scholarly journals IMPLEMENTASI ALGORITMA CAESAR CIPHER UNTUK KEAMANAN DATA PADA KARTU UJIAN (Studi Kasus : SMK Model Patriot IV Ciawigebang Kab.Kuningan)

2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Andriyanto Jurnal

AbstrakSaat ini, semua kegiatan sudah berbasis digital hal ini menimbulkan sebuah permasalahan baru dimana kejahatan sudah beralih menjadi kejahatan digital. Keamanan data berperan penting dalam menjaga kerahasiaan informasi agar tidak jatuh ke tangan yang salah. SMK Patriot Model IV Ciawigebang memiliki data yang cukup banyak untuk diolah salah satunya data akademik siswa dimana data tersebut sebetulnya sudah menggunakan komputer. Akan tetapi pada pelaksanaan proses ujian masih dilakukan secara semi-manual dimana peserta diberikan sebuah kertas ujian yang berisi identitas siswa tersebut sedangkan jadwal ujian harus mereka lihat pada papan pengumuman. Hal ini dirasakan kurang efisien dalam segi waktu dan kurang optimal dikarenakan penggunaan space/tempat untuk menempelkan jadwal. Kertas Ujian yang diberikan kepada siswa pun rentan akan adanya pemalsuan karena tidak adanya penanda khusus yang tidak mudah ditiru. Oleh sebab itu, pada penelitian ini dikembangkan kartu ujian dimana pada kartu tersebut berisi qr code yang telah diekripsi menggunakan Algoritma Caesar Cipher. Ketika siswa/guru ingin melihat data siswa maupun jadwal ujian, mereka melakukan scan qrcode melalui android dengan cara kerja qr code tersebut akan digenerate oleh sistem dan dideskripsikan menggunakan algoritma Caesar Cipher kemudian dicocokan dengan data yang berada di database, jika cocok maka akan menampilkan data siswa beserta jadwal ujiannya. Sedangkan dari sisi backend, admin dapat mengelola data siswa dan jadwal ujian menggunakan aplikasi web. Sistem ini dirancang menggunakan UML kemudian diimplementasikan ke dalam web dan android. Hasil akhir dari aplikasi ini diharapkan dapat membantu pihak sekolah maupun siswa dalam mengelola data siswa serta data ujian.Kata Kunci� Kartu Ujian,QrCode, Enkripsi, Algoritma Caesar CipherAbstractAt present, all activities are digital based, this raises a new problem where crime has turned into digital crime. Data security plays an important role in maintaining the confidentiality of information so it does not fall into the wrong hands. Ciawigebang Model IV Patriot Vocational School has quite a lot of data to be processed, one of which is student academic data where the data is actually already using a computer. However, the implementation of the examination process is still done semi-manually where participants are given an examination paper containing the student's identity while the exam schedule must be seen on the notice board. This is felt to be less efficient in terms of time and less than optimal due to the use of space / place to stick to the schedule. Paper Exams given to students are also vulnerable to forgery because there are no special markers that are not easily imitated. Therefore, in this study an examination card was developed in which the card contained a qr code that had been encrypted using the Caesar Cipher Algorithm. When students / teachers want to see student data and exam schedules, they do a qrcode scan through Android by way of working the qr code will be generated by the system and described using the Caesar Cipher algorithm and then matched to the data in the database, if suitable it will display student data along with the exam schedule. While from the backend side, the admin can manage student data and exam schedules using a web application. This system is designed using UML and then implemented into the web and android. The final results of this application are expected to help the school and students in managing student data and exam data.Keywords� Exam Card, Qr Code, Encription, Caesar Cipher Algorithm

