Results (19)
Search Parameters:
Keyword: AESAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreStrengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…
Read MoreEAES: Extended Advanced Encryption Standard with Extended Security
Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…
Read MoreDoubly Nonlinear Parabolic Systems In Inhomogeneous Musielak- Orlicz-Sobolev Spcaes
In this paper, we discuss the solvability of the nonlinear parabolic systems associated to the nonlinear parabolic equation: \(\frac{\partial b_{i}(x,u_{i})}{\partial t} -div(a(x,t,u_{i},\nabla u_{i}))- \phi_{i}(x,t,u_{i})) +f_{i}(x,u_{1},u_{2})=0\) where the function \(b_{i}(x,u_{i})\) verifies some regularity conditions, the term \(\Big(a(x,t,u_{i},\nabla u_{i})\Big)\) is a generalized Leray-Lions operator and \(\phi_{i}\) is a Caratheodory function assumed to be Continuous on \(u_i\) and satisfy only a…
Read MoreCombination of Caesar Cipher Modification with Transposition Cipher
The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreGenerative Artificial Intelligence and Prompt Engineering: A Comprehensive Guide to Models, Methods, and Best Practices
This article enhances discussions on Generative Artificial Intelligence (GenAI) and prompt engineering by exploring critical pitfalls and industry-specific advantages. It begins with a foundational overview of AI evolution, emphasizing how generative models such as GANs, VAEs, and Transformers have revolutionized language processing, image generation, and drug discovery. Prompt engineering is highlighted as a key methodology…
Read MoreAntecedents to Learners’ Satisfaction with Serious Games: An Investigation Using Partial Least Square
Serious games are at the forefront of discussions about the future of learning. Research shows that they can help improve student motivation and knowledge transfer by making learning experiences more pleasurable. Teaching practices are increasingly enhanced or complemented by serious games; skills and knowledge are developed by recreating realistic situations allowing learners to enhance their…
Read MoreQuantum Secure Lightweight Cryptography with Quantum Permutation Pad
Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…
Read MoreDesign and Development of an Advanced Affordable Wearable Safety Device for Women: Freedom Against Fearsome
Harassment and violence against women have become one of the social security problems in Bangladesh. In this paper, we aim to develop safety devices for women named BOHNNI and BADHON which resemble legitimate jewelry. We used a microcontroller for the hardware device to make it most decisive and less immoderate. BOHNNI, a locating device, is…
Read MoreAnalysis of qCON and qNOX Anesthesia Indices and EEG Spectral Energy during Natural Sleep Stages
The objective of this research is to study the behaviour of the anaesthesia monitor Conox during natural sleep to open the gate for this devices to assess subjects during this stage. The values of qCON and qNOX indices and EEG frequency bands are analysed during night sleep of 10 volunteers when they lose consciousness, in…
Read MoreThe Probe Mark Discoloration on Bond Pad and Wafer Storage
In this report, a probe mark discoloration with donut/circle shape was found. The corrosion formed on Aluminum bond pads. The SEM/EDS, TEM/EELS & AES surface techniques were used to identify this corrosion product. All these material analysis results pointed out the role of fluorine to this discoloration. The HAST testing, all the chip samples obtained…
Read MorePerformance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage
Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…
Read MoreAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreLearning Personalization Based on Learning Style instruments
Adaptive education systems (AES) are considered one of the most interesting research topics in technology-based learning strategies. Since students have different abilities, needs and learning styles, we should fit the curriculum and teaching activities to these different learning styles. This study investigates the impact of using LAES (Libyan Adaptive Education System) on the performance of…
Read MoreARMA feeding techniques for isoflux coverage from a micro satellite
This paper deals with the design of a new reconfigurable beam antenna used to improve the efficiency of spatial telemetry links on Nano-Satellite. This agile beam antenna is not built on the well-known array concept AESA (Agile Electronically Scanned Array) but using a new one called ARMA (Agile Matrix Radiating Antenna); MARPEM in French. In…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read More
