Preferred Language
Articles
/
bsj-6218
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC.  Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Nψβ and Nβψ - Closed sets in Neutrosophic Topological spaces
...Show More Authors

The aim of this paper is to introduce the concept of N  and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 04 2012
Journal Name
The Iraqi Journal Of Veterinary Medicine
Toxicopathological study of aqueous extract of beetle cocoon Larinus maculatus F. on some internal organs in male albino mice
...Show More Authors

The present study was carried out to investigate the effect of oral administration of hot aqueous extract of beetle cocoon Larinus maculatus Faldermann, in a two doses 50 and100mg/Kg/Bw for 25 and 45days respect- tively on some organs such as liver, lung, kidney, intestine, heart, spleen, and brain in male mice Mus musculus. The results indicated that there were toxicopathological changes in many tissues of experimental animals. Histo -pathological changes was dose and period dependent . It was found that the aqueous extract of beetle cocoon has undesirable effect at the administered doses, since the raw extract of this cocoon is currently being used in Folk medicine as treatment for cough, bronchitis in Iraq. This study revealed that the l

... Show More
Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
RATIONALIZATION OF CONSUMPTION AND ITS IMPACT ON ECONOMIC DEVELOPMENT (A PRELIMINARY STUDY): RATIONALIZATION OF CONSUMPTION AND ITS IMPACT ON ECONOMIC DEVELOPMENT (A PRELIMINARY STUDY)
...Show More Authors

The research deals with the concept of rationalization of consumption, which is legitimately legitimized, by indicating the permissibility of consumption and its limits in Islam, the legitimate aspects of spending and its controls, and the concept of development in the Islamic economy. The researcher followed the descriptive method by presenting the legal texts and jurisprudential opinions and linking them to contemporary economic problems.The research has reached several conclusions, the most important of which is that the goal of Islam in relation to consumption is to inform the Muslim of the amount of economic maturity, and the truth of alms is good in money and religion. It is necessary for achieving maturity that both means

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
مدلة العلوم القانونية
نطاق حماية المستهلك في القطاع المصرفي
...Show More Authors

نطاق حماية المستهلك في القطاع المصرفي

Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
The effects of Internet use on university’s students: “A Study on a Sample of Jordanian University’s students "
...Show More Authors

The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as  cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1.   What are the effects of Internet’s use on students?2. What is   the relationship between the effects and demographic variables such as  gender, age, family size an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Employing semantic coding to build meaning in action films: ابراهيم خلف جاسم
...Show More Authors

Action films employ many artistic and literary elements that contribute greatly to building the general meaning of the film and push the wheel of the film forward. The element of mystery and suspense is used as two basic elements in action films. The cinematic language in action films depends on global coding, which is not models as it might be. It is based on logic, rather as units that aspire to morphology and not their homogeneity as the physical sense, but as the logical harmony of interpretive authority and enlightenment and in action films as a field of communication and a field in its origin in which the signifier contrasts with the perceptions of the meaning and in it takes a certain number of units preventing each other and thro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Thermal Properties of Lead-Acid Battery Plastic Lightweight Concrete
...Show More Authors

This study investigates the possibility of using waste plastic as one of the components of expired lead-acid batteries to produce lightweight concrete. Different percentages of lead-acid battery plastic were used in the production of lightweight concrete. The replacements were (70, 80 and 100%) by volume of the fine and coarse aggregate. Results demonstrated that a reduction of approximately 23.6% to 35% in the wet density was observed when replacement of 70% to 100% of the natural aggregate by lead-acid battery plastic. Also, the compressive strength decreased slightly with the increase in plastic content at different curing ages of 7, 28, 60, 90, 120 days. The lowest value of compressive strength was (20.7 MPa) for (wa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of The College Of Education For Women
Identity in Sonia Sanchez's Poem "right on: white america" :A Stylistic Study
...Show More Authors

Language is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Indicative coding of the actor’s performance in the Iraqi theater show: راسل كاظم عوده
...Show More Authors

Summary Search Alachtgalat process semantic encoding carried out by the actor inside the theater to deliver the intellectual sense, and social, as well as the aesthetic to the recipient, the fact that the code is the function is operated relationship in accordance with the prior intent to deliver the implications of a particular intent, too, and the fact that encryption is the best way to transfer messages in system theater, where should the actor that has the ability to create images (sensory) or intellectual new in human consciousness on the basis of conversion of impressions collected from reality and re technically formed inside the theater, allowing the recipient to arrange these marks to obtain the meaning that lies in them. So he

... Show More
View Publication Preview PDF
Crossref