427 research outputs found

    University bulletin 2023-2024

    Get PDF
    This catalog for the University of South Carolina at Beaufort lists information about the college, the academic calendar, admission policies, degree programs, faculty and course descriptions

    2017 GREAT Day Program

    Get PDF
    SUNY Geneseo’s Eleventh Annual GREAT Day.https://knightscholar.geneseo.edu/program-2007/1011/thumbnail.jp

    Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp

    Get PDF
    At this time chat has been considered as a facility that can be used to communicate directly both remotely and at close range. Those who must be connected online with internet users around the world. In this case, this research will be applied to the WhatsApp text messaging application using the method applied, namely Caesar cipher cryptography. The system development method that will be used for this research is the prototype method. The results obtained from this research method are chat messages on the WhatsApp application encrypted using Caesar cipher cryptography with message encryption using end-to-end processing techniques where encryption and message descriptions can be done while chatting

    Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement

    Get PDF
    The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm

    An analysis of womxn’s understanding of South African public health awareness campaigns’ messages on HIV/AIDS using cognitive interviewing

    Get PDF
    Besides having the most extensive antiretroviral therapy (ART) treatment programme, South Africa faces the highest epidemic rate, with womxn and children most affected. Several prevention strategies have been implemented to curb the spread of HIV/AIDS in South Africa, including free access to print form awareness campaigns that come through pamphlets, posters and billboards. However, most public health sector awareness and educational programmes carry uniform messages that are then carried out in heterogeneous contexts leading to the miscomprehension of the intended messages. This study aimed to explore womxn’s understanding of public health awareness content on the prevention of HIV/AIDS. The focus was on examining their interpretation of universal HIV/AIDS awareness messages in their heterogeneous contexts, which might provide obstacles to womxn’s reproductive health and well-being using a reproductive justice framework. This study employed a cognitive interviewing methodology to collect data from the participants to obtain information about how participants understand and perceive knowledge and how they arrive at specific answers or judgements. Twenty-eight (28) womxn aged between 18 and 30 years were purposively sampled for this study from four (4) local healthcare facilities in Makhanda: the Grahamstown Municipality (Anglo-African) Clinic, the Joza Clinic, the Settlers Day Hospital and the Raglan Road Clinic. Thematic network analysis (Attride-Stirling, 2001) was used to analyse the data collected from the study. One global theme emerged from the dataset: Barriers to HIV prevention, care and treatment. The barriers were identified mainly due to social constructions of hegemonic masculinity, individual versus cultural expectations, and outdated awareness content. The findings from the study suggest that almost all the challenges that womxn faced in terms of understanding and interpreting the awareness materials stemmed from structural factors in the South African context. The findings also suggest that cognitive interviewing methodology can be reconceptualised as an endeavour that cuts across a wide range of fields.Thesis (MSocSci) -- Faculty of Humanities, Psychology, 202

    2023-2024 academic bulletin & course catalog

    Get PDF
    University of South Carolina Aiken publishes a catalog with information about the university, student life, undergraduate and graduate academic programs, and faculty and staff listings

    Pengamanan Pesan Rahasia dengan Algoritma Vigenere Cipher Menggunakan PHP

    Get PDF
    A message security system to maintain the confidentiality of data information is very important. To achieve this, a security system is required to maintain the confidentiality of information. Encrypting information sent for cryptographic purposes confidentiality, integrity, authentication and irrefutable proof is one of the methods used for this purpose. Algorithm is a collection of problem-solving commands. Algorithm also has a process of repetition (iteration) and decisions that cannot be made. Vigenere cipher is one of the traditional cryptographic algorithms with multiple alphabetical substitution. PHP stands for PHP Hypertext Preprocessor. PHP is a scripting language that is commonly used to create dynamic web applications by deploying them on servers. The purpose of this research is to secure secret messages using the Vigenere Cipher algorithm using PHP

    Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher

    Get PDF
    The achievement of visual aspects and image security often cannot meet visibility standards, for example the acquisition of PSNR and UACI NPCR values. To increase security, this research has implemented a combination of the Vigenere cipher and Beaufort and the use of Fibonacci as a randomizer. The combination of the Vigenere Cipher and Beaufort Cipher substitution algorithms with the Fibonacci technique can be applied to encrypt color images in RGB and CMY, with a size of 256x256 pixels and in .bmp format. The Fibonacci cut-off value used in this study is 10000. The highest entropy value of the cipher image peppers.bmp is 7,991. The lowest PSNR cipher image value is accordion.bmp where for RGB it is 5,439 dB and for CMY it is 5,403 dB. accordion.bmp's highest UACI value is 44.018% for RGB and 44.312% for CMY. The NPCR value in the airplane.bmp image has the highest value in RGB of 99.792% and for CMY the highest value is in splash.bmp with a value of 99.798%. Evaluation of the decryption results shows that the decryption process can run perfectly as indicated by the values of MSE=0, PSNR=inf, UACI and NPCR=0%. Therefore, encrypt and decrypt was proven that the results obtained in the visual aspect are very good
    • …
    corecore