Question: , 2 . . . . - upts ) - Concordia CSSE Drone Cipher Program Note: You are not allowed to use array ( s

,2....- upts)- Concordia CSSE Drone Cipher Program
Note: You are not allowed to use array(s) for this first question.
Gina Cody School of Engineering and Computer Science drones surveying equipment and software research lab heard that you are taking OOP course and wants to hire you as a research intern; one of your key responsibilities includes sending and receiving text instructions/messages, that should not be comprehend if the drone is intercepted. Your supervisor wants to charge you with the sole responsibility of designing the drone algorithm and developing this same algorithm using Java Programming Language.
Fundamentally, this algorithm computes the encoded information/text by pruning and preprocessing any given string/text to ensure that the first and last characters of the string/text is a non-space character; thereafter, it counts the number of characters in the string/text. If the preprocessed string/text is comprised of an even number of characters; then, the new encoded string will consist of the reverse of second half of the text, and the first half of the original text. If the preprocessed string/text is comprised of an odd number of characters; then, the new encoded string will be composed of (i) the reverse of second half of the string after the middle character, (ii) the middle character of original string, (iii) the reverse of the first half of the original string before the middle character. Please see Table 1 below for pictorial explanation.
Table 1. Procedure for Concordia CSSE Drone Cipher algorithm.
Page 2 of 9
@Dr. Nora Houari
Therefore, write a Java class/program such that your source code will accomplish the following:
Name of the class/program: A3_Q1.
Display a welcome/salutation message to the user of the program.
Display a prompt message for the user to enter a string/text for the cipher algorithm.
Preprocess the input string/text as described above; and compute the corresponding ciphertext based on your proposed encoded algorithm.
Additionally, note that: if an output ciphertext of an odd length ONLY is passed through our proposed algorithm and program, then the ciphertext shall be decoded to reveal the original/plain text.
Finally, display a complimentary-close message as follows: Thank you for your contribution to Concordia CSSE Drone Cipher Project.
The following are sample screenshots to illustrate the expected behavior of your program. Your program must display the same information, using the same format, depicted in the screenshots below.
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
Keep right
Kindly find below your cipher message output:
thgirKeep
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
elbisiv toN
Kindly find below your cipher message output:
Not visible
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Figure 3. Sample-3 output of Question 1
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
A big black object is moving!
Kindly find below your cipher message output:
! gnivom si tcejbo kcalb gib A
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Figure 4. Sample-4 output of Question 1
Welcome to Concordia CSSE Drone Cipher Program:
+++++++++++++++++++++++++++++++++++++++++++++++
Please enter your plain message below:
!gnivom si tcejbo kcalb gib A
Kindly find below your cipher message output:
A big black object is moving!
Thank you for your contribution to Concordia CSSE Drone Cipher Project.
Figure 5. Sample-5 output of Question 1
 ,2....- upts)- Concordia CSSE Drone Cipher Program Note: You are not

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!