The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
The study aims at identifying the reasons of weakness in the reading and writing of the primary schools' pupils at Baghdad governate in Iraq from the educational supervisors' point of view.
The community research contained the educational supervisors of Baghdad governate for the academic year 2011\2012, consisting of a total number of (344), of which (175) were males and (169) were females, where as the sample of the research consisted of (100) educational supervisors.
The researcher made up a questionnaire which is consisted of (78) items, distributed over different fields ( the curriculum and the book, methods of teaching, educational technology
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreOne of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre
... Show MoreBackground: The timing of eruption of permanent teeth is of considerable importance to the dental health planning for diagnostic, preventive and therapeutic measures for children and teenagers. The purposes of this study were to determine timing of maxillary and mandibular permanent teeth emergence (except third molars) and to evaluate the effect nutritional status by anthropometric measures on the eruption time of permanent teeth, investigations had been done according to jaw and gender variations. Materials and Methods: This study was conducted among four to fifteen years old children and teenagers from kindergarten and schools in Basrah city in the south region of Iraq. The total sample composed of 1807 children and teenagers that were
... Show MoreThe problem of research is that there are differences between learners in processing in formation in general and there is variation at the learners level perform scrolling skill of the passes up and down by the volley ball .Therefore the researchers decided to conduct astudy through which identify the relationship between information processing and the skill of scrolling from the top and bottom by the volleyball. The researchers used the descriptive approach by themethod of interconnectivity .Asampleconsist of21 students from first staye in collage of physical education and sports science for Girls(university of Baghdad) and attest has been applied(process information and scroll up and down) on the research sample after the required
... Show MoreBackground: Diabetes mellitus is a chronic metabolic disorder of the carbohydrate, protein and fat metabolism, resulting in increased blood glucose levels. Various complications of diabetes have been described with periodontitis being added as the sixth complication of diabetes mellitus. Matrix metalloproteinase-8 (MMP-8) has been identified as major tissue-destructive enzyme in periodontal disease. MMP-8 is released from neutrophils in a latent, inactive pro form and becomes activated during periodontal inflammation by independent and/or combined actions of host-derived inflammatory mediators .C-reactive protein is a systemic marker released during the acute phase of an inflammatory response. Subjects, materials and methods: Total samples
... Show MoreAAA AL-NUAIMY, MH ABDLL-ABASS, Iraqi Journal of Agricultural Sciences, 2007