This paper deals with the tidings of cryptography in history, how it has played a vital role in World War -1, World War-2. It also deals with the Substitution, Transposition Cryptographic techniques and Steganography principles which can be used to maintain the confidentiality of computerized and none computerized information files.
The objective of this paper is to conduct a controlled experiment with the three requirements prioritization techniques: Numerical Assignment (NA), Analytic Hierarchy Process (AHP) and Extensive Numerical Assignment (ENA), each based on ordinal, ratio and interval scales respectively. NA and AHP are widely used traditional requirements prioritization techniques. ENA is a novel technique introduced by the authors, which acknowledges the uncertain and incomplete nature of human judgment about requirements priorities, which are in turn uncertain guesses about the upcoming product. The aim of the experiment is to examine the three techniques using various objective and subjective measures like number of decisions, time consumption, ease of use, attractiveness, scalability and reprioritizability. The experiment was executed by prioritizing the requirements of a university website system with students as participants in the experiment. The results of the experiment proved that ENA transcends NA and AHP.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.