scholarly journals Implementasi Algoritma Massey-Omura dan Algoritma Elias Delcta Code Pada Pengamanan dan Kompresi File Dokumen

2020 ◽  
Vol 1 (3) ◽  
pp. 239
Author(s):  
Rosalina Manalu

The rapid development of information technology requires users to be more careful in maintaining data confidentiality and security so that data is not known or manipulated by other parties. Data security is very important for users, data security can be maintained by everyone. Cryptography is one of the security tools used to encode a document file. One of them is by using the Massey-Omura algorithm, which is an asymmetric cryptographic algorithm, so that it has different keys for encryption and decryption. In the process of sending data, it also requires the duration of sending files to not give an opportunity to data thieves by compressing the data or reducing the size of the file to be smaller without losing the contents of the document file, so the data exchange process can be shorter Data compression is a process where text, audio, and video files are transformed into compressed files with smaller data sizes but do not lose the actual information. This study discusses the type of lossless compression, so that files obtained from decompression will be identical to the original data. Elias Delta Code is a type of lossless compression. The performance parameters of this algorithm will be measured by Ratio of Compression (RC, Space Saving (SS) and compression time. Data used in the testing process is data that consists of several types of characters. In this discussion will include explanation, how to work, advantages and The author will also try to provide a review of ways to improve the security level of document files.

Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1043
Author(s):  
Abdallah A. Smadi ◽  
Babatunde Tobi Ajao ◽  
Brian K. Johnson ◽  
Hangtian Lei ◽  
Yacine Chakhchoukh ◽  
...  

The integration of improved control techniques with advanced information technologies enables the rapid development of smart grids. The necessity of having an efficient, reliable, and flexible communication infrastructure is achieved by enabling real-time data exchange between numerous intelligent and traditional electrical grid elements. The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and information technologies. Although smart grid technologies bring about valuable economic, social, and environmental benefits, testing the combination of heterogeneous and co-existing Cyber-Physical-Smart Grids (CP-SGs) with conventional technologies presents many challenges. The examination for both hardware and software components of the Smart Grid (SG) system is essential prior to the deployment in real-time systems. This can take place by developing a prototype to mimic the real operational circumstances with adequate configurations and precision. Therefore, it is essential to summarize state-of-the-art technologies of industrial control system testbeds and evaluate new technologies and vulnerabilities with the motivation of stimulating discoveries and designs. In this paper, a comprehensive review of the advancement of CP-SGs with their corresponding testbeds including diverse testing paradigms has been performed. In particular, we broadly discuss CP-SG testbed architectures along with the associated functions and main vulnerabilities. The testbed requirements, constraints, and applications are also discussed. Finally, the trends and future research directions are highlighted and specified.


SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 100-110
Author(s):  
Ahmad Arif ◽  
Adidtya Perdana ◽  
Arief Budiman

Data security is most important today, because the rampant data theft resulting in a lot of misuse of data by irresponsible parties so that it makes us anxious as data owners, for data storage it is usually stored in the database. From these problems the idea emerged to create a cryptographic system where the system can secure data by encrypting and decrypting also make data fully save and then the data owned by the user. This study aims to secure the data in the database by encrypting the original data without destroying the original data when later after decrypted. To perform this security, a cryptographic methodology is used with both of  method that is Vigenere Cipher and Triangle Chain Cipher algorithms which are implemented in the application because both of methodology have same root that is classical cryptographic. This application will later be used as a medium for users to secure their data in the database so that later data theft will not to be easy. After doing fully research that produces applications that can implement combination of Vigenere Cipher and Triangle Chain Cipher algorithms,data in the encrypted database field is safe because encryption has been done to the data.


Author(s):  
Ayu Wandira Simatupang

The security and confidentiality of data is very important considering the rapid development of technology at this time which allows the emergence of new techniques that are misused by certain parties that can threaten security from data that are considered insignificant. Cryptography is a field of science to maintain image security. Cryptography has been implemented in many ways. The way it works is to change the original data that can be understood / read by humans (plaintext) to other forms that cannot be understood / read by humans (ciphertext). The process of transforming plaintext into chiperteks is termed encryption. While the process of returning a chipertext message to plaintext is termed decryption. Vigenere Cipher is an asymmetric cryptographic algorithm, where the key used to encrypt is different from the one used to decrypt. Vigenere Cipher is a cryptographic algorithm that uses letters and numeric values. Vigenere Cipher requires three steps in the process, namely key generation, encryption, and decryption. The process of encryption and decryption is almost the same process.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

In BPCS Steganography, data hiding will be split into blocks that have a high complexity where the blocks are categorized into informative and noise-like regions. A noise-like region is a bit-plane that has the greatest probability as a data hiding since it has a high complexity. In this region, the data inserted is vulnerable to attack. Someone can easily take a series of characters that are stored on a noise-like region previously if the system is not modified. Improving the bit-plane composition is to increase data security. Bit-plane will be combined with a specified key. The key should be changed to bit-plane form as well. The key that has already been turned into the bit-plane will be mated with the original data. Using an exclusive-or of this part is the best way to produce the cipher bit-plane. Finally, the data residing on the cover image produced have a high-security level.


