Preferred Language
Articles
/
bsj-6218
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC.  Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 02 2023
Journal Name
Bandaoti Guangdian/semiconductor Optoelectronics
NMUSING AN INNOVATIVE DEVICE TO IMPROVE THE EFFICIENCY OF THE ANTERIOR QUADRICEPS MUSCLE OF THE INJURED KNEE JOINT AFTER SURGICAL INTERVENTION OF THE ANTERIOR CRUCIATE LIGAMENT IN ADVANCED SOCCER PLAYERS
...Show More Authors

This study aimed to manufacture an innovative device that enables the player to walk after the operation and improves the functional efficiency through the improvement in the range of motion as well as the improvement in the size of the muscles working on the knee joint. The research, the study population consisted of players with severing the anterior cruciate ligament of the advanced soccer players, and the number of the research sample was (5) injured for the control sample and (5) for the experimental sample in Abu Ghraib Hospital and some rehabilitation centers for a period of six months, and the pre-tests were conducted after two weeks of The cruciate ligament surgery was performed, and the innovative device was used for the e

... Show More
Preview PDF
Publication Date
Mon Jan 29 2024
Journal Name
Eximia
The cognitive and educational importance of the academic teacher for developing the applied skills of third-stage female students in the subject of teaching methods from their point of view
...Show More Authors

The research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 12 2025
Journal Name
Sciences Journal Of Physical Education
تاثير تمرينات اللعب بمساحات مختلفة في تطوير التحمل الخاص في دقة اداء بعض المهارات الاساسية للاعبي كرة القدم الشباب
...Show More Authors

مستخلص البحث أهمية البحث عن طريق إعداد برنامج تدريبي يعتمد هذه الطريقة التدريبية في تطوير التحمل الخاص عن طريق العمل على بناء مستوى جيد من التحمل الخاص لدى اللاعبين الشباب في مرحلة الإعداد الخاص, تحقيق نتائج جيدة على مستوى أداء الواجبات المهارية والخططية المطلوبة منه في أثناء زمن المباراة, حيث ارتأت الباحثة من خلال إعداد برنامج تدريبي إلى رفع مستوى (التحمل الخاص) لدى لاعبي كرة القدم وبالتالي يمكنها أن تساع

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2007
Journal Name
Journal Of Educational And Psychological Researches
اسباب السرقة لدى تلاميذ المرحلة الابتدائية من وجهة نظر المعلمين والمعلمات في المدارس الابتدائية في مدينة المكلا بمحافظة حضرموت
...Show More Authors

يهدف البحث الحالي التعرف على اسباب السرقة لدى تلاميذ المرحلة الابتدائية كما يراها معلموهم ومعلماتهم ، وعن الاساليب المتبعة في معالجة ظاهرة السرقة من قبلهم ، ولقد شملت عينة البحث على ( 200 ) فرداً من معلمي ومعلمات تلاميذ المرحلة الابتدائية في مدينة المكلا للعام الدراسي ( 2004 ـ 2005 ) ، وقد استخدمت الباحثة استبياناً أعدته كأداة للوصول الى اهداف البحث بعد ان تم التأكد من صدقه وثباته ، استخدمت الباحثة معادلة ارتب

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 03 2023
Journal Name
نسق
أثر الترجمة الموضوعية في الحفاظ على رسم ملامح الشخصية وتصوير بيئتها في رواية "حفنة من الضباب" للقاص سامي مخائيل
...Show More Authors

الملاخص

Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
العلاقة بين النظام المحاسبي الحكومي التقليدي في العراق والنظام الإلكتروني بين النظرية والتطبيق: (بحث تطبيقي في جامعة ديالى 2018)
...Show More Authors

  That the government sector takes a big place in the countries and represents a significant role in the face of challenges and adaptation to the important and necessary changes that occur today, including the use of electronic. The electronic computer is a requirement of modern technology in various fields of science, including accounting, Because it derives its entity and content from the spirit of society and its mentality in all its branches, especially the subject of the research system of government accounting Because of its impact on the planning and financial implementation, especially in the preparation and implementation of the State budget, along with expenditure and revenue. Addressing tells us that the first of the sear

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 40% <i>Loranthus europaeus</i> Ointment as an Alternative Medicine in the Treatment of Acute Cutaneous Leishmaniasis versus Topical 25% Podophyllin Solution
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon May 08 2017
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemical Sciences
Structure, Diagnosis, and in the Vitro Antimicrobial evaluation of 2-amino pyridine-derived Ligand Schiff base and its complexes with Cu (II), Hg (II), Ni (II), Mn (II) and Co (II
...Show More Authors

Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref