The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
Abstract- Plasma parameters in a planar dc-sputtering discharge in argon were measured by cylindrical electrostatic probe (Langmuir probe).Electron density, electron temperature, floating potential, and space potential were monitored as a function of working discharge pressure. Electrostatic probe and supporting circuit were described and used to plot the current – voltage characteristics. Plasma properties were inferred from the current-voltage characteristics of a single probe positioned at the inter-cathode space. Typical values are in the range of (10-16 -10-17) m-3 and (2.93 – 5.3) eV for the electron density and the electron temperature respectively.
This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreDespite not being digested, trace elements and/or heavy metals are important for the activity of enzymes, physiological processes, and homeostasis. If certain trace elements are present in excess, they can have harmful effects and pose major health hazards. Objective: The aims to examine the connection between serum zinc, copper levels, and the Cu/Zn ratio, and several anthropometric parameters, including an index of body mass and the waist-hip ratio. In our study, we used atomic absorption spectrometry (AAS) to measure serum levels of copper (Cu) and zinc (Zn) in 60 individuals, 30 patients with kidney cancer and 30 healthy controls. We assessed serum uric acid, creatinine, and urea using the semi-auto analyzer BA-88A (Korea). The results
... Show MoreBackground: Generally, genetic disorders are a leading cause of spontaneous abortion, neonatal death, increased morbidity and mortality in children and adults as well. They a significant health care and psychosocial burden for the patient, the family, the healthcare system and the community as a whole. Chromosomal abnormalities occur much more frequently than is generally appreciated. It is estimated that approximately 1 of 200 newborn infants had some form of chromosomal abnormality. The figure is much higher in fetuses that do not survive to term. It is estimated that in 50% of first trimester abortions, the fetus has a chromosomal abnormality. Aim of the study: This study aims to shed some light on the results of chromosomal studies per
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreMethotrexate (MTX) is one of the most effective medications to treat rheumatoid arthritis (RA).Aserum of 60 Iraqi male patients suffering from RA as (G1) was newly diagnosis and the same patient in G1 after taking MTX as G2 and 40 Iraqi male healthy control as G3. Nesfatin-1 (Nf-1) is belong to the adipokine family withpleiotropic effect. Nf-1 has been found in different tissues, including stomach, pancreas, bone cells, cartilage and heart. Retinol binding protein (RBP4) was known as transpoter of retinol from its storage sites in the liver to the extrahepatic tissues. Moreover, RBP4 acts as adipokine and contributes in the pathophsyology of prototypic inflammatory disease, rheumatoid arthritis (RA). The results showed a significant increas
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More