The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
This study discusses the Critical Discourse Analysis of 2012 American Presidential Election Debate’. The researcher adopts a model proposed by Van Dijk’s (2006 d). Six ideological categories have been selected within the overall strategies of the ideological square are used. The categories are of three levels of discourse structure : (the meaning, the argumentation, and the rhetoric) .They have shown effective criteria for detecting the most disguised systems of racism and manipulation.
Based on the analysis, it can be concluded that the elite discourses of candidates contribute to the reproduction of domination, Orientalism, and Islamophobia. This can be appl
... Show MoreThis study includes a detailed morphological description of Cosmina baghdadensis sp. nov.
from Iraq.
Many characters are used in identification especially chaetotaxy and male genetalia.
Locality, host plant, and data of collection were given.
This study aims to formulate azithromycin oleogel to locally treat skin infections such as acne vulgaris and skin wound infection. Providing a form of azithromycin that can be administered topically is highly desired to prevent unwanted systemic complications including diarrhea, nausea, and abdominal pain. Additionally, it will avoid first pass metabolism, improves patient acceptance, provides an alternative in nauseated patients, decreases the dose by direct contact with the pathological site, and provides a noninvasive and convenient mode of administration. Furthermore, for treating wound infections, the gel will act as a scaffold biomaterial for wound closure besides its antibacterial effect. Herein, we propose the use of grapeseed oil-b
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show More