scholarly journals Securing The Predicting Data Using Rjb20 Algorithm

The current world is information world; without this information can’t make due in present stage. This information created more from web- based media; this media information is public information; This public infor- mation did not have well security; so we applying the proposed method and it has 2 steps; 1. Addition property of the matrix;2. Perfect numbers swapped. The proposed method gives well security while comparing with Salsa method.

The current world is information world; without this information can’t make due in present stage. This information created more from web- based media; this media information is public information; This public infor- mation did not have well security; so we applying the proposed method and it has 2 steps; 1.Addition property in matrix; 2. Using prime numbers in qua- dratic equations. The proposed method gives well security while comparing with Salsa method.


The current world is information world; without this information can’t make due in present stage. This information created more from web- based media; this media information is public information; This public information did not have well security; so we applying the proposed method and it has 3 steps; 1. Using prime numbers in quadratic equations; 2. Prime and non-negative integer number used to swap the numbers; 3. Column operations execution; The new method gives well security when contrast to Salsa method.


The current world is information world; without this information can’t make due in present stage. This information created more from web- based media; this media information is public information; This public information did not have well security; so we applying the proposed method and it has 2 steps; 1. Using prime numbers in quadratic equations; 2. Prime and non-negative integer number used to swap the numbers; The proposed method gives well security while comparing with Salsa method.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
ADJAT SUDRADJAT

ABSTRACT - As an educational institution, Bina Sarana Informatika of course requires summary of information which is comprehensive and sustainable as a support to management in doing evaluation, planning and decision-making in the field of academic services. But the information system from operational data processing today can’t meet the needs, because it’s only able to produce detailed reports periodically. The research studies the development of a data warehouse for Call Center on The Division of Public Information of Bina Sarana Informatika in order to explore the strategic information contained in the operational database and present them in the form of summary information which is useful as input in improving the quality of academic services. By using a nine steps kimball approach, the research produce a data warehouse which is equipped with a web-based presentation application that can be easily accessed by all stakeholders of Bina Sarana Informatika. The development of data warehouse has been able to extract operational data into strategic information summaries that are useful to Bina Sarana Informatika management as supporting in doing evaluation, planning and decision-making in the field of academic services. Keywords : Nine Steps Kimball, Call Center, Data Warehouse, Decision Support. ABSTRAKSI - Sebagai sebuah institusi pendidikan, Bina Sarana Informatika tentu membutuhkan ringkasan informasi yang komprehensif dan berkesinambungan sebagai penunjang bagi manajemen dalam melakukan evaluasi, perencanaan dan pengambilan keputusan di bidang pelayanan akademik. Namun sistem informasi yang berasal dari pengolahan data operasional saat ini tidak dapat memenuhi kebutuhan tersebut, karena hanya mampu menghasilkan laporan–laporan yang bersifat detail dan periodik. Penelitian ini mengkaji pengembangan data warehouse Call Center pada Divisi Informasi Publik Bina Sarana Informatika untuk menggali informasi strategis yang terdapat pada database operasional dan menyajikannya dalam bentuk ringkasan informasi yang berguna sebagai masukan dalam usaha peningkatan kualitas pelayanan akademik. Dengan menggunakan metodologi kimball nine-step, penelitian menghasilkan sebuah data warehouse dilengkapi dengan aplikasi presentasi berbasis web yang dapat diakses dengan mudah oleh seluruh stakeholder Bina Sarana Informatika. Pengembangan data warehouse telah mampu mengekstrak data operasional menjadi ringkasan informasi strategis yang berguna bagi manajemen Bina Sarana Informatika sebagai penunjang dalam melakukan evaluasi, perencanaan dan pengambilan keputusan di bidang pelayanan akademik. Kata Kunci : Nine Steps Kimball, Call Center, Data Warehouse, Decision Support.


Author(s):  
Олексій Сергійович Вамболь

Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no information useful for cryptanalysis. Network security protocols that use asymmetric ciphers include TLS, S/MIME, OpenPGP, Tor, and many others. Some of the asymmetric encryption schemes are homomorphic, that is, that they allow calculations on encrypted data to be performed without preliminary decryption. The aforesaid property makes possible using these cryptosystems not only for symmetric key establishment but also in several areas of application, in particular in secret voting protocols and cloud computing. The matrix-based knapsack cipher is a new additively homomorphic asymmetric encryption scheme, which is based on the properties of isomorphic transformations of the inner direct product of diagonal subgroups of a general linear group over a Galois field. Unlike classic knapsack encryption schemes, the cryptographic strength of this cipher depends on the computational complexity of the multidimensional discrete logarithm problem. Despite some useful properties, further research into the cryptographic strength of the matrix-based knapsack cipher has found serious drawbacks inherent in this cryptographic scheme. In the given paper an improved polynomial-time plaintext-recovery attack on the matrix-based knapsack cipher is proposed. Applying this cryptanalytic method requires only public information and has time complexity O(t1.34), where t denotes the decryption time of the attacked cryptosystem. The aforementioned attack is more productive and easier to implement in software in comparison with the original one. The advantages of the proposed method are due to using in its algorithm the simple and relatively fast matrix trace operation instead of more complex and slower transformations.


2006 ◽  
Vol 1 (1) ◽  
Author(s):  
H. Sieker ◽  
S. Bandermann ◽  
K. Schröter ◽  
M. Ostrowski ◽  
A. Leichtfuss ◽  
...  

