Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of Congo
نویسندگان
چکیده
This paper deals with the implementation of Algorithms and tools for security academic data protection in Democratic Republic Congo. It consists principally implementing two algorithms distinct to secure this particular case, higher university education The design meets approach that any researcher encryption must use during development a computer system. Briefly, these are steps follow encrypt information programming language. These based on symmetric asymmetric encryptions, first one uses Christopher Hill's algorithm, which texts form matrices before they encrypted RSA as algorithms, prime numbers we have encoded more than 512 bits. As tools, developed them php is only language taken an example because it impossible all them. implemented Caesar, Hill showing how operations carried out thanks graphical interfaces. They pedagogical reasons help students other researchers learn algorithms. We not pleasure but rather used system, would prevent limit unauthorized access systems. will be management fees explains shows complexity developed. been able solve problems versions prototype, if there new version later, some functions may obsolete, constitute limitation tools. work targets primarily Ministry Higher Education Universities, make results their own implement order problem intrusions, developers who already made instead thinking about development. trying demonstrate methodology allowed us reach our results, following lines.
منابع مشابه
the relationship between academic self-concept and academic achievement in english and general subjects of the students of high school
according to research, academic self-concept and academic achievement are mutually interdependent. in the present study, the aim was to determine the relationship between the academic self-concept and the academic achievement of students in english as a foreign language and general subjects. the participants were 320 students studying in 4th grade of high school in three cities of noor, nowshah...
Democratic Republic of Congo
Programme outcome: The IFRC 2010 support strategy and plan for the Red Cross of the Democratic Republic of Congo (Red Cross of DRC) was based on the National Society’s (NS) 20092013 Strategic Development Plan and was designed to help the NS provide vulnerable communities with life-saving first aid, clean water and sanitation, health and hygiene promotion, HIV/AIDS support, sexual and gender bas...
متن کاملthe clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance
با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...
data mining rules and classification methods in insurance: the case of collision insurance
assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Technology
سال: 2022
ISSN: ['2331-6063', '2331-6071']
DOI: https://doi.org/10.13189/csit.2022.100201