The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the
... Show MoreIn this research the a-As flims have been prepared by thermal evaporation with thickness 250 nm and rata of deposition (1.04nm/sec) as function to annealing temperature (373 and 373K), from XRD analysis we can see that the degree of crystalline increase with , and I-V characteristic for dark and illumination shows that forward bias current varieties approximately exponentially with voltage bias. Also we found that the quality factor and saturation current dependence on annealing temperatures.
The European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which
... Show MoreA revised checklist of the robber fly genera (Diptera, Asilidae) was given during this study in Iraq. The investigation showed (21) genera belonging to seven subfamilies, two genera new recorded to entomofauna of Iraq (Promachus Loew, 1848 and Genus: Dysmacus Loew, 1860). Eight genera showed in this investigation and eleven genera were recorded previously to Iraq.
This work has been accomplished through a dense field work on the Sawa Lake. The aim of this work is to highlight on characteristics that are consistent with outstanding universal values to be a new Iraqi site belongs to the World Natural Heritage. This study sorted many unique characteristics might ensure that Sawa Lake as a world natural heritage sites. This study shows that the lake had met four natural criteria of the outstanding universal values: (1) the seventh criterion which states to contain superlative natural phenomena or areas of exceptional natural beauty and aesthetic importance. (2) The eighth criterion which stated to be outstanding example representing major stages of earth's history, including the rec
... Show MorePurpose A diagnosis of tuberculosis (TB) of the head and neck has been a dilemma for clinicians, because the clinical and pathologic features tend to mimic different pathologies. Our study aimed to identify the demographic, clinical, and pathologic features of head and neck TB to help healthcare providers in the early detection of the disease. Materials and Methods We performed a retrospective analysis using the medical archives at the pathology laboratory. Twenty-one patients with a clinical and pathologic diagnosis of head and neck TB were identified from 2010 to 2019. Results The age distribution was broad, with 28.5% of the patients younger than 15 years old. Seven patients had oral TB, with the most common sites affected the labial ves
... Show MoreThe heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More