The main objective of the WSM300 project is the development of a methodology which guides and supports an improved water resources management on the level of small watersheds (up to 300 km²). The developed methodology is to be implemented into a software based tool within the framework of a generic Decision Support System (DSS). (Leichtfuss 2003, Schröter 2004). Core of the DSS is a "decision matrix", which has been implemented as a web based application (www.wsm300.de). The management objectives are represented by the indicators labeling the rows. They will be the result of a discussion of the objectives and problems in the specific sub-basin, which is supported by the catalogue of indicators. The matrix, once the labels are defined, serves as a plot for the planning process, defining clearly which objectives have to be considered and which indicator-values have to be calculated. The DSS further includes a concept and tools for the combination of existing software components and supports the processing of model-outputs to indicator-values. Filled with the indicator-values, the matrix allows a comparison of the scenarios and provides a good basis for a decision. If desired, multi-criteria decision aid methods can further help find the optimal scenario and mediate between stakeholders. As a co-product of the web-based DSS, the "River-Information-System" was established informing the public about the newest developments in their catchment.


2008 ◽  
Vol 24 (2) ◽  
pp. 533-553 ◽  
Author(s):  
David Wald ◽  
Kuo-Wan Lin ◽  
Keith Porter ◽  
Loren Turner

When a potentially damaging earthquake occurs, utility and other lifeline managers, emergency responders, and other critical users have an urgent need for information about the impact on their particular facilities so they can make appropriate decisions and take quick actions to ensure safety and restore system functionality. ShakeMap, a tool used to portray the extent of potentially damaging shaking following an earthquake, on its own can be useful for emergency response, loss estimation, and public information. However, to take full advantage of the potential of ShakeMap, we introduce ShakeCast. ShakeCast facilitates the complicated assessment of potential damage to a user's widely distributed facilities by comparing the complex shaking distribution with the potentially highly variable damageability of their inventory to provide a simple, hierarchical list and maps of structures or facilities most likely impacted. ShakeCast is a freely available, post-earthquake situational awareness application that automatically retrieves earthquake shaking data from ShakeMap, compares intensity measures against users’ facilities, sends notifications of potential damage to responsible parties, and generates facility damage maps and other Web-based products for both public and private emergency managers and responders.


Author(s):  
Anthony Akai Acheampong Otoo ◽  
Li Zhiwen ◽  
Charles Oduro Acheampong Otoo ◽  
Maxwell Opuni Antwi

In an era of globalization, economies over the world have become increasingly international and competitive. According to Alahuhta et al (2005), the last three decade has seen a massive revolution in technology use at both individual and organizations level with several organizations replacing the manual system of operation with modern technologies and computer powered machines. Acheampong, et al (2017) explain that three decades ago it was a dream to conceive that at a point in time all of the world’s knowledge could be put on a single world wide web and browsed by people from different parts of the world for free. These are the realities of the contemporary business place which Casey & Wilson-Evered (2012) explained has been facilitated by the advances in technology and globalization. According to Zaremohzzabieh, et al (2014), e-commerce platform appeared along with the development of internet and the necessities of ventures has given a web-based exchanging spot to customers and suppliers. It is a virtual system for purchasers and merchants, utilizing computer programming technology to coordinate assets on the web and accomplish the objective of community program (Ruzzier, AntonciC, Hisrich, & Konecnik, 2007). E-commerce platform gives all members equivalent and public information location of many services. Merchants can disseminate product information on e-commerce platforms, while purchasers can get a wide range of information without going outside (Strauss, 2016). As a new trend in the economic development and a new pattern of future business advancement, e-commerce platform plays a critical part with many attributes i.e. third party, service nature, neutrality and integration (Ling, et al, 2010).


2020 ◽  
Vol 1 (02) ◽  
pp. 30-36
Author(s):  
Tirsa Kaunang ◽  
Jonathan Wijaya ◽  
Sondy Kumajas

Abstract—Correctional Information is public information that is produced and managed by the Directorate General of Prisons, region offices, and correctional technical units related to the administration of prisns in accordance with the provisions of the invitation and other information relating to the public interest. It is obligatory to present correctional information, expecially in LPKA Class II Tomohon, which is still manual, where people who want to see correctional information must come to LPKA Class II Tomohon. Therefore, a web-based information system was created which makes it easy to convey correctional information and also helps in submitting complaints. The research method used in this system is the waterfall which consists od analysis, design, code, and testing. The system modeling tool used is UML and testing uses the blackbox testing method.


2019 ◽  
Vol 41 (1) ◽  
pp. 49-57 ◽  
Author(s):  
Matevž Triplat ◽  
Nike Krajnc

The rationalization of working procedures during difficult market conditions is gaining increasing importance. For rational production, it is necessary to always be aware of what and how much to invest in the business process to obtain the desired products or services without economic loss. This article presents a tool for the assessment of costs in forest wood supply chains. WoodChainManager is a Web-based tool composed of three user modules intended for the assessment of material costs of individual machines or the total costs of all selected machines in a forest harvesting system. Users can test the impact of individual technologies on the total material costs of the harvesting system and thus optimize operation processes. The basic tool for describing harvesting systems is the matrix, which visualizes cutting and hauling from the standing tree in the stand to the forest products at the end user. The tool has built-in algorithms that prevent the selection of an illogical harvesting system. The selected method for calculating costs for individual machines is simple, but still reflects the state of the actually incurred costs. WoodChainManager offers cost calculations for a wide range of technologies, machines and appurtenant attachments. The authors of this paper wish to increase awareness and understanding of cost calculations and to offer the possibility to directly compare different harvesting systems.


Sign in / Sign up

Export Citation Format

Share Document