The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
This study aimed to manufacture an innovative device that enables the player to walk after the operation and improves the functional efficiency through the improvement in the range of motion as well as the improvement in the size of the muscles working on the knee joint. The research, the study population consisted of players with severing the anterior cruciate ligament of the advanced soccer players, and the number of the research sample was (5) injured for the control sample and (5) for the experimental sample in Abu Ghraib Hospital and some rehabilitation centers for a period of six months, and the pre-tests were conducted after two weeks of The cruciate ligament surgery was performed, and the innovative device was used for the e
... Show MoreThe research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t
... Show Moreمستخلص البحث أهمية البحث عن طريق إعداد برنامج تدريبي يعتمد هذه الطريقة التدريبية في تطوير التحمل الخاص عن طريق العمل على بناء مستوى جيد من التحمل الخاص لدى اللاعبين الشباب في مرحلة الإعداد الخاص, تحقيق نتائج جيدة على مستوى أداء الواجبات المهارية والخططية المطلوبة منه في أثناء زمن المباراة, حيث ارتأت الباحثة من خلال إعداد برنامج تدريبي إلى رفع مستوى (التحمل الخاص) لدى لاعبي كرة القدم وبالتالي يمكنها أن تساع
... Show Moreيهدف البحث الحالي التعرف على اسباب السرقة لدى تلاميذ المرحلة الابتدائية كما يراها معلموهم ومعلماتهم ، وعن الاساليب المتبعة في معالجة ظاهرة السرقة من قبلهم ، ولقد شملت عينة البحث على ( 200 ) فرداً من معلمي ومعلمات تلاميذ المرحلة الابتدائية في مدينة المكلا للعام الدراسي ( 2004 ـ 2005 ) ، وقد استخدمت الباحثة استبياناً أعدته كأداة للوصول الى اهداف البحث بعد ان تم التأكد من صدقه وثباته ، استخدمت الباحثة معادلة ارتب
... Show MoreThat the government sector takes a big place in the countries and represents a significant role in the face of challenges and adaptation to the important and necessary changes that occur today, including the use of electronic. The electronic computer is a requirement of modern technology in various fields of science, including accounting, Because it derives its entity and content from the spirit of society and its mentality in all its branches, especially the subject of the research system of government accounting Because of its impact on the planning and financial implementation, especially in the preparation and implementation of the State budget, along with expenditure and revenue. Addressing tells us that the first of the sear
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More