2014 ◽  
Vol 644-650 ◽  
pp. 1298-1302
Author(s):  
Dan Yang Qiao ◽  
Feng Qiang Gao ◽  
Xin Ming Lin ◽  
Zeng Zheng Wang ◽  
Zi Jian Lin

With the rapid development of today's society, air pollution is becoming one of the hottest topics of humans’ concern. Looking at the daily life, some peoples’ awareness in the dangers of indoor air pollution and household gas safety is not enough, so it may lead to a number of respiratory diseases, or "sub-health" conditions. (Such as influenza, pharyngitis and other diseases) On the other hand, some families, because of a gas leak, has not been timely warning of fires and caused the tragedy. To solve these problems, this work is designed based on low-power microcontroller as the master chip HT32F1765 100LQFP between the various smart sensors and did data exchange with the home environment monitoring system. The HT chip use as the master chip and combined with using Sharp PM2.5 gas sensors, temperature and humidity sensors, gas concentration sensor as gas sensing devices. We use all these sensors as information collection module, to collect the data information of air quality, temperature, humidity and combustible gas concentration in different rooms and different locations. The real-time data acquisition and sensor would be displayed on the touch screen. In addition, the creation of data monitoring hardware devices, as well as match the mobile phone in APP. Our users can log on the APP remotely to view home monitoring information, or to receive alarm information.. Thus, adults can safely work outside, avoiding unnecessary worry.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Smart Cities ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 253-270
Author(s):  
Mohammed Bin Hariz ◽  
Dhaou Said ◽  
Hussein T. Mouftah

This paper focuses on transportation models in smart cities. We propose a new dynamic mobility traffic (DMT) scheme which combines public buses and car ride-sharing. The main objective is to improve transportation by maximizing the riders’ satisfaction based on real-time data exchange between the regional manager, the public buses, the car ride-sharing and the riders. OpenStreetMap and OMNET++ were used to implement a realistic scenario for the proposed model in a city like Ottawa. The DMT scheme was compared to a multi-loading system used for a school bus. Simulations showed that rider satisfaction was enhanced when a suitable combination of transportation modes was used. Additionally, compared to the other scheme, this DMT scheme can reduce the stress level of car ride-sharing and public buses during the day to the minimal level.


2021 ◽  
Vol 13 (2) ◽  
pp. 444
Author(s):  
Xucai Zhang ◽  
Yeran Sun ◽  
Ting On Chan ◽  
Ying Huang ◽  
Anyao Zheng ◽  
...  

Urban vibrancy contributes towards a successful city and high-quality life for people as one of its vital elements. Therefore, the association between service facilities and vibrancy is crucial for urban managers to understand and improve city construction. Moreover, the rapid development of information and communications technology (ICT) allows researchers to easily and quickly collect a large volume of real-time data generated by people in daily life. In this study, against the background of emerging multi-source big data, we utilized Tencent location data as a proxy for 24-h vibrancy and adopted point-of-interest (POI) data to represent service facilities. An analysis framework integrated with ordinary least squares (OLS) and geographically and temporally weighted regression (GTWR) models is proposed to explore the spatiotemporal relationships between urban vibrancy and POI-based variables. Empirical results show that (1) spatiotemporal variations exist in the impact of service facilities on urban vibrancy across Guangzhou, China; and (2) GTWR models exhibit a higher degree of explanatory capacity on vibrancy than the OLS models. In addition, our results can assist urban planners to understand spatiotemporal patterns of urban vibrancy in a refined resolution, and to optimize the resource allocation and functional configuration of the city.


2003 ◽  
Vol 9 (1_suppl) ◽  
pp. 48-50 ◽  
Author(s):  
P Soegner ◽  
Th Rettenbacher ◽  
A Smekal ◽  
D Zur Nedden

summary The Tyrolean telemedicine pilot project linked the University Clinic of Innsbruck and the district hospital in Reutte. Five medical specialties were investigated: teleradiology, telepathology, teledermatology, tele-ophthalmology and tele-oncology. A Tyrolean ‘four-column model of quality management in telemedicine’ was introduced to ensure a global view of the project and to avoid mistakes. In teleradiology, a 12-step workflow was developed, which described the medical responsibilities at each stage. We found that the defined teleradiology workflow and the technical equipment for data security and data exchange worked without problems in over 79% of a total of 424 cases. To ensure continuous quality assurance, the whole teleradiology workflow was ISO 9001:2000 certified.


2019 ◽  
Author(s):  
Robert Pollice

The rapid development of analytical methods in recent decades has resulted in a wide range of readily available and accurate reaction-monitoring techniques, which allow for easy determination of high-quality concentration-time data of chemical reactions. However, while the acquisition of kinetic data has become routine in the development of new chemical reactions and the study of their mechanisms, not all the information contained therein is utilized because of a lack of suitable analysis tools which unnecessarily complicates mechanistic studies. Herein, we report on a general method to analyze a single concentration-time profile of chemical reactions and extract information regarding the reaction order with respect to substrates, the presence of multiple kinetic regimes, and the presence of kinetic complexities, such as catalyst deactivation, product inhibition, and substrate decomposition.<br>


Sign in / Sign up

Export Citation Format

Share Document