Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThe dangerous and potentially blinding condition known as Acanthamoeba keratitis is caused by free-living amoebae of the genus Acanthamoeba. The prevalence of AIDS patients and contact lens wearers has increased in recent years, making cannaeba infections more significant. It's interesting to note that, depending on the parasite, host, and environmental conditions, the pathways linked to Acanthamoeba pathogenesis are frequently extremely complex. Notwithstanding our progress in antibiotic therapy and supportive care, the prevalence of Acanthamoeba keratitis has not decreased
Over the years, the issue of inclusion of students with special educational needs (SEN) in mainstream schools is controversial worldwide. Evidence from research argues that without a positive teachers’ attitude towards the inclusion of students with SEN in mainstream schools, the successful implementation of inclusion is most likely doubtable. The aim of this paper is to understand teachers’ attitudes towards the inclusion of students with SEN in mainstream schools from different perspectives and from different contexts. The conclusion drawn in this review can be that teachers’ attitude is the most important key towards the appropriate inclusion implementation in mainstream schools. The disparity of teachers’ attitudes towards th
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show MoreThe study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreHealth and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreSuffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev
... Show MoreAssimilation is defined ,by many phoneticians like Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of neighboring sounds.This study investigates the phoneme assimilation as a phonological process in English and Arabic and it is concerned specifically with the differences and similarities in both languages. Actually ,this study reflects the different terms which are used in Arabic to refer to this phenomenon and in this way it shows whether the term 'assimilation ' can have the same meaning of 'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from&nb
... Show MoreCompetitive advantage is a substantial strategic objective for organizations. It requires high levels in the quality of products and services provided to customers, continuous improvement of costing , care for creativity and innovative employees, and speed unique to the marketing and financial engineering, and business re-engineering processes. The situation in this area, requires actors to attract and develop human resources, including help in proper implementation of the strategic tasks that targeted by those institutions. According to the opinions and viewpoints of management scholars, the competitive advantage resource is the most important issue for organizations in the third millennium, which can be a
... Show More