Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
An essential tool for studying the web is its ability to show how energy moves through an ecosystem. Understanding and elucidating the relationship between species variety and their placement within the inclusive trophic dynamics is also beneficial. A food web ecological model with prey and two rival predators under fear and wind flow conditions is developed in this article. The boundedness and positivity of the system’s solution are established mathematically. The stability and existence constraints of the system’s equilibria are examined. The proposed system’s persistence limitations are established. Additionally, the bifurcation analysis of every potential equilibrium is examined using the Sotomayor theorem. To describe the
... Show MoreUsing a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show MoreThe project has been described the design and construction of a reliable optical testing platform used for evaluate the reflectivity of metal surfaces treated with special paintings required for laser beam attenuation. The platform comprises an Nd-YAG laser system which has been designed and fabricated with specifications to be compatible with their corresponding in laser range finder transmitters used for various applications. The reflectivity of various attenuating paintings, at different detection angles, has been observed. Moreover, the variation of the reflected energy with painting type and metal type to be painted has been studied experimentally. Results illustrated the existence of a definite angle, at which the reflectivity was max
... Show MorePeer-Reviewed Journal
In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreThe synthesis of new benzodiazepine, imidazole, isatin, maleimide, pyrimidine and 1,2,4-triazole derived from 2-amino-4-hydroxy-1,3,5-triazine, via its cyclocondensation reaction with different organic reagents, is described. FT-IR, 1H-NMR and as well as 13C-NMR spectra disclosed the structures of the precursors and heterocyclic derivatives formed.
Research in consumer science has proven that grocery shopping is a complex and distressing process. Further, the task of generating the grocery lists for the grocery shopping is always undervalued as the effort and time took to create and manage the grocery lists are unseen and unrecognized. Even though grocery lists represent consumers’ purchase intention, research pertaining the grocery lists does not get much attention from researchers; therefore, limited studies about the topic are found in the literature. Hence, this study aims at bridging the gap by designing and developing a mobile app (application) for creating and managing grocery lists using modern smartphones. Smartphones are pervasive and become a necessity for everyone tod
... Show More