Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
I've been in this research preparation and diagnostic complexes mixed Kandat of Alcavaúan Alpiculan ion Althaaossianat with some metal ions has been reactive in ethanol solvent and distilled water by (1:1) and water complexes and lotions to the accounts of the metal in the complex
With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im
... Show MoreThe research aimed at identifying the level of Acute stress disorder and orientation towards supplication among the wives of the martyrs and knowledge of the two levels according to the age groups, academic achievement and profession. Sample of (72) wife of a martyr, and the results of the research indicated that the wives of the martyrs have symptoms of distress disorder and have adherence to the supplication to alleviate that disorder, as well as the results indicated that there are statistical differences in distress disturbance according to the variable of age groups, the profession variable and the variable of enrollment The academic year. As for the measure of the trend towards supplication, there are no statistical dif
... Show MoreThe central bank is the financial director of the economic system of all countries of the world, which is considered the main official of the monetary and monetary policy in it and seeks to control the offer of money and its value in the issuance of currencies and the setting of interest rates, and this role is essential for both money and credit, The main artery of modern economic systems. If money and credit rise very quickly, commercial companies may not be able to meet the requirements of increased production.
Thus, central banks perform similar functions throughout the world today with the aim of achieving the public good, but the exercise of these functions varies from one economic environment to an
... Show MoreA solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
The objective of this study was to isolate and identify the asparaginase-producing bacteria, then purify and characterize the enzyme in order to investigate their properties in the future. Fifteen local bacterial isolates were isolated from various sites in the city of Baghdad, identified by conventional morphological and biochemical procedures, and confirmed using vitek 2 methods, and submitted to primary screening processes for asparaginase production. For secondary screening, eight isolates with the greatest yellow zone ability on a specific solid medium were chosen. Bacillus sp. was reported to have the highest enzyme production (7.5 U/mg proteins). After 24 hours of incubation, submerged fermentation yielded optimal conditi
... Show MoreThe present research studies numbers and its uses in the Islamic ornament. The study consists of four chapters; the first is dedicated to the problem of the research, the value of the study, and the aim of the study, and its limit. The problem of the study deals with the uses of numbers in Islamic ornament and how these numbers were used for aesthetic purposes. What are the analytical bases that enable us to read the geometrical compositions ornament numerically? The value of the research is the study forms an analytical and visual study of the numbers in the Islamic ornamentation. Additionally, this study is an aesthetic assessment to the philosophy of the number and its uses in Islamic architecture. The study is limited to the ornament
... Show MoreThe amino thiadiazole [I] on treatment with aromatic aldehydes yielded Schiff bases [IIa-c] , which cyclized to thiazolidinone [IIIa-c] derivatives by reaction with thioglycolic acid .Reaction of carbon disulfide and methyl iodide with [I] gavedithiomethyl[IV] which on treatment with o-phenylenediamine gave the condensed N-Imidazolythiadiazolylamine [V] , However , reaction of [I] with phenylisocyanate and phenylisothiocyanate afforded the carbamideand carbothiamide derivatives[VI.VII]a-c. The structure of these compounds was characterized from their melting point , FTIR spectroscopy and elementalanalysis
The present research aims to identify the social responsibility of the kindergarten teachers of the civil and governmental schools (comparative study)? For the purpose of achieving the objectives of the research, the following formulas were formulated:
- Are there statistically significant differences at the level of (0.05) among the kindergarten teachers in the social responsibility scale?
The current research was limited to kindergarten teachers (governmental and non-governmental) in the Directorate General of Education Baghdad Rusafa / Second.
The main research sample consisted of (100) teachers, (50) teachers from government kindergartens and (50) female kindergarten teache
... Show MoreBased on a finite element analysis using Matlab coding, eigenvalue problem has been formulated and solved for the buckling analysis of non-prismatic columns. Different numbers of elements per column length have been used to assess the rate of convergence for the model. Then the proposed model has been used to determine the critical buckling load factor () for the idealized supported columns based on the comparison of their buckling loads with the corresponding hinge supported columns . Finally in this study the critical buckling factor () under end force (P) increases by about 3.71% with the tapered ratio increment of 10% for different end supported columns and the relationship between normalized critical load and slenderness ratio was g
... Show More