1,089 research outputs found

    The Inverted-Triangle Technique Of Converting The Computer Number Systems (Binary, Octal And Hexadecimal) To Decimal

    Get PDF
    Number system is the method of writing numerals to represent values. It is an integral part of computer science. It is therefore, necessary to provide computer scientists with a good understanding of number system concepts. Several methods exist in converting from one number system to another. In this paper, we introduce a new method, called the Inverted-Triangular-Technique for converting other number systems to Decimal. It adopts a graphical presentation that assumes the shape of an inverted triangle. Two models have been presented: one to handle Integer number conversions and the other handles the non-integer conversions. Demonstrations of the models are presented for clarity of understanding. This technique has been tested with numerous examples, and the benefits arising from its uses have been discussed

    The Hush Cryptosystem

    Full text link
    In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all. We employ a modified Word Substitution Method known as the Grammatical Substitution Method in our cryptosystem. We also make use of Hidden Markov Models. We test our cryptosystem using a computer program written in the Java Programming Language. Finally, we test the output of our cryptosystem using statistical tests.Comment: 7 pages. 5 figures. Appeared in the 2nd International Conference on Security of Information and Networks (SIN 2009), North Cyprus, Turkey; Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009), North Cyprus, Turke

    Encryption by using base-n systems with many characters

    Full text link
    It is possible to interpret text as numbers (and vice versa) if one interpret letters and other characters as digits and assume that they have an inherent immutable ordering. This is demonstrated by the conventional digit set of the hexadecimal system of number coding, where the letters ABCDEF in this exact alphabetic sequence stand each for a digit and thus a numerical value. In this article, we consequently elaborate this thought and include all symbols and the standard ordering of the unicode standard for digital character coding. We show how this can be used to form digit sets of different sizes and how subsequent simple conversion between bases can result in encryption mimicking results of wrong encoding and accidental noise. Unfortunately, because of encoding peculiarities, switching bases to a higher one does not necessarily result in efficient disk space compression automatically.Comment: 12 pages, 6 figure

    Fundamentals of computer systems architecture

    Get PDF
    In the study guide "Fundamentals of computer systems architecture" the questions of presentation of information in different systems of calculation, execution of logical and arithmetic operations are considered. Each chapter provides the necessary theoretical information, examples of presentation of information and examples of execution of arithmetic and logical operations, given tasks for self-execution and control questions. For the students of specialties 121 – “Software Engineering” and 123 – “Computer Engineering”

    Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor

    Get PDF
    Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C. porosus in captivity is important because the data obtained may contribute for conservation and the safety for handlers and visitors. Thus, this study focuses on C. porosus in captivity to describe systematically the agonistic behaviour of C. porosus in relation to feeding time, daytime or night and density per pool. This study was carried out for 35 days in two different ponds. The data was analysed using Pearson’s chi-square analysis to see the relationship between categorical factors. The study shows that C. porosus was more aggressive during daylight, feeding time and non-feeding time in breeding enclosure (Pond C, stock density =0.0369 crocodiles/m2) as compared to non-breeding pond (Pond B, stock density =0.3317 crocodiles/m2) where it is only aggressive during the nighttime. Pond C shows the higher domination in the value of aggression in feeding and non-feeding time where it is related to its function as breeding ground. Chi-square analysis shows that there is no significant difference between ponds (p=0.47, χ2= 2.541, df= 3), thus, there is no relationship between categorical factors. The aggressive behaviour of C. porosus is important for the farm management to evaluate the risk in future for the translocation process and conservation of C. porosus generally

    Comparing various hardware/software solutions and conversion methods for Controller Area Network (CAN) bus data collection

    Get PDF
    Various hardware and software solutions exist for collecting Controller Area Network (CAN) bus data. Digital data accuracy could vary based upon different data logging methods (e.g., hardware/software timing, processor timing, etc.). CAN bus data were collected from agricultural tractors using multiple data acquisition solutions to quantify differences among collection methods and demonstrate potential data accumulation rates. Two types of data were observed for this study. The first, CAN bus frame data, represents data collected for each line of hex data sent from an ECU. One issue with frame data is the resulting large file sizes, therefore a second logging format collected was an averaged frame signal, or waveform dataset. Because of its smaller file size, waveform data could be more desirable for long periods of collection. Percent difference was calculated from two sets of frame data logs using different hardware/software combinations, and a frame data log was also compared to a waveform data log. The resulting difference was less than 0.0025 RPM for engine speed comparisons, zero for fuel rate and fuel temperature comparisons, and the mean percent difference was less than 0.08% between the methods of data collection. The error production could have resulted from noise in hardware and processor times, but was not found to increase as time progressed. This showed that even though errors existed between logging methods, the magnitude of errors would not negatively impact any practical agricultural field research applications. Thus, data logged by the different devices was similar and files requiring less memory would be desired. Selecting a waveform CAN bus data logging option would likely maintain digital data accuracy while reducing file storage and processing needs

    A Hybrid Quantum Random Number Generation Methodology to Insure Secure Key

    Get PDF
    In the world of computation and digital communications the digital world is currently lacking in ‘security.\u27 Yes, security is a feature that can never be attained one hundred percent. However, to ensure secure data we can use huge numbers and large cryptographic keys in combination with a statistical algorithm so that deceiving or decryption of information would become very difficult. The question then becomes what if someone reaches a level in computational speed like none other with the support of advanced chip technology and cracks all the available mathematical algorithms built in combination with the available cryptographic keys? Then the world of digital computation, which makes us feel secure, becomes at risk. Recent research and achievements in advanced technology, especially in Quantum Computation and Encryption, are ringing danger bells towards conventional computational security methodologies. In this paper, I will discuss current security trends, advancements in quantum computation and traditional computation security methods that feel insecure and discuss a new methodology that uses the spin rotation of photons to add the power of quantum mechanics to classical encryption algorithms to insure a balanced key generation

    Episode 2.4 – Packed BCD: Taking More Nibbles out of Binary

    Get PDF
    Ask a computer to store a decimal whole number in binary and it will do it without any fuss. A decimal fraction, however, that’s another thing. In this episode, we will present a method called Packed BCD that is used to accurately represent decimal values in binary by storing each digit in its own nibble
    corecore