Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The experimental and numerical analysis was performed on pipes suffering large plastic deformation through expanding them using rigid conical shaped mandrels, with three different cone angles (15◦, 25◦, 35◦) and diameters (15, 17, 20) mm. The experimental test for the strain results investigated the expanded areas. A numerical solution of the pipes expansion process was also investigated using the commercial finite element software ANSYS. The strains were measured for each case experimentally by stamping the mesh on the pipe after expanding, then compared with Ansys results. No cracks were generated during the process with the selected angles. It can be concluded that the strain decreased with greater angles of con
... Show MoreBackground: Among individuals who have a stenotic aortic valve, a precise assessment of aortic valve area is essential for clinical judgment. So far, no studies have been conducted to investigate and assess the role of the three dimensional echo-cardiography in the assessment of the valve stenosis. This study aims to compare and assess the precision of the measurement of the stenosis area of the aortic valve by 2D versus 3D echo-cardiography.
This research focuses on improvement of the corrosion behaviour of commercial pure titanium (Ti) grade II when exposed to Hank’s solution through different surface treatments. The disc shape of titanium samples were constructed to be divided according to their surface treatment. The first experimental group the Ti sample was exposed to computer numerical control (CNC) fiber laser machine. Whereas, the other experimental group the Ti sample was only coated with Polyetherketon keton (PEKK) by using carbon dioxide (CO2) laser technique while the last experimental group the Ti sample was treated with CNC fiber laser followed by PEKK coating by using CO2 laser technique. All were compared with the untreated control group. The electrochemical a
... Show MoreThe research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c
... Show MoreIn this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic
... Show MoreKE Sharquie, AA Noaimi, SY Mohsin, 2011 - Cited by 4
Different polymers were prepared by condensation polymerization of sebacic anhydride and adipic anhydride with ethylene glycol and poly(ethylene glycol). Their number average molecular weights were determined by end group analysis. Then, they were grafted on the prepared phthalocyaninatocopper(II) compounds with the general formula (NH2)4PcCu(II) having amino groups of 3,3',3'',3'''- or 4,4',4'',4'''- positions. All prepared polymers, compounds, and phthalocyaninatocopper(II)-grafted polymers were characterized by FTIR. The sizing measurements were carried out in 3,3',3'',3'''- (NH2)4PcCu(II) and 4,4',4'',4'''- (NH2)4PcCu(II) compounds with and without grafting polymers. The results showed that the grafting process led to decreasing in par
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreWe have investigated the photoemission and electronic properties at the PTCDI molecules interface on TiO2 and ZnO semiconductor by means of charge transition. A simple donor acceptor scenario used to calculate the rate for electron transfer of delocalized electronics in a non-degenerately TiO2 and ZnO electrodes to redox localized acceptors in an electrolytic. The dependent of electronic transition rate on the potential at contact of PTCDI with TiO2 and ZnO semiconductors, it has been discussion using TiO2 and ZnO electrodes in aqueous solutions. The charge transfer rate is determining by the overlapping electronic coupling to the TiO2 and ZnO electrodes, the transition energy, potential and polarity media within the theoretical scenario of
... Show MoreKinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.