Sign up for an Award
Participate with your entry in one of our professional or student awards.
Sign up for an awardLearn more:
Unsupported browser
You are using an outdated browser. Please upgrade your browser to improve your experience.
How do we protect the information by hacking them?
Protection of information is necessary in secret operation. Protection of secret information leads to protection of strategy of the operation.The QK device with the ability to execute the two processes of coding and pictography, follows three important goals:
1- Alteration of information of system memory card
2- Restoration of correct information in the system memory card
3- Notification of hacked digital systems to the main user
According to practical goals of QK device, it connects with other digital systems by electromagnetic waves.
IUST
Tehran, Iran
Roya Mohamadiha,
IUST