In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. In internet traffic encryption, symmetrical block chips play an essential role. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) ensure privacy encryption underlying data protection standards. The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. DES and AES hardware implementation has many advantages, such as increased performance and improved safety. This paper provides an exhaustive study of the implementation by DES and AES of field programming gate arrays (FPGAs) using both DES and AES. Since FPGAs can be defined as just one mission, computers are superior to them.
Cloud computing has swiftly established itself as the norm in its field as a result of the advantages described above. In an attempt to reduce the amount of time spent on infrastructure upkeep, an increasing number of businesses are moving their operations to the cloud. As a result, maintaining a cloud environment has proved to be exceedingly difficult. It is necessary to have an efficient cloud monitoring system in order to reduce the workload associated with administration and improve cloud operation. The cloud monitoring service is beneficial since it has the potential to improve performance and make administration easier. The administration of Quality of Service (QoS) parameters for cloud-hosted, virtualized, and physical services and applications is one of the most important responsibilities of cloud monitoring. As a result, cloud management software retains a record of both actions and services, and it also conducts dynamic setups of the cloud in order to increase operational effectiveness. The performance of businesses and businesses as a whole was examined in this article, as was the influence that cloud-ready programs and tools have on that performance, as well as the advantages that may be obtained from adopting such programs and products.
It's been clearer over the last two decades that computer science plays a crucial role in the growth of every company. With each passing cycle, the IT industry blossoms a brand-new subfield. The Internet of Things (IoT) refers to the idea of connecting any device to the Internet in order to interact with the consumer and convert it into an intelligent device; this is a relatively new concept in the realm of information technology (IT) and the Internet, but it is gaining popularity and importance in people's daily lives. The Internet of Things is predicted to play a pivotal role in the development of business IT infrastructure. With the help of IoT, we can link billions of smart gadgets that can talk to one another in an automated fashion. One of the most rapidly expanding fields in computer history, with an expected 50 billion devices by the end of 2020. Security techniques, such as encryption, authentication, access control, network security, and application security, are rendered useless when applied to Internet of Things (IoT) devices because of these inherent weaknesses. The Internet of Things (IoT) has attracted the attention of many academics and industry leaders, who have published studies and made statements on the significance of IoT architectural layers for corporate systems (ESs). This literature study included a wide variety of studies that implemented and developed IoT technology in several human domains, including healthcare, smart homes and cities, assisted charities, and monitoring systems. The article also detailed the computers and programs that facilitated each study. Plus, the reliable algorithm used in the research articles' tests and analyses of data. Lastly, drawing parallels between these publications helps to provide insight on the difficulties and possibilities facing potential IoT impact researchers in the industrial sector.
Given the world's current situation with the COVID-19 pandemic, several businesses have recently encouraged remote working from home. A variety of benefits are provided by cloud computing, including simplified IT and management, secure Internet-based remote access from practically anywhere, and cost savings. As a result, more people use the cloud, but there are also increasing cyber-attacks on cloud networks. However, several companies and organizations, who do not know the security threats that Cloud systems pose, are still worried about using the cloud. Reports previously released by researchers from academia, business, and standard organizations proposed solutions to these problems. This paper examines state-of-the-art papers on topics, challenges to requirements, and identified security system vulnerabilities. In addition, we will review the different components and the security and privacy concerns of current cloud computing systems. Finally, we present a variety of security threats targeting and addressing cloud storage services. In particular, we raise awareness on security issues that cloud organizations including cloud service providers, data owners and cloud users face and address them.
Recently, development an efficient Tourism Management System (TMS), become an important issue in tourism toward industry. Internet act one of most common role in popularity information and data to the tourists by uploaded this information include the tourism places, distance through the World Wide Web. Tourism Management System can be understanding as a complete tourist fully integrated tourism web site. Such website or web application covers all the areas required, in order to display and view wide range of information for one place, to rapid serve connection between manager of place with tourism. It is the process of defining the purpose, vision, and goals of an organization, formulating policies and plans, and then allocating resources to execute the policies and plans, projects, and programs developed to meet those objectives. The major goal of these projects is for better giving a confederacy in managing, logging and logout, complaints and reports. Through the cultural consumption of visitors, tourism types have played a significant influence in the development of regional and local economies. An intangible purpose to build and promote cities and nations through promotion is addressed by a creative tourist system from a new paradigm. Economic, social, political, and cultural factors have all increased their regard for originality and inventiveness as a result of this development. The study attempts to clarifies and displayed various types of systems used by various tourism authorities had a positive possible effect on their operations by making tasks easier for their employees. Furthermore, the study discusses the main differences of these studies by comparing between some of these studies in order to gain the base benefices when new researcher want to make new TMS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.