International Journal of Computational Science and Engineering最新文献

筛选
英文 中文
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms 密码算法与高级密码算法的比较分析
IF 2
International Journal of Computational Science and Engineering Pub Date : 2015-01-30 DOI: 10.26472/IJCES.V1I1.20
Meghna H. Vekariya
{"title":"Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms","authors":"Meghna H. Vekariya","doi":"10.26472/IJCES.V1I1.20","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.20","url":null,"abstract":"Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"102 1","pages":"1-8"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87661219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Documenting Software Architectural Component and Connector with UML 2 用UML 2记录软件架构组件和连接器
IF 2
International Journal of Computational Science and Engineering Pub Date : 2015-01-30 DOI: 10.26472/IJCES.V1I1.19.G25
Vikram Agrawal
{"title":"Documenting Software Architectural Component and Connector with UML 2","authors":"Vikram Agrawal","doi":"10.26472/IJCES.V1I1.19.G25","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.19.G25","url":null,"abstract":"Earlierversions of the UML have been an out of depth for documenting software architectures like component, port, connector and system. Users have adopted conventions for representing architectural concepts using different grouping of UML modeling element. They can also create profiles to focus the UML. Changes incorporated in UML 2 have improved UML’s suitability for software architectural documentation, but UML is still an out of your depth for documenting some types of architectural information. In this paper, there is description of documenting component and connector using UML but in particular case, documenting architectural connectors and components remains problematic.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"16 1","pages":"32-38"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82478467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of security issues in Mobile Ad hoc Networks 移动自组织网络安全问题概述
IF 2
International Journal of Computational Science and Engineering Pub Date : 2015-01-30 DOI: 10.26472/IJCES.V1I1.16
Vikaram M. Agrawal, Hiral U. Chauhan
{"title":"An Overview of security issues in Mobile Ad hoc Networks","authors":"Vikaram M. Agrawal, Hiral U. Chauhan","doi":"10.26472/IJCES.V1I1.16","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.16","url":null,"abstract":"Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"39 1","pages":"9-17"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79388585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Secure Digital Signature Schemes based on Hash Functions 基于哈希函数的安全数字签名方案
IF 2
International Journal of Computational Science and Engineering Pub Date : 2015-01-30 DOI: 10.26472/IJCES.V1I1.18
P. Patel
{"title":"Secure Digital Signature Schemes based on Hash Functions","authors":"P. Patel","doi":"10.26472/IJCES.V1I1.18","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.18","url":null,"abstract":"One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"82 1","pages":"27-32"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79963194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A STUDY ON THE INFLUENCE OF JOB STRESS IN ORGANISATIONAL FACTORS 组织因素中工作压力的影响研究
IF 2
International Journal of Computational Science and Engineering Pub Date : 2014-11-25 DOI: 10.26472/IJCES.V1I3.33
A. Jacob, M. Rengaraj
{"title":"A STUDY ON THE INFLUENCE OF JOB STRESS IN ORGANISATIONAL FACTORS","authors":"A. Jacob, M. Rengaraj","doi":"10.26472/IJCES.V1I3.33","DOIUrl":"https://doi.org/10.26472/IJCES.V1I3.33","url":null,"abstract":"Today, occupational accidents are considered among the potential threats because of their serious humanitarian, economic, social, and environmental consequences. Occupational accidents and injuries are the third cause of mortality in world and the second one in Iran. In addition, the economic and environmental damages of occupational accidents are catastrophic too.According to International Labor Organization (ILO) report in 1999 the average estimated fatal occupational accident rate was 140/100 000 workers and the number of fatal accidents was 335000. Though the registered number of accidents in Iran cannot be a faultless account of all the accidents happened, but in 2000, about 12000 work related accidents have been registered by the Department of Social Security. Calculations indicated that approximately 345000 fatal occupational accidents occurred in 1998 and that over 260 million occupational accidents causing at least 3 days absence happened in the same year. This work aims to study the relation of occupational stress of workers and the accidents in a rice milling industry. The data was collected using questionnaire. The questionnaire contained 30 questions to measure the perception s of the employees about the management practices. A five point likert scale was used. This was prepared based on review of related literature .The contents of this draft questionnaire were discussed with senior safety professional in the industry. Data was analyzed using IBM SPSS Statistics 20 software. Descriptive statistics and correlations of the studied variables were first analyzed. Confirmatory factor analysis was used to verify the reliability of the management practices. Regression analysis was conducted to test the goodness of fit of the various models.