aim of this investigation to formulate and evaluate gellified nanoemulsion of meloxicam as a topical dosage form to enhance meloxicam therapeutic activity and reduce systemic side effect.
The pseudo ternary phase diagrams were made, including the oil mixture which is composed of almond oil and peppermint oil at a ratio (1:2), variable surfactant mixture (S mix) which are tween 80 and ethanol at ratios of (1:1, 2:1, 3:1, and 4:1) and double distilled water. Slow dripping of double distilled water to the combination of the oil mixtu
... Show MoreBackground: Abdominoplasty is one of the commonest surgical procedures that performed for those patients who had skin laxity, strive and muscle rectur diastasis. Combined using of liposuction and abdominoplasty it can give better result than traditional abdominoplasty with fear complications. Patient and Method: A total number of 25 female patients with age ranging between 27-55 years were underwent lipoabdominoplasty. With extensive liposuction of abdominal wall and selective undermining together with muscle plication. All of our patients had body mass index more than 30. Patients satisfaction and complication were documented postoperatively. Result: All of our patients had no Major complications and the postoperative period passed unevent
... Show MoreField experiment was conducted during 2007 in the experimental field of crop science Department/ Collage of Agriculture/ University of Baghdad, in order to identify the mechanism of compensation of cotton plant of Lashata Variety, with different levels of fruiting form removal in various time intervals and the effect of this factor on yield component. We use complete randomized block design with three replications. To compare the treatments: (control), 50% bud removal for one, two and three successive weeks, and 100% bud removal for one, two and three successive weeks, 50% flower removal for one, two and three successive weeks and 100% flower removal for one, two and three successive weeks, 50% boll removal for one, two and three successive
... Show MoreIn this paper,we focus on the investigated and studied of transition rate in metal/organic semiconductor interface due to quantum postulate and continuum transition theory. A theoretical model has been used to estimate the transition rate cross the interface through estimation many parameters such that ;transition energy ,driving electronic energy U(eV) ,Potential barrier ,electronic coupling ,semiconductor volume ,density ,metal work function ,electronic affinity and temperature T. The transition energy is critical facter of charge transfer through the interfaces of metal organic films device and itscontrol of charge injection and transport cross interface. However,the potential at interfa
... Show MoreThis research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.
After ensuring the validity and reliability of the two research tools and their suitabi
... Show MoreRegression models are one of the most important models used in modern studies, especially research and health studies because of the important results they achieve. Two regression models were used: Poisson Regression Model and Conway-Max Well- Poisson), where this study aimed to make a comparison between the two models and choose the best one between them using the simulation method and at different sample sizes (n = 25,50,100) and with repetitions (r = 1000). The Matlab program was adopted.) to conduct a simulation experiment, where the results showed the superiority of the Poisson model through the mean square error criterion (MSE) and also through the Akaiki criterion (AIC) for the same distribution.
Paper type:
... Show MoreReading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be taught
... Show More