2020 International Seminar on Application for Technology of Information and Communication (iSemantic),
Journal Year:
2023,
Volume and Issue:
unknown, P. 490 - 495
Published: Sept. 16, 2023
Data
Encryption
Standard
(DES)
is
a
symmetric
encryption
algorithm
that
uses
single
key
to
encrypt
and
decrypt
information.
In
addition,
the
cipher
text
will
be
hidden
inside
an
image
using
Stepic.
DES
use
decryption
decrypt.
It
secure
maintain
speed
of
decryption.
The
result
this
study
lowest
error
we
got
as
Mean
Square
Error
(MSE)
0.00%
inversely
proportional
with
Peak
Signal
Noise
Ratio
(PSNR)
Avalanche
79.36%
34.91%
in
order
not
stable
for
Effect
(AVA).
Inversely
length
image,
longest
hidden,
more
changes
get
highest
Unified
Average
Changing
Intensity
(UACI)
Number
Pixels
Change
Rate
(NPCR)
biggest
size
43.47%
UACI
99.87%
NPCR.
Big
Data
is
a
collection
of
technologies
developed
to
store,
analyze
and
manage
this
data.
It
macro
tool.
Today
it
used
in
fields
as
diverse
medicine,
agriculture,
gambling
environmental
protection.
Machine
learning,
forecasting
Companies
use
big
data
streamline
their
marketing
campaigns
techniques.
Modeling
other
advanced
analytics
applications
enable
organizations
generate
valuable
insights.
machine
learning.
Programs
cannot
balance
large
any
particular
database.
When
datasets
are
size,
velocity,
volume,
the
following
three
distinct
dimensions
constitute
"big
data."
Examples
include
stock
markets,
social
media
platforms,
jet
engines.
But
growing
exponentially
with
time.
Traditional
management
tools
store
or
process
efficiently.
scale
technology
by
Story,
Analysis
Manoj,
Macro-Tool.
Find
patterns
exploding
confusion
information
about
smart
design,
however,
implying
that
various
structures
structured,
whether
includes
amount
information,
speed
which
generated
collected,
variety
scope
related
points.
In
past,
was
collected
only
from
spreadsheets
databases
large,
disparate
grew
at
an
ever-increasing
rate.
Very
complex
refers
amounts
for
sets
impossible
traditional
processing
applications.
Is
software
configuration
handle
problem?
Apache
application
storing
analyzing
Analytical
techniques
against
very
heterogeneous
containing
varying
data,
help
businesses
gain
insights
today's
massive
sources.
Defined
extraction.
People,
companies
more
machines
now
developing
be
handled
tools.
designed
discover
chaos
explode
order
design
solutions.
Discover Sustainability,
Journal Year:
2024,
Volume and Issue:
5(1)
Published: June 25, 2024
Abstract
Data
centers
are
a
major
source
of
carbon
emissions
and
subsequently
contributing
to
global
footprints.
Keeping
in
view
providing
sustainable
solution
society,
we
have
analyzed
various
factors
that
can
help
achieve
neutrality
maximum
sustainability.
Our
study
pointed
towards
the
need
follow
approach
for
incoming
workflow
throughout
life-cycle
centers.
We
workloads
be
segregated
before
assigning
them
data
so
energy-efficient
resource
allocation
could
done.
This
paper
demonstrates
unsupervised
learning
techniques
cluster
cloud
workloads.
The
heterogeneous
were
characterized
using
machine
approaches
appropriate
clusters
crafted.
For
analysis,
Google
Cluster
Dataset
is
used.
In
order
improve
accuracy,
normalized,
random
samples
selected
clustering.
algorithms
applied
able
successfully
determine
further
used
scheduling.
The
widespread
use
of
distributed
systems
has
led
to
a
growing
concern
over
their
security.
With
the
increasing
number
devices
connected
Internet,
risk
security
breaches
in
these
become
major
issue.
In
this
chapter,
we
will
explore
various
threats
that
face,
including
hacking,
malware,
and
denial
service
attacks.
We
also
examine
current
state
standards
protocols
for
systems,
those
proposed
by
industry
groups
government
organizations.
addition,
discuss
challenges
wireless
communication
integration
into
existing
networks.
chapter
cover
access
control
methods,
such
as
role-based
(RBAC),
discretionary
(DAC),
mandatory
(MAC),
can
be
applied
systems.
Finally,
summarize
key
issues
securing
future
directions
research
development.
Digital
communication
is
the
physical
transfer
of
data
through
a
point-to-point
or
multidisciplinary
channel.
This
to
exchange
private
messages.
plays
an
important
role
in
today's
world
electronics.
The
rate
digital
depends
on
its
characteristics
provides
seamless
experience
customers
and
partners
direct
AI
chat
bots
automation
various
forms
such
as
makes
easier
for
access
companies
simultaneously.
It's
convenient,
it's
easy,
cheap,
fast
because
it
can
be
done
over
long
distances
Internet
other
things
via
hardware
processing
circuits.
Physical
transmission
channels
more
flexible
than
analog
with
higher
energy
consumption.
It
required
bandwidth
compared
systems.
PLoS ONE,
Journal Year:
2023,
Volume and Issue:
18(9), P. e0290831 - e0290831
Published: Sept. 7, 2023
The
cloud
is
becoming
a
hub
for
sensitive
data
as
technology
develops,
making
it
increasingly
vulnerable,
especially
more
people
get
access.
Data
should
be
protected
and
secured
since
larger
number
of
individuals
utilize
the
variety
purposes.
Confidentiality
privacy
attained
through
use
cryptographic
techniques.
While
each
method
completes
same
objective,
they
all
employ
different
amounts
CPU,
memory,
throughput,
encryption,
decryption
times.
It
necessary
to
contrast
various
possibilities
in
order
choose
optimal
algorithm.
An
integrated
size
5n*102
(KB
(∈
1,2,4,10,20,40)
evaluated
this
article.
Performance
metrics
including
run
time,
memory
use,
throughput
time
were
used
comparison.
To
determine
effectiveness
technique,
sizes
fifteen
(15)
times,
mean
simulation
results
then
reported.
In
terms
trend,
NCS
superior
other
algorithms
according
Friedman's
test
Bonferroni's
Post
Hoc
test.