Search In this Thesis
   Search In this Thesis  
العنوان
Multi - modal system for Data analysis and optimization to maximize the usage of the enterprise electronic records /
المؤلف
Eltengy, Ahmed Hussein Ali.
هيئة الاعداد
باحث / أحمد حسين على أحمد التنجى
مشرف / محمد شريف مصطفى القصاصى
مشرف / على الشربيني تقى الدين
مشرف / سماء محمد صبري
مناقش / محمد محمد فؤاد
مناقش / حازم مختار مختار البكرى
مناقش / محمد شريف مصطفى القصاصى
مناقش / على الشربينى تقى الدين
الموضوع
Data mining. Information science. Computer science. Computer organization. Electronic records - Management. Records - Management.
تاريخ النشر
2019.
عدد الصفحات
98 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
Information Systems
الناشر
تاريخ الإجازة
1/10/2019
مكان الإجازة
جامعة المنصورة - كلية الحاسبات والمعلومات - نظم المعلومات
الفهرس
Only 14 pages are availabe for public view

from 123

from 123

Abstract

With the rapid development of digital data exchange, security has become a major concern in the world today. It has become important to secure data, and the process of securing information is necessary when stored or transmitted through open networks such as the Internet. To secure information and data sent and received over wired and wireless networks, there are many encryption algorithms such as Advanced Encryption Standard (AES), Blowfish, Rivest, Shamir, and Adleman (RSA). But these algorithms face many difficulties and are flawed. The most important disadvantages are that the time is in a direct relationship with safety to increase the complexity and difficulty of the algorithm requires more time to process encryption and decryption process. There is a need for encrypting the multi-modal system for data analysis and optimization to maximize the usage of the enterprise electronic records. So that a new proposed algorithm has come up with a new way to encrypt binary data, which is the simplest form of data consisting of zero and one. This new algorithm converts the target message from zero to one and vice versa using mathematical equations based on the truth table attached to the algorithm, where the secret key Abstract v and the target message are the two main elements. This algorithm is characterized by a secret key with unlimited length and a secondary secret key added to the algorithm. Using a secret sub-key helps create a different encrypted message each time even if the same secret key and the same sub-key are used and the same plain text, which increases the confidentiality and strength of the algorithm. Through the
performance and statistical tests of the algorithm, it was found that it is about 20% faster in encryption and decryption processes than other algorithms. This algorithm provides all the requirements of confidentiality and strength to address intruders efficiently and has a high-security analysis such as the analysis of the main space and statistical analysis. Therefore, the proposed algorithm can be used to secure any applications for embedded software or algorithms. A new application is designed, that encrypts data on the location and movements of military personnel or civilian researchers within an area on a specific mission. Using two transmission circuits and one receiver that is controlled by a microcontroller programmed by the encryption algorithm.