LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more efficiently and productively. The results of the cipher/decipher analysis, 15 NIST test, comparison between proposal FLED and original LED based on the results of correlation coefficient (CC)and Cosine Similarity (CS), execution time, and throughputs showed that the proposed FLED has faster cipher and more productive than the original LED; it is also more secure than the original LED.
Background. The use of modern aids and technology has contributed greatly to football development, the goalkeeper is the most important position in the team, and the use of devices gave objective readings about the goalkeeper's ability in terms of skill and physical aspects. Objectives. The research aimed to prepare exercises using an electronic device to measure the knee bending angle because of its great importance in developing the skill of catching and dimensions of the high ball for football goalkeepers. Methods. The researchers used the experimental method, and the sample consisted of (4) male goalkeepers under 15 years of age, one of the research procedures was to determine the biomechanical variables affecting the development of the
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreAround 65 million individuals suffer from epilepsy worldwide, and when it is not properly treated, it is linked to higher rates of physical harm and mortality. Due to the requirement for long‐term therapy and the side effects of many medications, medication compliance is a significant issue. The purpose of this review was to summarize the findings of previous studies examining the quality of life (QOL), adherence, patient education, and medication knowledge, as well as the impact of a pharmacist‐led educational intervention. Additionally, to find out if these studies benefit epileptic patients, to find the appropriate method used to help them in all aspects of their lives, and to use these in future studies. A systematic and comprehensi
... Show MoreOver the last few decades, many instructors have been trying all kinds of teaching methods, but without benefit. Nevertheless, in the 1986, a new technique is appeared which called K-W-L technique, it is specified for reading comprehension passages because reading skill is not easy matter for students for specific purposes (ESP).therefore, the K-W-L technique is a good one for thinking and experiences. To fulfill the aims and verify the hypothesis which reads as follows" it is hypothesized that there are no significant differences between the achievements of students who are taught according to K-W-L technique and those who are taught according to the traditional method
... Show MoreFire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed
... Show MoreThe aim of this research is to develop qualitative workouts based on certain sensory perceptions for the development of offensive basketball abilities and to determine their impact on female pupils. Several findings, based on the au-thor's extensive expertise instructing basketball materials and our closeness to the sample, revealed deficits in some sensory perceptions “in the game of basketball”, which impair the accuracy of passing the ball to the best team-mate. It also affects the pace of dribbling and the difficulty of selecting the op-timal moment and distance to fire. Therefore, the researcher designs qualita-tive activities based on many sensory experiences, including distance, speed, force, and direction shift. In addition, the
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.