The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThis study aims to study argumentation in political debates by figuring out the logical fallacies employed in the debates of Clinton and Trump, the presidential nominees of the 2016 elections, and Biden and Trump, the leading contenders in the 2020 United States presidential election. The study attempts to answer the questions: (1) What relevance fallacies are adopted in the debate between Trump and Clinton? (2) What rhetorical devices are used to influence the audience and gain voters besides fallacies in the debates selected? The study analyses two texts from two arguments using Damer's (2009) taxonomy of relevance fallacy and rhetorical devices based on Perrine’s (1969) model of communication and interpersonal rhetoric to answe
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Media has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show More