The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
يمثل الارهاب في وقتنا الراهن اصعب التحديات التي تواجهها المجتمعات المختلفة ، فخطر توسع الظاهرة الارهابية اليوم لايشمل فقط دولاً او مجتمعات محددة او معلومة بل ان هذا الخطر يتسع ليشمل مجتماعات ودول كانت في مأمن حتى أوقات قريبة من الاخطار الارهابية ،إذ اصبحت مدن أوربية كثيرة تتعرض بشكل متكرر ومباشر الى الاخطار الارهابية من دون أن تؤتي التدابير الامنية والاستخبارتية الوطنية لهذه الدول
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreResearch in Iraq has expanded in the field of material technology involving the properties of the lightweight concrete using natural aggregate. The use of the porcelinate aggregate in the production of structural light concrete has a wide objective
and requires a lot of research to become suitable for practical application. In this work metakaolin was used to improve compressive strength of lightweight porcelinate concrete which usually have a low compressive strength about 17 MPa . The effect of metakaolin on compressive, splitting tensile, flexure strengths and modulus of elasticity of lightweight porcelinate concrete have been investigated. Many experiments were carried out by replacing cement with different percentages of
met
The purpose of this interview study was to explore teachers’ perceptions of Response to Intervention (RtI) implementation in their school. Particularly, the study explored teachers’ knowledge of RtI, teachers’ perceptions of RtI their intervention/instruction in school, and teachers’ suggestions of RtI implementation in their school. The study design was a qualitative interview in nature and data were collected from face-to-face interviews with four teachers in one school. The findings revealed that RtI means to identify students’ problems; the positive teachers’ perceptions of their implementation included: (a) students who demonstrate progress through RtI are those who receive private education services, (b) progress monito
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Objective: the aim of this study is to determine the level of students' knowledge about the environmental health.
Methodology: The cross-sectional study was conducted at the College of Health and Medical Technology in Baghdad
city during the period from 1st march till 1st of July 2012. Data was collected by self-recording of a previously designed
questionnaire to obtain socio-demographic information such as (age, gender, department, year of grade).
Results: The highest rate of students were in the 2nd year followed by the 3rd year, highest rate of students had low
level of knowledge followed by intermediate level of knowledge, while lowest rate of students on had high level of
knowledge .Females had higher level of know
In this research work an attempt has been made to investigate about the Robustness of the Bayesian Information criterion to estimate the order of the autoregressive process when the error of this model, Submits to a specific distributions and different cases of the time series on various size of samples by using the simulation, This criterion has been studied by depending on ten distributions, they are (Normal, log-Normal, continues uniform, Gamma , Exponential, Gamble, Cauchy, Poisson, Binomial, Discrete uniform) distributions, and then it has been reached to many collection and recommendations related to this object , when the series residual variable is subject to each ( Poisson , Binomial , Exponential , Dis
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
Background: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis.
Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications.
Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis.
... Show MoreBackground: Infertility is a relatively common condition. It can be attributed to factors in a female partner, a male partner, or in both partners. However, certain socio-demographic and life style factors have been linked to female infertility.
Objective: To determine the association between female infertility and selected risk factors.
|
Patients and Methods: This is a case
... Show More