Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

, 2 . . . . - upts ) - Concordia CSSE Drone Cipher Program Note: You are not allowed to use array ( s

,2....- upts)- Concordia CSSE Drone Cipher Program
Note: You are not allowed to use array(s) for this first question.
Gina Cody School of Engineering and Computer Science drones surveying equipment and software research lab heard that you are taking OOP course and wants to hire you as a research intern; one of your key responsibilities includes sending and receiving text instructions/messages, that should not be comprehend if the drone is intercepted. Your supervisor wants to charge you with the sole responsibility of designing the drone algorithm and developing this same algorithm using Java Programming Language.
Fundamentally, this algorithm computes the encoded information/text by pruning and preprocessing any given string/text to ensure that the first and last characters of the string/text is a non-space character; thereafter, it counts the number of characters in the string/text. If the preprocessed string/text is comprised of an even number of characters; then, the new encoded string will consist of the reverse of second half of the text, and the first half of the original text. If the preprocessed string/text is comprised of an odd number of characters; then, the new encoded string will be composed of (i) the reverse of second half of the string after the middle character, (ii) the middle character of original string, (iii) the reverse of the first half of the original string before the middle character. Please see Table 1 below for pictorial explanation.
Table 1. Procedure for Concordia CSSE Drone Cipher algorithm.
Page 2 of 9
@Dr. Nora Houari
Therefore, write a Java class/program such that your source code will accomplish the following:
Name of the class/program: A3_Q1.
Display a welcome/salutation message to the user of the program.
Display a prompt message for the user to enter a string/text for the cipher algorithm.
Preprocess the input string/text as described above; and compute the corresponding ciphertext based on your proposed encoded algorithm.
Additionally, note that: if an output ciphertext of an odd length ONLY is passed through our proposed algorithm and program, then the ciphertext shall be decoded to reveal the original/plain text.
Finally, display a complimentary-close message as follows: Thank you for your contribution to Concordia CSSE Drone Cipher Project.
The following are sample screenshots to illustrate the expected behavior of your program. Your program must display the same information, using the same format, depicted in the screenshots below.
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
Keep right
Kindly find below your cipher message output:
thgirKeep
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
elbisiv toN
Kindly find below your cipher message output:
Not visible
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Figure 3. Sample-3 output of Question 1
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
A big black object is moving!
Kindly find below your cipher message output:
! gnivom si tcejbo kcalb gib A
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Figure 4. Sample-4 output of Question 1
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
!gnivom si tcejbo kcalb gib A
Kindly find below your cipher message output:
A big black object is moving!
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Figure 5. Sample-5 output of Question 1
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beyond Greed And Fear Understanding Behavioral Finance And The Psychology Of Investing

Authors: Hersh Shefrin

1st Edition

0195161211, 978-0195161212

Students also viewed these Databases questions

Question

Which styles could you use more and why?

Answered: 1 week ago