The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
تواجه الوحدات الاقتصادية في العراق منافسة قوية بسبب مشكلات خاصة بإرتفاع الاسعار وارتفاع تكاليف الانتاج وضعف الاهتمام بدراسة السوق وغيرها من المشاكل ، فضلاً عن استخدام نظام التكاليف التقليدي الذي لا يوفر معلومات ملائمة لقرارات التسعير الامر الذي يتطلب دراسة وتحليل تلك المشكلات ومعالجتها بالاعتماد على تقنيات حديثة بما يمكنها من المنافسة ولهذا جاء هذا البحث والذي يعتبر من المداخل الحديثة لتخفيض التكاليف وم
... Show MoreThe aim of this research is to study the effect of using computer
techniques to increase students information at the experimenting the speed
control of dc motor by the magnetic field.
Simulation of the experiment has been used by implementing
“Electronics Workbench” software.
The random sample, included (30) second year electrical department
students, divided into two groups , experimental and control with pre-test and
post-test .
The results showed great advantages for the experimental group
through the use of computer program in the laboratory. The calculated (t) was
(10.6) which was significant and showed statistical differences between the
experimental and control group.
According to the result
Sought researcher to try to detect the type and size of the problems detected in or discovered or exposed or trying to find solutions to them as teachers and lecturers who are studying the educational, psychological and social articles in college studying these materials, whether the jurisdiction or extra materials, and clarified language definitions and terminology for search terms, indicating the importance of research into the problem of these either for teachers or for their students, and prepared a questionnaire organization questions open to get a clear responses and the Organization of the kind of problems faced by the lecturers and their students who are dealing with the educational, ps
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe purpose of this research is to investigate the events and events that took place after the death of Imam Musa al-Kadhim (peace be upon him) and the role of Ahmad ibn Musa (peace be upon him) in the succession of Imam al-Rida (peace be upon him). Will the writer attempt to answer the question about the role
Prayer It is the second pillar of Islam, which is what Allaah erases sins, the Prophet, peace be upon him say: "Do you see if the river at the door of you wash it every day five, what it says: it keeps dirt," they said, does not keep the dirt something, He said: «That is like the five daily prayers, Allaah erases sins", Bukhari (1/112), and the places and times supervised thanks to worship them, was to pray at the three mosques (the Grand Mosque and the Prophet's Mosque and the Al-Aqsa Mosque) private virtue from the rest of the mosques and this virtue include the obligatory prayers and Voluntary Prayers.
A new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio
... Show MorePrayer It is the second pillar of Islam, which is what Allaah erases sins, the Prophet, peace be upon him say: "Do you see if the river at the door of you wash it every day five, what it says: it keeps dirt," they said, does not keep the dirt something, He said: «That is like the five daily prayers, Allaah erases sins", Bukhari (1/112), and the places and times supervised thanks to worship them, was to pray at the three mosques (the Grand Mosque and the Prophet's Mosque and the Al-Aqsa Mosque) private virtue from the rest of the mosques and this virtue include the obligatory prayers and Voluntary Prayers
White and black chia seeds were used in some food products, such us gluten –free biscuits processing by using rice flour and chia seeds (white and black) with these amonths 112.5, 74.25, 56.25, 27.5 g with 27.5g of quinoa seeds for treatments 1, 2, 3 and 4 respectively, and comparison sensitively with the control treatment which has no additions including the appearance and homogenization of the product, surface cracks, softness, taste and flavor, core color and the specific volume, some microbiological tests were performed for biscuit product after storage for 4 months at 30 and 50°C including bacterial total count and fungal and yeast count, results showed that there weren’t any observation of bacteria or yeast or fungal growth at
... Show MoreL-arabinose isomerase from Escherichia coli O157:H7 Was immobilized with activated Bentonite from local markets of Baghdad, Iraq by 10% 3-APTES and treated with 10% aqueous glutaraldehyde, the results refer that the yield of immobilization was 89%, and pH profile of free and immobilized L-arabinose isomerase was 7 and 7.5 and it is stable at 6-8 for 60 min respectively, while, the optimum temperature was 30 and 35°C and it was stable at 35 and 40°C for 60 min but it loses more than 60 and 30% from its original activity at 50°C for free and immobilized L-arabinose isomerase respectively. Immobilized enzyme retained its full activity for 32 day, but it retained 73.58% of its original activity after storage for 60 d
... Show More