Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di
... Show MoreThe experimental and numerical analysis was performed on pipes suffering large plastic deformation through expanding them using rigid conical shaped mandrels, with three different cone angles (15◦, 25◦, 35◦) and diameters (15, 17, 20) mm. The experimental test for the strain results investigated the expanded areas. A numerical solution of the pipes expansion process was also investigated using the commercial finite element software ANSYS. The strains were measured for each case experimentally by stamping the mesh on the pipe after expanding, then compared with Ansys results. No cracks were generated during the process with the selected angles. It can be concluded that the strain decreased with greater angles of con
... Show MoreBackground: Among individuals who have a stenotic aortic valve, a precise assessment of aortic valve area is essential for clinical judgment. So far, no studies have been conducted to investigate and assess the role of the three dimensional echo-cardiography in the assessment of the valve stenosis. This study aims to compare and assess the precision of the measurement of the stenosis area of the aortic valve by 2D versus 3D echo-cardiography.
This research focuses on improvement of the corrosion behaviour of commercial pure titanium (Ti) grade II when exposed to Hank’s solution through different surface treatments. The disc shape of titanium samples were constructed to be divided according to their surface treatment. The first experimental group the Ti sample was exposed to computer numerical control (CNC) fiber laser machine. Whereas, the other experimental group the Ti sample was only coated with Polyetherketon keton (PEKK) by using carbon dioxide (CO2) laser technique while the last experimental group the Ti sample was treated with CNC fiber laser followed by PEKK coating by using CO2 laser technique. All were compared with the untreated control group. The electrochemical a
... Show MoreThe research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c
... Show MoreIn this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic
... Show MoreKE Sharquie, AA Noaimi, SY Mohsin, 2011 - Cited by 4
Different polymers were prepared by condensation polymerization of sebacic anhydride and adipic anhydride with ethylene glycol and poly(ethylene glycol). Their number average molecular weights were determined by end group analysis. Then, they were grafted on the prepared phthalocyaninatocopper(II) compounds with the general formula (NH2)4PcCu(II) having amino groups of 3,3',3'',3'''- or 4,4',4'',4'''- positions. All prepared polymers, compounds, and phthalocyaninatocopper(II)-grafted polymers were characterized by FTIR. The sizing measurements were carried out in 3,3',3'',3'''- (NH2)4PcCu(II) and 4,4',4'',4'''- (NH2)4PcCu(II) compounds with and without grafting polymers. The results showed that the grafting process led to decreasing in par
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More