1,089 research outputs found
The Inverted-Triangle Technique Of Converting The Computer Number Systems (Binary, Octal And Hexadecimal) To Decimal
Number system is the method of writing numerals to represent values. It is an integral part of computer science. It is therefore, necessary to provide computer scientists with a good understanding of number system concepts. Several methods exist in converting from one number system to another. In this paper, we introduce a new method, called the Inverted-Triangular-Technique for converting other number systems to Decimal. It adopts a graphical presentation that assumes the shape of an inverted triangle. Two models have been presented: one to handle Integer number conversions and the other handles the non-integer conversions. Demonstrations of the models are presented for clarity of understanding. This technique has been tested with numerous examples, and the benefits arising from its uses have been discussed
The Hush Cryptosystem
In this paper we describe a new cryptosystem we call "The Hush Cryptosystem"
for hiding encrypted data in innocent Arabic sentences. The main purpose of
this cryptosystem is to fool observer-supporting software into thinking that
the encrypted data is not encrypted at all. We employ a modified Word
Substitution Method known as the Grammatical Substitution Method in our
cryptosystem. We also make use of Hidden Markov Models. We test our
cryptosystem using a computer program written in the Java Programming Language.
Finally, we test the output of our cryptosystem using statistical tests.Comment: 7 pages. 5 figures. Appeared in the 2nd International Conference on
Security of Information and Networks (SIN 2009), North Cyprus, Turkey;
Proceedings of the 2nd International Conference on Security of Information
and Networks (SIN 2009), North Cyprus, Turke
Encryption by using base-n systems with many characters
It is possible to interpret text as numbers (and vice versa) if one interpret
letters and other characters as digits and assume that they have an inherent
immutable ordering. This is demonstrated by the conventional digit set of the
hexadecimal system of number coding, where the letters ABCDEF in this exact
alphabetic sequence stand each for a digit and thus a numerical value. In this
article, we consequently elaborate this thought and include all symbols and the
standard ordering of the unicode standard for digital character coding. We show
how this can be used to form digit sets of different sizes and how subsequent
simple conversion between bases can result in encryption mimicking results of
wrong encoding and accidental noise. Unfortunately, because of encoding
peculiarities, switching bases to a higher one does not necessarily result in
efficient disk space compression automatically.Comment: 12 pages, 6 figure
Fundamentals of computer systems architecture
In the study guide "Fundamentals of computer systems architecture" the questions of presentation of information in different systems of calculation, execution of logical and arithmetic operations are considered. Each chapter provides the necessary theoretical information, examples of presentation of information and examples of execution of arithmetic and logical operations, given tasks for self-execution and control questions.
For the students of specialties 121 – “Software Engineering” and 123 – “Computer Engineering”
Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor
Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C. porosus in captivity is important because the data obtained may contribute for conservation and the safety for handlers and visitors. Thus, this study focuses on C. porosus in captivity to describe systematically the agonistic behaviour of C. porosus in relation to feeding time, daytime or night and density per pool. This study was carried out for 35 days in two different ponds. The data was analysed using Pearson’s chi-square analysis to see the relationship between categorical factors. The study shows that C. porosus was more aggressive during daylight, feeding time and non-feeding time in breeding enclosure (Pond C, stock density =0.0369 crocodiles/m2) as compared to non-breeding pond (Pond B, stock density =0.3317 crocodiles/m2) where it is only aggressive during the nighttime. Pond C shows the higher domination in the value of aggression in feeding and non-feeding time where it is related to its function as breeding ground. Chi-square analysis shows that there is no significant difference between ponds (p=0.47, χ2= 2.541, df= 3), thus, there is no relationship between categorical factors. The aggressive behaviour of C. porosus is important for the farm management to evaluate the risk in future for the translocation process and conservation of C. porosus generally
Comparing various hardware/software solutions and conversion methods for Controller Area Network (CAN) bus data collection
Various hardware and software solutions exist for collecting Controller Area Network (CAN) bus data. Digital data accuracy could vary based upon different data logging methods (e.g., hardware/software timing, processor timing, etc.). CAN bus data were collected from agricultural tractors using multiple data acquisition solutions to quantify differences among collection methods and demonstrate potential data accumulation rates. Two types of data were observed for this study. The first, CAN bus frame data, represents data collected for each line of hex data sent from an ECU. One issue with frame data is the resulting large file sizes, therefore a second logging format collected was an averaged frame signal, or waveform dataset. Because of its smaller file size, waveform data could be more desirable for long periods of collection. Percent difference was calculated from two sets of frame data logs using different hardware/software combinations, and a frame data log was also compared to a waveform data log. The resulting difference was less than 0.0025 RPM for engine speed comparisons, zero for fuel rate and fuel temperature comparisons, and the mean percent difference was less than 0.08% between the methods of data collection. The error production could have resulted from noise in hardware and processor times, but was not found to increase as time progressed. This showed that even though errors existed between logging methods, the magnitude of errors would not negatively impact any practical agricultural field research applications. Thus, data logged by the different devices was similar and files requiring less memory would be desired. Selecting a waveform CAN bus data logging option would likely maintain digital data accuracy while reducing file storage and processing needs
A Hybrid Quantum Random Number Generation Methodology to Insure Secure Key
In the world of computation and digital communications the digital world is currently lacking in ‘security.\u27 Yes, security is a feature that can never be attained one hundred percent. However, to ensure secure data we can use huge numbers and large cryptographic keys in combination with a statistical algorithm so that deceiving or decryption of information would become very difficult. The question then becomes what if someone reaches a level in computational speed like none other with the support of advanced chip technology and cracks all the available mathematical algorithms built in combination with the available cryptographic keys? Then the world of digital computation, which makes us feel secure, becomes at risk. Recent research and achievements in advanced technology, especially in Quantum Computation and Encryption, are ringing danger bells towards conventional computational security methodologies. In this paper, I will discuss current security trends, advancements in quantum computation and traditional computation security methods that feel insecure and discuss a new methodology that uses the spin rotation of photons to add the power of quantum mechanics to classical encryption algorithms to insure a balanced key generation
Episode 2.4 – Packed BCD: Taking More Nibbles out of Binary
Ask a computer to store a decimal whole number in binary and it will do it without any fuss. A decimal fraction, however, that’s another thing. In this episode, we will present a method called Packed BCD that is used to accurately represent decimal values in binary by storing each digit in its own nibble
- …