The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
Background: The association of olanzapine with hyperglycemia, an elevated lipid profile, and high blood pressure was early recognized after its approval and has become of increased concern. Objective: To determine the association of olanzapine use with blood sugar levels, lipid profiles, and blood pressure in hospitalized Iraqi patients with schizophrenia. Methods: A cross-sectional study involving 50 hospitalized patients with schizophrenia who met the Diagnostic and Statistical Manual of Mental Disorders (DSM)-V diagnostic criteria and had taken olanzapine for at least two years was carried out between November 2022 and February 2023 at two facilities in Baghdad, Iraq (Ibn Rushd Psychiatric Teaching Hospital and Al Rashad Hospital
... Show MoreSemiconductor-based photocatalytic processes are widely applied as ecofriendly technology for degrading organic pollutants. Establishing photocatalytic heterojunctions with Z-type photocarriers transfer pathways is projected to be a superb strategy to enhance photocatalytic behavior. In this paper, novel and stable (0D/2D) heterojunctions of CoS-embedded boron-doped g-C3N4 (CoS/BCN) with a high rate of charges transfer/separation were assembled for degradation of malachite green dye (MG). The CoS/BCN photocatalyst achieves a photodegradation efficiency of 96.9 % within 1 h of LED illumination, which is 2.5 and 1.4-fold enhancement compared with bare g-C3N4 and BCN, respectively. Besides, the results of species-trapping trials exhibited that
... Show MoreBackground: Lung cancer is a common disease for patients over the age of 50 years, especially males due to smoking habits. This study aimed to compare the modulation complexity score (MCS) for the advanced treatment planning techniques which the intensity modulated radiation therapy (IMRT) and volumetric modulated arc therapy (VMAT). Materials and Methods: Thirty patients who had non-small lung cancerous tumors on their left side participated in this study. The range ages were 68 to 98 years, the heights were between 151 and 182cm and they having weights from 46 to 79 kg. For Each patient will create two plans dial using two different techniques, which will be Intensity Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show Moreالكتابة عن الأندلس بعد تسليم مدينة غرناطة يحمل في ثناياه ألم كبير، لأن الأندلسيين عاشوا تجربة إنسانية قاسية سببها الأساس غياب التسامح الديني والعدالة الاجتماعية، الأمر الذي دفعهم للثورة مطالبين بحقوقهم التي نصت عليها معاهدة تسليم المدينة. فقد عاش أولئك حياة صعبة ، فكانوا صورة للصراع بين حضارتين الإسلامية والغربية ، ويمكن تلمس ذلك الصراع من خلال دراسة ثوراتهم ضد السلطة الحاكمة التي يبدو من تتبع أح
... Show MoreThis study aims at identifying the problems facing the students teachers in the department of Science Computer in the College of Education for Women in Baghdad University during their application in the Schools and their attitudes Towards teaching before and after the application the sample Consists of the Fourth year Students Who did teach in Baghdad (75 Students) The data have been dealt with statistically by using chi – Square, the relative percentage Weight, Person's Correlation Coefficient and the t – test.
After analyzing the results, it has been Shown that the Following are the most important problems :-
1. limitedness of the period of application.
2. Insufficiency of the hours specified for the Computer.
3. Insuff
In recent decades, the world has faced some rapid technical developments, affected on many fields of life, which had the best chance in the information and communication technology, such that it created an entirely new situation, summed up the life and development of business enterprises. This is while these developments have changed a lot the reputation of management institutions and civil society organizations in return. In addition, they have linked the citizen and those institutions in their different specialties within a distinct electronic format called e-management in the contemporary literature.
This study attempted to highlight the importance of investment in building e-management by linking citiz
... Show Moreمن الضروري اجراء تحليل الحساسية للمشاريع الاستثمارية التي يتبناها القطاع العام أو الخاص وذلك لسببين ، الاول هو تضمين عامل المخاطرة واللاتاكد عند تقييم المشروع من الناحية الاقتصادية ، حيث لابد من يكون نسبة مخاطرة وعدم تاكد عند تقييم أي مشروع لمجابهة احداث المستقبل الغير متوقعة ، الثاني المنافسة الشديدة بين المنتجات المحلية والمستوردة ، حيث ان تحليل الحساسية يعطينا صورة عن مدى حساسية القيمة الحالية
... Show More