The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
The summary:
This research paper presents a standard economic study. This study aims to build an economic standard form of the investment effect in Human Capital on Economic Growth in Algeria. The study showed that there is an inverse relationship between the investment and human capital. This is expressed by expending on education and economic growth. This contradicts with the economic theory. Such matter could be explained by that expending on education does not contribute in the economic growth. This refers to that the education sector result does not employee or save jobs. Thus, it does not contribute in growth; in addition, the Algerian economy depends on petrol in the first class. This means the ab
... Show MoreThe purpose of this study is to examine the effect of human resource diversity management practices on achieving entrepreneurship in Jordanian public universities. To achieve the aims of the study, a well-designed questionnaire was used for collecting data. The population of the study was (7433) faculty members (including different ranks such as professors, associate professors, assistant professors and lecturers) in Jordanian public universities. The study sample was selected through the use of a random sample, the questionnaire is distributed to a sample (of 400 with the percentage of 5%) selected by using a random sampling (350) copies of the questionnaire were collected, reaching about (87.5%) out of the sum total of the dist
... Show MoreThe catalytic cracking of three feeds of extract lubricating oil, that produced as a by-product from the process of furfural extraction of lubricating oil base stock in AL-Dura refinery at different operating condition, were carried out at a fixed bed laboratory reactor. The initial boiling point for these feeds was 140 ºC for sample (1), 86 ºC for sample (2) and 80 ºC for sample (3). The catalytic cracking processes were carried out at temperature range 325-400 ºC and initially at atmospheric pressure after 30 minutes over 9.88 % HY-zeolite catalyst load. The comparison between the conversion at different operating conditions of catalytic cracking processes indicates that a high yield was obtained at 375°C, according to gasoline pr
... Show MoreThis work deals with thermal cracking of heavy vacuum gas oil which produced from the top of vacuum distillation unit at Al- DURA refinery, by continuous process. An experimental laboratory plant scale was constructed in laboratories of chemical engineering department, Al-Nahrain University and Baghdad University. The thermal cracking process was carried out at temperature ranges between 460-560oC and atmospheric pressure with liquid hourly space velocity (LHSV) equal to 15hr-1.The liquid product from thermal cracking unit was distilled by atmospheric distillation device according to ASTM D-86 in order to achieve two fractions, below 220oC as a gasoline fraction and above 220oC as light cycle o
... Show MoreAssimilation is defined ,by many phoneticians like Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of neighboring sounds.This study investigates the phoneme assimilation as a phonological process in English and Arabic and it is concerned specifically with the differences and similarities in both languages. Actually ,this study reflects the different terms which are used in Arabic to refer to this phenomenon and in this way it shows whether the term 'assimilation ' can have the same meaning of 'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from&nb
... Show MoreThe search aims to find out the most important requirements for the success of marshes investment and maximize the expected returns of investment was marked by a problem find aquestion for availability requirements necessary for the success of marshes investment has a research community owners decision in the province Maysan the most important conclusions to the search is that the investment great importance in support of the economy and raising the cultural and social level, there is no investment successful but only with configure the investment environment appropriate economic, social, cultural, political, and security ways. the most important recommendations are working on the provision of the investment environment appropria
... Show MoreThe study aimes to analyze the discourse of Arab tweeters regarding the normalization of Arab-Israeli relations on the social media site (Twitter).
Study Methodology: The study relay on the survey method, using the comprehensive survey method, and this research is one of the descriptive types that aim to describe the phenomenon in a qualitative way, and discuss it through the method of in-depth analysis, in addition to using the tools of (discourse analysis).
Study sample: A sample of (8686) tweets for (7425) tweeters, which was posted on Twitter during the period from 15/9 to 30/9/2020, on the issue of normalizing Arab-Israeli relations.
Study tools: The data study was collected using the data mining tool from social networks (
This research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu
... Show MoreThe Turks used the Ottoman Turkish language from the thirteenth century to the twentieth century. During this period and under the influence of Islamic civilization, a large number of words and structures were used from the Arabic and Persian languages, Therefore, many Arabic grammatical structures were used in the Ottoman Turkish language, such as the definite article simply because it was widely used.
The paper is concerned with the use of the Arabic definite article in the Ottoman Turkish language, and the aim of this contrastive study is to find out the similarities and differences between the two languages in terms of meaning and structure. Since linguistic studies depend on the practical side or applied approach, two
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More