In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data, that come from sensors connected to the Raspberry Pi, before sending them through the network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than the value reported for one system in the related studies.
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Background: Plasma-activated water (PAW) is considered one of the emerging strategies that has been highlighted recently in the food industry for microbial decontamination and mycotoxin detoxification, due to its unique provisional characteristics. Aim: The effectiveness of PAW for aflatoxin B1 (AFB1), ochratoxin A (OTA), and fumonisin B1 (FB1) detoxification in naturally contaminated poultry feeds with its impacts on the feed quality were inspected. Methods: PAW-30 and PAW-60 were utilized for feed treatment for six time durations (5, 10, 15, 20, 40 and 60 min) each. The alterations in the physicochemical properties of PAW after different time durations of plasma inducement and treatment with and without feed samples were monit
... Show Moreunacceptable social behaviors, particularly withdrawal behavior that appears in children with autism represent a major problem hindering the process of communication with those around them and therefore the process of mergence with them be difficult.
The withdrawal causes a real affect deficit for children with autism limits the possibility of development of their intellectual and mental growth due to their solitude and the weakness of their focus in the acquisition of pedagogical skills and lack the necessary social skills to maintain the relations of friendship and enjoyment of them.
withdrawal children fail to participate
... Show MoreIn this work magnetite/geopolymer composite (MGP) were synthesized using a chemical co-precipitation technique. The synthesized materials were characterized using several techniques such as: “X-ray diffraction (XRD), Fourier-transform infrared spectroscopy (FTIR), vibrating sample-magnetometer (VSM), field-emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectroscopy (EDS), Brunauer–Emmett–Teller (BET) and Barrentt-Joyner-Halenda (BJH)” to determine the structure and morphology of the obtained material. The analysis indicated that metal oxide predominantly appeared at the shape of the spinel structure of magnetite, and that the presence of nano-magnetite had a substantial impact on the surface area and pore st
... Show MoreVarious pathological specimens (180) were collected from patients suffering
from pseudomonas aeruginosa infections from different hospitals in Baghdad from January
to May 2011; these specimens include (Blood samples,sputum,urine and wound swabs) were
tested for pseudomonas aeruginosa producing 2-Aminoacetophenone.Wounds swabs
specially taken from burns and post surgical infections producing a higher concentration of 2-Acetophenone material than from other samples were tested for this material and most of
these were isolated bases on their distinctive grape- like odor of 2-Aminoacetophenone
production usually linked with patients whose immune system compromised by disease or
trauma, its gains access to these pat
The potential application of granules of brick waste (GBW) as a low-cost sorbent for removal of Ni+2ions from aqueous solutions has been studied. The properties of GBW were determined through several tests such as X-Ray diffraction (XRD), Energy dispersive X-ray (EDX), Scanning electron microscopy (SEM), and BET surface area. In batch tests, the influence of several operating parameters including contact time, initial concentration, agitation speed, and the dose of GBW was investigated. The best values of these parameters that provided maximum removal efficiency of nickel (39.4%) were 1.5 hr, 50 mg/L, 250 rpm, and 1.8 g/100mL, respectively. The adsorption data obtained by batch experiments subjected to the Three i
... Show MoreBecause of their Physico‐chemical characteristics and its composition, the development of new specific analytical methodologies to determine some highly polar pesticides are required. The reported methods demand long analysis time, expensive instruments and prior extraction of pesticide for detection. The current work presents a new flow injection analysis method combined with indirect photometric detection for the determination of Fosetyl‐Aluminum (Fosetyl‐Al) in commercial formulations, with rapid and highly accurate determination involving only construction of manifold system combined with photometric detector without need some of the pre‐treatments to the sample before the analysis such a