Author(s):  
Gabriel Chibuye ◽  
Jackson Phiri ◽  
Faustin Banda

The University of Zambia like any public institution has a lot of infrastructure which require maintenance and management. There’s however uncertainty of the utility lines locations and their depths. This causes destruction of water pipes and sewer lines when undertaking new constructions or any excavations. The lack of accurate location of underground and un-updated lines makes maintenance, management and planning of the utilities very difficult.  Therefore this study aimed to build a framework for Managing Sewer and Water Networks Using Sensor Networks at the University of Zambia. The Resident Engineer’s office only has some old scanned pdf sketches of both sewer and water networks. The field engineers locate most lines and other facilities using memory and experience. The methodology involved understating the existing operations of the Resident engineer’s office to ascertain the user needs. These needs formed the basis of the research, the development and design of the prototype of the Webbased Framework. Data Collection tools included Records (old maps) and Secondary Data (satellite images), Field Observations, Interviews and field Surveys. A presurvey (Reconnaissance Survey) was done to have an idea of the existing infrastructure and a more accurate survey was done using GPS GNSS equipment. The raw data was processed and GIS software was used to merge the collected datasets and the existing data. Georeferencing of existing maps and the satellite images was done using the GPS field data in ArcMap. New shapefiles were created from the point data from the survey and from digitising the existing scanned maps. New maps of the water and sewer networks (using the new shapefiles) and satellite imagery were created. A 15 digit coding system was created and was used to assign unique identification numbers and extra attribute information to the water and sewer network shapefiles. A QR code was generated for each node and the serial number recorded. Tagging was done using the QR code for each structure. All the shapefiles were loaded into a PostGreSQL spatial database and were used as input in the Web GIS application. The web application had some tools imbedded in it including; query, measure, add point/vertex, zoom, view, search and identify. Using internet of things (IOT) technology, water level sensors were placed on some critical manholes to help with the monitoring of the sewerage network. The system can therefore be used for identification of any infrastructure by scanning the QR code and a map showing the structure is seen online by the field technicians. Monitoring of the sewer system can be done using the sensors and ultimately the framework will ease the management of the water and sewer systems at the University of Zambia.


2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


2020 ◽  
Author(s):  
Darshak Mota ◽  
Neel Zadafiya ◽  
Jinan Fiaidhi

Java Spring is an application development framework for enterprise Java. It is an open source platform which is used to develop robust Java application easily. Spring can also be performed using MVC structure. The MVC architecture is based on Model View and Controller techniques, where the project structure or code is divided into three parts or sections which helps to categorize the code files and other files in an organized form. Model, View and Controller code are interrelated and often passes and fetches information from each other without having to put all code in a single file which can make testing the program easy. Testing the application while and after development is an integral part of the Software Development Life Cycle (SDLC). Different techniques have been used to test the web application which is developed using Java Spring MVC architecture. And compares the results among all the three different techniques used to test the web application.


2021 ◽  
Vol 13 (2) ◽  
pp. 50
Author(s):  
Hamed Z. Jahromi ◽  
Declan Delaney ◽  
Andrew Hines

Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the Above-the-fold (ATF) time. SpeedIndex (SI) has been widely used to estimate perceived web page loading speed of ATF content and a proxy metric for Web QoE estimation. Web application developers have been actively introducing innovative interactive features, such as animated and multimedia content, aiming to capture the users’ attention and improve the functionality and utility of the web applications. However, the literature shows that, for the websites with animated content, the estimated ATF time using the state-of-the-art metrics may not accurately match completed ATF time as perceived by users. This study introduces a new metric, Plausibly Complete Time (PCT), that estimates ATF time for a user’s perception of websites with and without animations. PCT can be integrated with SI and web QoE models. The accuracy of the proposed metric is evaluated based on two publicly available datasets. The proposed metric holds a high positive Spearman’s correlation (rs=0.89) with the Perceived ATF reported by the users for websites with and without animated content. This study demonstrates that using PCT as a KPI in QoE estimation models can improve the robustness of QoE estimation in comparison to using the state-of-the-art ATF time metric. Furthermore, experimental result showed that the estimation of SI using PCT improves the robustness of SI for websites with animated content. The PCT estimation allows web application designers to identify where poor design has significantly increased ATF time and refactor their implementation before it impacts end-user experience.


BMJ Open ◽  
2021 ◽  
Vol 11 (2) ◽  
pp. e043328
Author(s):  
Ildikó Gágyor ◽  
Katrin Rentzsch ◽  
Stephanie Strube-Plaschke ◽  
Wolfgang Himmel

