The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many review studies are classified as overview-types of review focusing on generic LWC. Further, the topics of the reviews mainly focused on symmetric block cryptography, while limited reviews were found on asymmetric-key and hash in LWC. The outcomes of this study revealed that the reviews in LWC in IoT are still in their premature stage and researchers are encouraged to explore by conducting review studies in the less-attended areas. An extensive review of studies that cover these two topics is deemed necessary to establish a balance of scholarly works in LWC for IoT and encourage more empirical research in the area.
At the beginning of the nineties increased responsibility of the auditor to the community as the demand for auditing the environmental performance for the economic units in addition to audit the financial performance. With the aim of preserving the environment and reducing the damagse as aresult of the negative effects of the activities of these units.
The researh deal with two sides the first one identifies the theoretical framework of the concept of environmental audits, requirements, methods, types of procedures, and duties of the auditor in conducting environmental audits. It also deals with the concept of the enviro
... Show MoreThe research aims to study the basic concepts of the underwriting policy with its various indicators. The researcher studies the underwriting policy with its various indicators (sex, health status, age of the insured, insurance amount, The method of acceptance, payment method, and duration of insurance) where each of these indicators constitute an important factor in the productivity of life insurance policies, where the productivity of life insurance policies face many difficulties because insurance is a service and not a tangible material commodity and its benefits and not current. Therefore, the life insurance company needs to use a prudent underwriting policy so as not to endanger its financial position due to the expansion of the un
... Show MoreThis research aims to identify and measure the role of TQM in the process of developing the financial performance of Diyala State Company and show the reality and obstacles, after applying the company's management to the requirements of ISO 9001: 2008 and compare it with its performance before applying this standard, The researcher measured the financial performance by conducting financial analysis of the financial statements and conducting a number of interviews at the company's headquarters, Diyala State Company (one of the Iraqi Ministry of Industry and Minerals formations) was sele
... Show MoreThere have been many advances in the solar chimney power plant since 1930 and the first pilot work was built in Spain (Manzanares) that produced 50 KW. The solar chimney power plant is considered of a clean power generation that needs to be investigated to enhance the performance by studying the effect of changing the area of passage of air to enhance the velocity towards the chimney to maximize design velocity. In this experimental and numerical study, the reduction area of solar collector was investigated. The reduction area that mean changing the height of glass cover from the absorbing plate (h1=3.8cm, h2=2.6cm and h3=1.28cm). The numerical study was performed using ANSYS Fluent software package (version 14.0) to solve go
... Show MoreMaxillofacial trauma in females is not widely reported. This study aimed to analyze the clinical characteristics and the patterns of maxillofacial injuries in females and to determine the differences in these patterns among different causes. This retrospective study analyzed several variables, including demographic, social, injury-related, and treatment-related variables, and compared these variables in relation to the main etiologies of maxillofacial trauma. The main etiologies of maxillofacial injuries involving females were assault, followed by road traffic accidents, and falls. There were significant differences in relation to the 3 etiologies in age groups (
The technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t
... Show MoreWhen a vehicle is left parked in the sun for an extended period, the gathered heat causes damage to several interiors within the cabin and causes discomfort for people and animals left inside the car. In the present work, the effect of the orientation of a parked white minibus on temperature distribution and cooling load calculation is studied experimentally in an open environment. Two different cases were studied facing south and facing east. For several hours, the temperature inside the car cabin had been monitored and measured at five separate locations. The cooling load calculations are carried out based on the experimental measurements. The results show that the overheating of parked cars always happens as a result
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More