Results for 'Cryptography'

11 found
Order:
  1. An Intelligent Tutoring System for Learning Classical Cryptography Algorithms (CCAITS).Jihan Y. AbuEl-Reesh & Samy S. Abu-Naser - 2018 - International Journal of Academic and Applied Research (IJAAR) 2 (2):1-11.
    With the expansion of computer and information technologies, intelligent tutoring system are becoming more prominent everywhere throughout the world, it influences the scene to wind up plainly genuine that anyone could learn at anyplace in whenever. Be that as it may, without the help of intelligent tutoring system, the learning questions students’ response can't be understood in time. Thus it is important to create intelligent tutoring system (ITS) keeping in mind the end goal to give learning support service for students. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  91
    Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  32
    ITS for Learning Classical Cryptography Algorithms.Jihan Y. Reesh & Qassas Randa - 2016 - International Journal of Academic and Applied Research (IJAAR) 2 (2):1-10.
    Abstract: With the expansion of computer and information technologies, intelligent tutoring system are becoming more prominent everywhere throughout the world, it influences the scene to wind up plainly genuine that anyone could learn at anyplace in whenever. Be that as it may, without the help of intelligent tutoring system, the learning questions students’ response can't be understood in time. Thus it is important to create intelligent tutoring system (ITS) keeping in mind the end goal to give learning support service for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Discrete and Continuous: A Fundamental Dichotomy in Mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
    The distinction between the discrete and the continuous lies at the heart of mathematics. Discrete mathematics (arithmetic, algebra, combinatorics, graph theory, cryptography, logic) has a set of concepts, techniques, and application areas largely distinct from continuous mathematics (traditional geometry, calculus, most of functional analysis, differential equations, topology). The interaction between the two – for example in computer models of continuous systems such as fluid flow – is a central issue in the applicable mathematics of the last hundred years. This (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  19
    Онтология на квантовата информация.Vasil Penchev - 2005 - Philosophical Alternatives 14 (2):110-116.
    The article is devoted to quantum information (including its subdomains, namely: quantum communication, quantum computer, quantum cryptography), and its philosophical meaning. Paradox EPR, Bell’s inequality, phenomena of teleportation are discussed of a philosophical point of view. Quantum mechanical nonlocal correlations are interpreted as topological inseparabilities. Information is considered both as a fundamental physical quantity and as a philosophical category.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  8. Философия на квантовата информация.Vasil Penchev - 2009 - Sofia: BAS: IPhR.
    The book is devoted to the contemporary stage of quantum mechanics – quantum information, and especially to its philosophical interpretation and comprehension: the first one of a series monographs about the philosophy of quantum information. The second will consider Be l l ’ s inequalities, their modified variants and similar to them relations. The beginning of quantum information was in the thirties of the last century. Its speed development has started over the last two decades. The main phenomenon is entanglement. (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  9.  54
    ITS for Teaching DES Information Security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  90
    A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  11.  55
    Pro-Generative Adversarial Network and V-Stack Perceptron, Diamond Holographic Principle, and Pro-Temporal Emergence.Shanna Dobson - manuscript
    We recently presented our Efimov K-theory of Diamonds, proposing a pro-diamond, a large stable (∞,1)-category of diamonds (D^{diamond}), and a localization sequence for diamond spectra. Commensurate with the localization sequence, we now detail four potential applications of the Efimov K-theory of D^{diamond}: emergent time as a pro-emergence (v-stack time) in a diamond holographic principle using Scholze’s six operations in the ’etale cohomology of diamonds; a pro-Generative Adversarial Network and v-stack perceptron; D^{diamond}cryptography; and diamond nonlocality in perfectoid quantum physics.
    Download  
     
    Export citation  
     
    Bookmark