ObjectivesTo validate the urinary tract infection-Symptom and Impairment Questionnaire (UTI-SIQ-8), a questionnaire that consists of four items to assess the symptom severity for dysuria, urgency, frequenc, and low abdominal pain and four items to assess the resulting impairment of activity by UTIs.DesignProspective observation study.SettingGerman primary care practices.ParticipantsAn unselected population of women with UTI. Women could participate online via a web application for smartphones, smartwatches and tablets or use a paper-and-pencil version.Main outcomesPsychometric properties of the UTI-SIQ-8 regarding reliability, validity and sensitivity to change by using factor analysis and multilevel and network analysis.ResultsData from 120 women with a total of 769 symptom reports across 7 days of measurement were analysed. The majority of the participating patients (87/120) used the web application via smartphones or other devices. The reliability of the UTI-SIQ-8 was high, with Cronbach’s alpha of .86 at intake; convergent and discriminant validity was satisfactory. Intraclass correlation demonstrated high sensitivity to change, with 68% of the total variance being due to time differences. These daily changes in an individual’s symptoms moved parallel with daily changes in the EQ-5D-5L (b=1.68, SE=0.12, p<0.001) and the visual analogue scale (b=0.03, SE=0.003, p<0.001), also highlighting convergent validity with respect to daily changes in symptom severity.ConclusionsThe present findings support the UTI-SIQ-8 questionnaire as an economic, reliable and valid instrument for the assessment of symptom severity and symptom change in women with uncomplicated UTI. The web application helped patients to report symptoms on a daily basis. These findings may encourage primary care physicians to use the UTI-SIQ-8 in their daily practice and researchers to apply it to studies involving patients with uncomplicated UTI.


2016 ◽  
Vol 28 (2) ◽  
pp. 241-251 ◽  
Author(s):  
Luciane Lena Pessanha Monteiro ◽  
Mark Douglas de Azevedo Jacyntho

The study addresses the use of the Semantic Web and Linked Data principles proposed by the World Wide Web Consortium for the development of Web application for semantic management of scanned documents. The main goal is to record scanned documents describing them in a way the machine is able to understand and process them, filtering content and assisting us in searching for such documents when a decision-making process is in course. To this end, machine-understandable metadata, created through the use of reference Linked Data ontologies, are associated to documents, creating a knowledge base. To further enrich the process, (semi)automatic mashup of these metadata with data from the new Web of Linked Data is carried out, considerably increasing the scope of the knowledge base and enabling to extract new data related to the content of stored documents from the Web and combine them, without the user making any effort or perceiving the complexity of the whole process.


i-com ◽  
2008 ◽  
Vol 6 (3/2007) ◽  
pp. 23-29 ◽  
Author(s):  
Birgit Bomsdorf

SummaryTask modelling has entered the development process of web applications, strengthening the usage-centred view within the early steps in Web-Engineering (WE). In current approaches, however, this view is not kept up during subsequent activities to the same degree as this is the case in the field of Human-Computer-Interaction (HCI). The modelling approach presented in this contribution combines models as known from WE with models used in HCI to change this situation. Basically the WE-HCI-integration is supported by combining task and object models as known from HCI with conceptual modelling known from WE. In this paper, the main focus is on the WebTaskModel, a task model adapted to web application concerns, and its contribution towards a task-related web user interface. The main difference to existing task models is the build-time and run-time usage of a generic task lifecycle. Hereby the description of exceptions and erroneous situations during task performance (caused by, e.g., the stateless protocol or Browser interaction) is enabled and at the same time clearly separated from the flow of correct action.


2019 ◽  
Vol 8 (4) ◽  
pp. 2827-2833

The SQL injection attack (SQLIA) occurred when the attacker integrating a code of a malicious SQL query into a valid query statement via a non-valid input. As a result the relational database management system will trigger these malicious query that cause to SQL injection attack. After successful execution, it may interrupts the CIA (confidentiality, integrity and availability) of web API. The vulnerability of Web Application Programming Interface (API) is the prior concern for any programming. The Web API is mainly based of Simple Object Access Protocol (SOAP) protocol which provide its own security and Representational State Transfer (REST) is provide the architectural style to security measures form transport layer. Most of the time developers or newly programmers does not follow the standards of safe programming and forget to validate their input fields in the form. This vulnerability in the web API opens the door for the threats and it’s become a cake walk for the attacker to exploit the database associated with the web API. The objective of paper is to automate the detection of SQL injection attack and secure the poorly coded web API access through large network traffic. The Snort and Moloch approaches are used to develop the hybrid model for auto detection as well as analyze the SQL injection attack for the prototype system


Sign in / Sign up

Export Citation Format

Share Document