Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThis paper proposes a novel meta-heuristic optimization algorithm called the fine-tuning meta-heuristic algorithm (FTMA) for solving global optimization problems. In this algorithm, the solutions are fine-tuned using the fundamental steps in meta-heuristic optimization, namely, exploration, exploitation, and randomization, in such a way that if one step improves the solution, then it is unnecessary to execute the remaining steps. The performance of the proposed FTMA has been compared with that of five other optimization algorithms over ten benchmark test functions. Nine of them are well-known and already exist in the literature, while the tenth one is proposed by the authors and introduced in this article. One test trial was shown t
... Show MoreFor several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
Obesity is disorder in a foremost nutritional health it’s developed with countries developing. Also is known as increasingin fat accumulation that lead toproblem in health, besidesmay coin one of the reasons lead toloss of life,the obesity not effect on adults just but effect onoffspringand juveniles. In some ofinhabitants the incidence of obesity is superior in female than in male; on the other hand, the variation degree of the between the genderdifferby country.Obesity is generally measured by body mass index and waist circumference, Obesity are classified according to body mass index into:Pre obesity sort 1 : (25 - 29.9) kg/m2, Obesity sort 2 : (30 - 34.9 kg/m2) and extreme obesity sort 3: (40 kg/m2) or greater. Obesity is described by
... Show MorePhthalimide formation of Phthalic anhydride with various amines using microwave or without a method with the difference of the catalyst used in a prepared Phthalimide, either structure general are C6H4CONRCO and used as starting materials in synthesis several compounds derivative phthalimides are an important compounds because spectrum wide biological activities including Antimicrobial activity, anticonvulsant activity, Anti-inflammatory activity,Analgesic activity, Anti- influenza activity and Thromboxane inhibitory activity
ole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show MoreWhen an electron moves from one atom or molecule to another, a charge-transfer complex is formed. The other objects must be able to accept these electrons, and one entity must have free electrons or a tendency to donate them. This resembles an internal oxidation-reduction reaction more. This research aims to shed light on charge transfer complexes formed by polyenes and carotenes, which act as electron-donating molecules due to their alternating double and single bonds. This allows them to create such complexes when interacting with organic molecules that lack electrons. These complexes exhibited distinctive optical and physicochemical properties, enabling them to be adapted for a wide range of applications. In addition, th
... Show MoreContemporary Media Stylistics permits readers to explore a variety of methodological applications to data analysis. Recent developments in technology and media communication provide linguists and stylisticians with authentic data for analysis based on real-life communication.
The study aims to review the literature on the fundamental changes in Managerial Accounting (MA) in light of accelerating Digital Transformations (DT) and increasing Sustainability Requirements (SR) from 2020 to August 2025, with the purpose of informing researchers and professionals about recent developments. The study relied on a qualitative analysis of the content of a group of studies indexed in the Scopus database. The study included a literature review of topics such as artificial intelligence tools and techniques, cloud computing, linear programming, sustainability reporting, and strategic managerial accounting practices. The study results revealed that accelerated DT improves the efficiency of managerial accounting practices
... Show More