LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more efficiently and productively. The results of the cipher/decipher analysis, 15 NIST test, comparison between proposal FLED and original LED based on the results of correlation coefficient (CC)and Cosine Similarity (CS), execution time, and throughputs showed that the proposed FLED has faster cipher and more productive than the original LED; it is also more secure than the original LED.
The research included five sections containing the first section on the introduction o research and its importance and was addressed to the importance of the game of gymnastic and skilled parallel bars effectiveness and the importance of biochemical variables, either the research problem that there is a difference in learning this skill and difficulty in learning may be one of the most important reasons are falling and injury Has a negative impact on the performance and lack of sense of movement of is one of the obstacles in the completion of the skill and the goal of research to design a device that helps in the development of biochemical changes to skill of rear vault dismount with one-half twist on parallel bars in gymnastics . And the n
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
تتمثل مشكلة الدراسة في الصعوبات التي يواجهها طلاب اللغة الإنجليزية كلغة أجنبية في تعلم وإتقان المتلازمات اللفظية. تهدف هذا الدراسة تهدف إلى تحديد أثر استخدام تقنية المسرد الاملائي على معرفة المتلازمات اللفظية لدى الطلاب. ولتحقيق أهداف هذا البحث والتحقق من فرضياته تم اختيار عينة عشوائية مكونة من (60) طالبة من كلية اللغة الإنجليزية للسنة الثانية باستخدام كتاب الفهم القرائي المقرر للمستوى الثاني في قسم الل
... Show MoreIncremental Sheet Metal Forming (ISMF) is a modern sheet metal forming technology which offers the possibility of manufacturing 3D complex parts of thin sheet metals using the CNC milling machine. The surface quality is a very important aspect in any manufacturing process. Therefore, this study focuses on the resultant residual stresses by forming parameters, namely; (tool shape, step over, feed rate, and slope angle) using Taguchi method for the products formed by single point incremental forming process (SPIF). For evaluating the surface quality, practical experiments to produce pyramid like shape have been implemented on aluminum sheets (AA1050) for thickness (0.9) mm. Three types of tool shape used in this work, the spherical tool ga
... Show MoreBackground: Intense pulsed light (IPL) devices produce polychromatic incoherent high-intensity pulsed light with a specified wavelength spectrum, fluence, and pulse duration through the use of flashlamps and bandpass filters. Similar to lasers, IPL devices operate on the selective photothermolysis principle, with melanin acting as the chromophore. Despite this similarity, they are constructed differently and produce different amounts of light Aim of the study: To investigate the efficacy of IPL home-use device in hair reduction technique for women with unwanted facial hair. Subjects and methods: The study was conducted in Baghdad on forty-five female subjects with Fitzpatrick skin phototype (II to IV) and black, brown hair in a period of ei
... Show MoreThe current study deals with one of the ancient and modern techniques of ceramic art, which has evolved dramatically. This technique is interested in the muddy Body and its coloring, rather than interesting in the coloring of the layer on the surface of the glass port on the ceramic object. It is classified as ceramic techniques of the single heartburn, where use many coloring oxides. As well as, the use of (Pigment), which is often made of metal compounds, or metal oxides such as iron and manganese, copper and cobalt and more others.
The first chapter includes the problem, the importance, the goal, and the boundaries of the study. In addition, focuses on determining the terms such as (Sgrafitto). The second chapter consists of two to
Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More