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"16 1","pages":"6"},"PeriodicalIF":2.0,"publicationDate":"2014-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76638033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Programming Projects in C - for Students of Engineering, Science, and Mathematics 用C语言编写的程序设计项目-适用于工程、科学和数学专业的学生
IF 2
International Journal of Computational Science and Engineering Pub Date : 2014-09-03 DOI: 10.1137/1.9781611973501
R. Rostamian
{"title":"Programming Projects in C - for Students of Engineering, Science, and Mathematics","authors":"R. Rostamian","doi":"10.1137/1.9781611973501","DOIUrl":"https://doi.org/10.1137/1.9781611973501","url":null,"abstract":"Like a pianist who practices from a book of tudes, readers of Programming Projects in C for Students of Engineering, Science, and Mathematics will learn by doing. Written as a tutorial on how to think about, organize, and implement programs in scientific computing, this book achieves its goal through an eclectic and wide-ranging collection of projects. Each project presents a problem and an algorithm for solving it, and the reader is guided through implementing the algorithm in C and compiling and testing the results. It is not necessary to carry out the projects in sequential order. The projects contain suggested algorithms and partially completed programs for implementing them to enable the reader to exercise and develop skills in scientific computing; require only a working knowledge of undergraduate multivariable calculus, differential equations, and linear algebra; and are written in platform-independent standard C. The Unix command-line is used to illustrate compilation and execution. The primary audience of this book is graduate students in mathematics, engineering, and the sciences. The book will also be of interest to advanced undergraduates and working professionals who wish to exercise and hone their skills in programming mathematical algorithms in C. A working knowledge of the C programming language is assumed.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"26 1","pages":"I-XV, 1-393"},"PeriodicalIF":2.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87277949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DDoS protection as a service: hiding behind the giants DDoS防护即服务:躲在巨头背后
IF 2
International Journal of Computational Science and Engineering Pub Date : 2014-01-01 DOI: 10.1504/ijcse.2014.060711
Zakaria Al Qudah, B. Duwairi, O. Khaleel
{"title":"DDoS protection as a service: hiding behind the giants","authors":"Zakaria Al Qudah, B. Duwairi, O. Khaleel","doi":"10.1504/ijcse.2014.060711","DOIUrl":"https://doi.org/10.1504/ijcse.2014.060711","url":null,"abstract":"","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"122 1","pages":"292"},"PeriodicalIF":2.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87717277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recipes for Continuation 延续的秘诀
IF 2
International Journal of Computational Science and Engineering Pub Date : 2013-05-01 DOI: 10.1137/1.9781611972573
H. Dankowicz, F. Schilder
{"title":"Recipes for Continuation","authors":"H. Dankowicz, F. Schilder","doi":"10.1137/1.9781611972573","DOIUrl":"https://doi.org/10.1137/1.9781611972573","url":null,"abstract":"This book provides a comprehensive introduction to the mathematical methodology of parameter continuation, the computational analysis of families of solutions to nonlinear mathematical equations. It develops a systematic formalism for constructing abstract representations of continuation problems and for implementing these in an existing computational platform. Recipes for Continuation lends equal importance to theoretical rigor, algorithm development, and software engineering. The book demonstrates the use of fully developed toolbox templates for single- and multisegment boundary-value problems to the analysis of periodic orbits in smooth and hybrid dynamical systems, quasi-periodic invariant tori, and homoclinic and heteroclinic connecting orbits between equilibria and/or periodic