Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
This research sheds light on those discrepancies in the use of ornaments, adornment and perfumes, as well as the art of cosmetics, in two important civilizations, namely, the Mesopotamian civilization as the earlier civilization, and the civilization of Yemen, which represents the first Arab civilization. Through the foregoing, our research includes two topics, the first topic included the history of the use of decorations, ornaments and perfumes in the civilization of Mesopotamia, while the second topic included the study of ornaments, adornment and cosmetic art in the ancient civilization of Yemen. And then the research came out with a number of conclusions that the researcher considers very important to highlight the differences and f
... Show MoreBackground: The value of lateral cephalometric radiographs to evaluate the pharyngeal airway is limited because it provided 2-dimensional (2D) images of complex 3-dimensional (3D) anatomic structures. Three dimensional analyses of the airway volumes are required to understand oral and pharyngeal adaptations in mouth breathing and nasal breathing subjects. The aim of this study was to measure the pharyngeal airway volume and the size of the face, then compare between pharyngeal airway volume in mouth breathing and nasal breathing subjects and find the gender difference in each group, also to study the relation between pharyngeal airway volume and the size of the face. Material and Methods: Fifty patients including 28 males and 22 females wit
... Show MoreBackground: This study aimed to determine the value of Beta angle for a sample of Iraqi adults with class I skeletal and dental relations and to verify the existence of sexual dimorphism and to find out the relation between this angle and other craniofacial measurements. Materials and Methods: Sixty dental students (23 males and 37 females) with an age ranged between 20-31 years old and having class I skeletal and dental relations were chosen for this study. Each student was subjected to clinical examination and digital true lateral cephalometric radiograph. The radiographs were analyzed using AutoCAD 2007 computer program to measure the angular and linear variables. Descriptive statistics were obtained for the measurements for both genders
... Show MoreBN Rashid, International Journal of Research in Social Sciences and Humanities, 2019 - Cited by 1
Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreThe electron correlation effect for inter-shell have been analysed in terms of Fermi hole and partial Fermi hole for Li-atom in the excited states (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). Fermi hole Δf(r12) and partial Fermi hole Δg(r12 ,r1) were determined in position space. Each plot of the physical properties in this work is normalized to unity. The calculation was performed using Mathcad 14 program.
Decision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More