The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe ligand 4-amino-N-(5-methylisoxazole-3-yl)-benzene-sulfonamide(L1) (as a chelating ligand) was treated with Pd(II),Pt (IV) and Au(III) ions in alcoholic medium in order to prepare a series of new metal complexes. Mixed ligand complexes of this primary ligand were prepared in alcoholic medium in presence of the co-ligand 4,4'-dimethyl-2,2'-bipyridyl(L2) with Cu(II) ,Pd(II) and Au(III) ions. The complexes were characterized in solid state using flame atomic absorption, elemental analysis C.H.N.S, FT-IR, UV-Vis Spectroscopy, conductivity and magnetic susceptibility measurements. The nature of some complexes formed in ethanolic solution has been studied following the molar ratio method, also stability constant was studied and the complexes f
... Show MoreBackground: The incisive canal is an anatomical structure with an important location in the anterior maxilla, analyzing this canal and its relation to the bone anterior to the canal is necessary during dental implant. Aim of this study is evaluated effect of gender, age and tooth loss in area of maxillary central incisors teeth on the dimensions of incisive canal and buccal bone anterior to the canal using spiral computed tomography. Materials and Methods: Sample consists of prospective study for 156 subjects for both gender, they divided into two groups, 120 dentate group (60 male and 60 female) with age ranging from (20-70) and 36 edentate group (with missing maxillary central incisors) (18 male and 18 female) with age ranging from (50-70
... Show MoreBackground: Bone mineral density (BMD) has been assessed using Dual-Energy X-ray absorptiometry (DEXA). This procedure is considered to be of vital importance in assessing the general condition of individuals concerning their skeletal mineralization. BMD is measured according to the results of the DEXA examination of the vertebral column and pelvis. Although diabetes mellitus (D.M.)is known to affect BMD, the information regarding this relationship is not currently particularly clear. Objective: This study concentrates on the point that the assessment of BMD for the vertebral column is insuffi-cient to give a realistic and correct picture of the mineralization of the remaining part of the skeleton. Besides, this study elicited a gen
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show Moreيناقش البحث الاسباب الحقيقية بتفشي الارهاب في العراق بعد العام 2003