scholarly journals Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure

2020 ◽  
Vol 17 (4) ◽  
pp. 1320
Author(s):  
Noor Ibraheem ◽  
Mokhtar Hasan

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.

2013 ◽  
Vol 433-435 ◽  
pp. 1631-1634
Author(s):  
Jian Bing Lin ◽  
Jin An Zou

With the development of the computer network and communication technology, some important information is used to infringe upon by using the Internet and associated communications technology. The paper analyzes briefly the principle of the JAVA stream filtering and data security protection strategy on network of multi-level, then takes some safety measures for data protection by using the JAVA stream filter, mainly focuses on the network transmission of the socket data, in order to protect the security of data, and discussed some related problems of data encryption, finally gives the safety results.


2019 ◽  
Vol 14 (01) ◽  
pp. 15-18
Author(s):  
Harish Kumar ◽  
Shivangi Rathi

Aims: This paper aims at exploring the purpose and frequency to use their smartphones and to see their reactions about the importance ofusing a smartphone.Method: Survey technique was applied to collect the data. A sample of 100 young aged adults and 100 middle-aged adults from Delhi andDelhi NCR region was selected to study the habit pattern of the mobile phone users.Findings: The study revealed that there is a big difference in the usage of the smartphone by young aged adults and middle-aged adults.Young aged adults use their smartphone mainly to browse over the internet, using online applications and to entertain themselves for morethan 5 hours of a day. On the other hand, middle-aged adults use their smartphone mainly to contact with the people and use watts app for2–3 hours of the day. It was found that most of the positives sides like tech-friendly, socializing, getting information from the internet, etc. andnegatives like bad effect on the health, misuse of personal information through hacking by using a smartphone is affecting young aged adultsbut middle-aged adults are less affected by smart phone’s positives and negatives also.Keywords: Information and communication technology, Middle-aged adults, Young-aged adults.Journal of Teacher Education and Research (2019). DOI: 10.36268/JTER/1414


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


Author(s):  
Lucy Osler ◽  
Joel Krueger

AbstractIn this paper, we introduce the Japanese philosopher Tetsurō Watsuji’s phenomenology of aidagara (“betweenness”) and use his analysis in the contemporary context of online space. We argue that Watsuji develops a prescient analysis anticipating modern technologically-mediated forms of expression and engagement. More precisely, we show that instead of adopting a traditional phenomenological focus on face-to-face interaction, Watsuji argues that communication technologies—which now include Internet-enabled technologies and spaces—are expressive vehicles enabling new forms of emotional expression, shared experiences, and modes of betweenness that would be otherwise inaccessible. Using Watsuji’s phenomenological analysis, we argue that the Internet is not simply a sophisticated form of communication technology that expresses our subjective spatiality (although it is), but that it actually gives rise to new forms of subjective spatiality itself. We conclude with an exploration of how certain aspects of our online interconnections are hidden from lay users in ways that have significant political and ethical implications.


1999 ◽  
Vol 40 (1) ◽  
pp. 97-104
Author(s):  
Susan Brady

Over the past decade academic and research libraries throughout the world have taken advantage of the enormous developments in communication technology to improve services to their users. Through the Internet and the World Wide Web researchers now have convenient electronic access to library catalogs, indexes, subject bibliographies, descriptions of manuscript and archival collections, and other resources. This brief overview illustrates how libraries are facilitating performing arts research in new ways.


2007 ◽  
Vol 48 (8) ◽  
pp. 851-853 ◽  
Author(s):  
H. Eklöf ◽  
E. Radecka ◽  
P. Liss

Background: The development of digital imaging systems for radiology in combination with the possibility to transfer large quantities of data over the Internet has increased the interest in teleradiology. Transferring nighttime examinations to an evaluation center in a daytime zone may provide improved patient security, better working hours for radiologists, and reduced costs for emergency radiological services. Purpose: To evaluate the time required for transferring radiological information from Uppsala (Sweden) to Sydney (Australia). Material and Methods: A radiologist in Sydney reported on radiological examinations performed in Uppsala. The time required for downloading 75 examinations and returning 24 reports was registered. Results: Downloading was completed in <60 min for all conventional radiological examinations, but only 44% of computed tomography (CT) examinations with >65 images. Reports were completed in <10 min. Turnaround time was directly related to the time required for downloading the images. The Sydney report was available in Uppsala within 30 min of the in-house report in 79% of examinations. Conclusion: The main challenge for emergency teleradiology is the time required for downloading large volumes of data over the Internet.


