Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Partial substitution of Zn Effects on the Structural and Electrical Properties of High Temperature Hg<sub>0.95</sub>Ag<sub>0.05</sub>Ba<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>8+δ</sub> Superconductors
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Sep 20 2021
Journal Name
Key Engineering Materials
Fabrication of Ge&lt;sub&gt;30&lt;/sub&gt;Te &lt;sub&gt;70-x&lt;/sub&gt;Sb&lt;sub&gt;x&lt;/sub&gt; Glasses Alloys and Studying the Effect of Partial Substitution on D.C Electrical Energy Parameters
...Show More Authors

The non-linear components has been emphasized for its multiple applications in rewritable recording and data storage devices. Chalcogenide glasses materials are promising due to their high refractive index. In this paper, alloys for Ge30Te70-xSbxglasses semiconductor (where x =0.0, 5, 10, 15 and 20) will be fabricated by melt quenching method. The effect of partial substitution on DC electric power parameters, and its knowledge of electrical conduction mechanisms, were investigated to determine the effect of Antimony on the density of extended states, local states, and in Fermi energy states. The electrical measurements revealed the existence of three conduction mechanis

... Show More
View Publication
Scopus (36)
Crossref (30)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Trends of University Professors towards the Role of Social Networking Websites in Shaping Public Opinion about the Security Crises
...Show More Authors

Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The substitutions of Strontium by yttrium and their effects on Bi<sub>2</sub>Sr<sub>2</sub>-<sub>x</sub>Y<sub>x</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10</sub>+<sub>δ</sub> superconducting compound
...Show More Authors
Abstract<p>Superconducting compound Bi<sub>2</sub>Sr2-<sub>x</sub>Y<sub>x</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi<sub>2</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th</p> ... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Effect of Nickel Substitution On Structural and Electrical Properties of Hg<sub>0.5</sub>Pb<sub>0.5</sub>Ba<sub>2</sub>Ca<sub>2</sub>Cu<sub>3-y</sub>Ni<sub>y</sub>O<sub>8+δ</sub> Superconductor Composite
...Show More Authors
Abstract<p>six specimens of the Hg<sub>0.5</sub>Pb<sub>0.5</sub>Ba<sub>2</sub>Ca<sub>2</sub>Cu<sub>3-y</sub> <italic>Ni<sub>y</sub> </italic>O<sub>8+δ</sub> (y=0.2,0.4,0.6,0.8,1.0) superconducting compound were prepared by solid state reaction method, with sintering temperature equal to 1123K for 24 hours. The electrical resistivity was examined by the four probe technique, It was found that all the specimens have metallic behavior and increasing the critical temperature with increasing nickel concentration. The optimum critical temperature T<sub>c</sub> was found equal </p> ... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Speech Emotion Recognition Using MELBP Variants of Spectrogram Image
...Show More Authors

View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus