Utilization of prime numbers in encoding and decoding messages (Record no. 74412)

MARC details
000 -LEADER
fixed length control field 02220nam a22003017i 4500
003 - CONTROL NUMBER IDENTIFIER
control field URS
003 - CONTROL NUMBER IDENTIFIER
control field URS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240416181548.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161205b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency URS
Language of cataloging eng
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number LB 1043.5
Item number .Ut6 2014
245 ## - TITLE STATEMENT
Title Utilization of prime numbers in encoding and decoding messages
Statement of responsibility, etc. Shenna Mae T. Ramos ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2014
300 ## - PHYSICAL DESCRIPTION
Extent 57 leaves :
Other physical details illustrations ;
Dimensions 28 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
502 ## - DISSERTATION NOTE
Degree type Thesis (Bachelor of Science in Mathematics) -- University of Rizal System-Morong.
520 ## - SUMMARY, ETC.
Summary, etc. EXECUTIVE SUMMARY: This study was conducted to develop a process on the utilization of prime members in encoding and decoding messages and to determine the level of acceptability of the said process. At first, the researchers had a difficulty in finding out how it could be done, but with constant reading and a deeper thinking they were able to find the solution they were longing for. To obtain their goal, the researchers studied the principle of public key crytography. They developed an algorithm based on the RSA process but differ in function. As they developed the algorithm, they applied it in encoding and decoding messages. In the last part of the study, the researchers utilized a questionnaire checklist in order to determine the level of acceptability of the developed process. The findings revealed that the developed process is very much acceptable in both terms (accuracy and applicability) as perceived by the respondents. They found out that the developed process was accurate and can easily be understood by the respondents. The study revealed that computation process is quite tedious. It was recommended that the data based program be made to make the computation easier.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Teaching -- Aids and devices.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ramos, Catherine T.
Relator term author
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Dimatera, Rachel G.
Relator term author
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Dela Cruz, Lavinia F.
Relator term author
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Campo, Gerlie Mae C.
Relator term author
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Online Request for Student Unpublished Works
Uniform Resource Identifier <a href="https://forms.gle/7LqvGGkaDrUQqz429">https://forms.gle/7LqvGGkaDrUQqz429</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Theses and dissertations

No items available.

University of Rizal System
Email us at univlibservices@urs.edu.ph

Visit our Website www.urs.edu.ph/library