Author(s):  
Nayem Rahman

Data mining has been gaining attention with the complex business environments, as a rapid increase of data volume and the ubiquitous nature of data in this age of the internet and social media. Organizations are interested in making informed decisions with a complete set of data including structured and unstructured data that originate both internally and externally. Different data mining techniques have evolved over the last two decades. To solve a wide variety of business problems, different data mining techniques are developed. Practitioners and researchers in industry and academia continuously develop and experiment varieties of data mining techniques. This article provides an overview of data mining techniques that are widely used in different fields to discover knowledge and solve business problems. This article provides an update on data mining techniques based on extant literature as of 2018. That might help practitioners and researchers to have a holistic view of data mining techniques.


2021 ◽  
Vol 8 (11) ◽  
pp. 246-258
Author(s):  
Dewi Kartika ◽  
Amrin Fauzi ◽  
Arlina Nurbaity Lubis

The rapid development of information and communication technology is currently having an impact on changes in various fields, one of which is changes in people's lifestyles, including consumption in society. The development of information and communication technology has resulted in easier access for people in the world to access the internet and use it to buying and selling transactions online via the internet. The report Global Web Index notes that Indonesia has a high level of users e-commerce highest in the world and as many as 96% of internet users looking for a product or service to make purchases online. This has resulted in the development of e-commerce in Indonesia and throughout the world which is increasing as a consequence of which the competition is getting harder service providers are e-commerce required to provide the best service in order to increase customer satisfaction and trust so that customers will be loyal to using these services. This can be achieved by paying attention to customer value and corrective actions in an effort to restore service to customers. The purpose of this study was to analyze the effect of customer perceived value and e-service recovery on e-loyalty with e-satisfaction and e-trust as intervening variables. This study uses a quantitative approach by distributing questionnaires to ecommerce Shopee Indonesia customers in Medan City with a total sample of 328 respondents. The sampling technique in this study used non-probability sampling. Data analysis was carried out through SEM-PLS using the SmartPLS program. The results of this study indicate that customer perceived value has a significant effect on e-satisfaction and also e-loyalty. However, customer perceived value has no significant effect on e-trust. The variable e-service recovery directly has a significant effect on e-satisfaction, e-trust, and e-loyalty. E-satisfaction and e-trust cannot mediate the relationship between customer perceived value and e-loyalty, but they are able to mediate the relationship between e-service recovery and e-loyalty. Keywords: Customer perceived value, E-Service Recovery, E-Satisfaction, ETrust, E-Loyalty.


2019 ◽  
Author(s):  
◽  
Youssef Ramzi Mansour

Big data is a relatively new concept that refers to the enormous amount of data generated in a new era where people are selling, buying, paying dues, managing their health and communicating over the internet. It becomes natural that generated data will be analyzed for the purposes of smart advertising and social statistical studies. Social data analytics is the concept of micro-studying users interactions through data obtained often from social networking services, the concept also known as “social mining” offers tremendous opportunities to support decision making through recommendation systems widely used by e-commerce mainly. With these new opportunities comes the problematic of social media users privacy concerns as protecting personal information over the internet has become a controversial issue among social network providers and users. In this study we identify and describe various privacy concerns and related platforms as well as the legal frameworks governing the protection of personal information in different jurisdictions. Furthermore we discuss the Facebook and Cambridge Analytica Ltd incident as an example.


Sign in / Sign up

Export Citation Format

Share Document