International Journal of Computer Networks and Communications Security

Volume 9, Issue 3, March 2020

 

 

Mapping Character Position Based Cryptographic algorithm with Numerical Conversions
 

Mapping Character Position Based Cryptographic algorithm with Numerical Conversions

Pages: 56-59 (4) | [Full Text] PDF (361 KB)
M Moon, AKMTI Tanim, MZ Shoykot, MN Sultan, UAME Ali, E Ali
Faculty of Computer Science and Engineering, Hajee Mohammad Danesh Science and Technology University (HSTU), Dinajpur-5200, Bangladesh

Abstract -
Security of data is the challenging aspects of modern information technology. An improved cryptology algorithm is introduced in this paper to offer comparatively higher security. We divide our message into several blocks as 8bits per block then convert each character into its corresponding positional number, where uppercase letters, lowercase letters, digits and special characters are mapped into some range of numbers. Then replace each decimal number into their binary equivalent consisting of 7-bits. Then combine 8 blocks of binary numbers into a single string. After performing some operation on the data, we get the final encrypted message. For decryption, we use same method in reverse way. Taking the decrypted message we perform some basic operation as replacing by binary or equivalent decimal and position then we get the original message back. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.
 
Index Terms - Cryptography, Encryption and decryption, Position based Cryptography, Higher level of security, ASCII conversions, Numerical Conversions

Citation - M Moon, AKMTI Tanim, MZ Shoykot, MN Sultan, UAME Ali, E Ali. "Mapping Character Position Based Cryptographic algorithm with Numerical Conversions." International Journal of Computer Science and Software Engineering 9, no. 3 (2020): 56-59.

An Impact of CS Undergraduate Programming Skill on Career Development
 

An Impact of CS Undergraduate Programming Skill on Career Development

Pages: 60-63 (4) | [Full Text] PDF (444 KB)
W Titthasiri
Department of Computer Science, Rangsit University, PathumThani, 12110, Thailand

Abstract -
This study serves as a pilot study for a larger future study. The purpose of this pilot study was to find a relationship between programming skill and CGPA of CS graduates. Ten ICT managers of ICT firms were interviewed and 802 CS graduates school records, from Rangsit University in Thailand were collected and analyzed. This pilot study reports the finding from both interviews and analysis of school records, detailing the critical skill-programming skill- of CS graduates, desirable in employment ICT workers. The results revealed that programming skill of CS graduates is today less than their academic performance. Consequently, ICT firms fail to fulfill the hopes of them. Finally, CS academic setting was discussed and proposed the roles of 3-levels-CS department chair, lecturers, and students-, playing to improve CS graduates programming skill. Therefore, knowledge, ability and skill of CS graduates would meet ICT firms requirements for future CS career development.
 
Index Terms - CGPA, programming skill, career development, CS graduate

Citation - W Titthasiri. "An Impact of CS Undergraduate Programming Skill on Career Development." International Journal of Computer Science and Software Engineering 9, no. 3 (2020): 60-63.

A Graph Based Approach to Prioritization of Software Functional Requirements
 

A Graph Based Approach to Prioritization of Software Functional Requirements

Pages: 64-73 (10) | [Full Text] PDF (678 KB)
M Yaseen, A Mustapha, S Qureshi, A Khan, AU Rahman
Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia
SubHealth (Pvt.) Ltd, KPK, Peshawar, Paksitan
Department of Computer Science, Univeristy of Swat, Pakistan
Dapartment of Software Engineering, Comsats University Islamabad, Pakistan

Abstract -
Requirements prioritization plays important role for a successful requirements implementation. Functional requirements, in specific, represents the specification of behavior between the inputs and outputs. They are prioritized based on the high-level requirements of the system and subsystems functionalities, as well as the type of software, expected users and the type of system where the software is used. Nonetheless, prioritization of functional requirements is very challenging considering a project where the requirements are huge. In practice, prioritization of functional requirements highly depends on stakeholders preference for giving priorities in features selection instead of based on its internal structure and characteristics. This is because the key information in functional requirements concern on business processes, security, performance, data migration and conversion. This paper proposes a graph-based approach for prioritizing functional requirements using directed acyclic graphs for relating requirements with one another on the basis of its importance to overall project and how much it is required for other requirements.The proposed approach is then evaluated in terms of total time estimation to project completion. The experimental results showed that the graph-based approach is able to effectively prioritize functional requirements with lower estimated project completion time as compared to non-prioritized requirements. The approach will help software vendors to deliver projects well within the total project duration.
 
Index Terms - Requirement Prioritization, Functional Require-ments, Directed Graph

Citation - M Yaseen, A Mustapha, S Qureshi, A Khan, AU Rahman. "A Graph Based Approach to Prioritization of Software Functional Requirements." International Journal of Computer Science and Software Engineering 9, no. 3 (2020): 64-73.