The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreThe focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.
The City of Ember is a very interesting novel that is although intended for young readers, have so many layers and messages that are misunderstood. In this research, both the novel and the film adaptation are studied with the intent to decode the warning messages that the novelist and the director tried to introduce to the audience. The research studies four vital messages; the first message is that history repeats itself for the novel has many allusions to the history of Jews and their painful holocaust and even goes back in history the days of Moses and the Exodus, the second message tackles the conspiracy theory that states nothing happens by accident and that everything is planned and connected hence comes the third message
... Show Moreهدف البحث الى التعرف على العلاقة والاثر بين متغيرات البحث والمتمثلة بأخلاقيات الاعمال بمثابة متغير مستقل بأبعاده ( فريق العمل ، المسؤولية ، السرية ، القواعد والاجراءات الوظيفية ) ومحاسبة المسؤولية بمثابة متغير تابع، ومتغير وسيط هو الثقافة ، تمثل مجتمع البحث بمجموعة من الشركات الصناعية العراقية وتم اخذ عينة قصدية من محاسبي تلك الشركات بلغ عددهم (60) محاسبا حيث تم توزيع الاستبانة عليهم كأداة للبحث وتم تحليلها ب
... Show Moreهدف البحث الى التعرف على الاتجاه التكاملي STEM في تعليم الرياضيات واثره في التفكير المنطقي لطالبات المرحلة المتوسطة ولتحقيق اهداف البحث تم استخدام منهج البحث الوصفي والتجريبي لدراسة الظاهرة, قامت الباحثة بأخذ رأي عدد من مدرسي المرحلة المتوسطة لادخال الاتجاه STEM في تعليم الرياضيات, واثره في التفكير المنطقي وكان عددهم (20) مدرسا فكانت النتائج هو اثر الاتجاه التكاملي بشكل مرتفع قي التفكير المنطقي, وتم استخدام عدد
... Show Moreهدف البحث الى بيان تأثير بناء المقدرات الجوهرية المتمثل ابعادها بـ (التعلم التنظيمي ، المرونة الاستراتيجية ، المقدرات التكنولوجية، رأس المال البشري) في ادارة الايرادات الضريبية المتمثلة ابعادها بـ (فاعلية الادارة الضريبية ، الكفاءة في العمل ، التشريعات الضريبية) وتم اعتماد الاستبانة كأداة رئيسة في جمع البيانات والمعلومات من العينة البالغ عددها (35) مبحوثاً ممن هم بموقع (مدير قسم ، وكيل مدير قسم، مسؤول شعبة) ف
... Show Moreهدف هذا البحث الى التعرف على أثر فاعلية تكنولوجيا التحول الرقمي في تحسين كفاءة الخدمة التأمينية في شركات التأمين العامة في العراق من خالل تكنولوجيا التحول الرقمي في العملية التأمينية "الترويج لمنتج التأمين,تقديم طلب التأمين,االكتتاب ,تسوية الخسائر" ولتحقيق هذا الهدف تم تصميم استمارة استقصاء وزعت في المجتمع المبحوث والتي تمثل متخذي القرار في الشركات المبحوثة قيد البحث وكان من اهم نتائج البحث وجود عالقة بين ا
... Show MoreAnalysis of the main financial statements (financial position, income, cash flow) using the analysis tools gives a clear picture of the results of the annual activity of the economic units, which contribute to the development of future plans and programs and identify weaknesses in the work of economic units including banks. Therefore, the indicators used in the analysis Would be feasible for the rest of the other sectors. such as Central Bank , Security exchange market , which will accordingly contribute in National product , determining market requirements , investor’s desires , knowing economic situation and providing liquidity in a timing manner.