orbits. It also shows the use of vectorization for optimal computational efficiency, an object-oriented paradigm for the modular construction of continuation problems, and adaptive discretization algorithms for guaranteed bounds on estimated errors. The book contains extensive and fully worked examples that illustrate the application of the MATLAB-based Computational Continuation Core (COCO) to problems from recent research literature that are relevant to dynamical system models from mechanics, electronics, biology, economics, and neuroscience. A large number of the exercises at the end of each chapter can be used as self-study or for course assignments that range from reflections on theoretical content to implementations in code of algorithms and toolboxes that generalize the discussion in the book or the literature. Open-ended projects throughout the book provide opportunities for summative assessments. Audience: It is intended for students and teachers of nonlinear dynamics and engineering, as well as engineers and scientists engaged in modeling and simulation, and is valuable to potential developers of computational tools for analysis of nonlinear dynamical systems. It assumes some familiarity with MATLAB programming and a theoretical sophistication expected of upper-level undergraduate or first-year graduate students in applied mathematics and/or computational science and engineering. Contents: Part I: Design Fundamentals: Chapter 1: A Continuation Paradigm; Chapter 2: Encapsulation; Chapter 3: Construction; Chapter 4: Toolbox Development; Chapter 5: Task Embedding; Part II: Toolbox Templates: Chapter 6: Discretization; Chapter 7: The Collocation Continuation Problem; Chapter 8: Single-Segment Continuation Problems; Chapter 9: Multisegment Continuation Problems; Chapter 10: The Variational Collocation Problem; Part III: Atlas Algorithms: Chapter 11: Covering Manifolds; Chapter 12: Single-Dimensional Atlas Algorithms; Chapter 13: Multidimensional Manifolds; Chapter 14: Computational Domains; Part IV: Event Handling: Chapter 15: Special Points and Events; Chapter 16: Atlas Events and Toolbox Integration; Chapter 17: Event Handlers and Branch Switching; Part V: Adap","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"307 1","pages":"I-XV, 1-584"},"PeriodicalIF":2.0,"publicationDate":"2013-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75674431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 222
Linear and Nonlinear Inverse Problems with Practical Applications 线性和非线性反问题的实际应用
IF 2
International Journal of Computational Science and Engineering Pub Date : 2012-10-31 DOI: 10.1137/1.9781611972344
J. Mueller, S. Siltanen
{"title":"Linear and Nonlinear Inverse Problems with Practical Applications","authors":"J. Mueller, S. Siltanen","doi":"10.1137/1.9781611972344","DOIUrl":"https://doi.org/10.1137/1.9781611972344","url":null,"abstract":"Inverse problems arise in practical applications whenever there is a need to interpret indirect measurements. This book explains how to identify ill-posed inverse problems arising in practice and how to design computational solution methods for them; explains computational approaches in a hands-on fashion, with related codes available on a website; and serves as a convenient entry point to practical inversion. The guiding linear inversion examples are the problem of image deblurring, x-ray tomography, and backward parabolic problems, including heat transfer, and electrical impedance tomography is used as the guiding nonlinear inversion example. The book s nonlinear material combines the analytic-geometric research tradition and the regularization-based school of thought in a fruitful manner, paving the way to new theorems and algorithms for nonlinear inverse problems. Furthermore, it is the only mathematical textbook with a thorough treatment of electrical impedance tomography, and these sections are suitable for beginning and experienced researchers in mathematics and engineering. Audience: Linear and Nonlinear Inverse Problems with Practical Applications is well-suited for students in mathematics, engineering, physics, or computer science who wish to learn computational inversion (inverse problems). Professors will find that the exercises and project work topics make this a suitable textbook for advanced undergraduate and graduate courses on inverse problems. Researchers developing large-scale inversion methods for linear or nonlinear inverse problems, as well as engineers working in research and development departments at high-tech companies and in electrical impedance tomography, will also find this a valuable guide. Contents Part I: Linear Inverse Problems; Chapter 1: Introduction; Chapter 2: Nave Reconstructions and Inverse Crimes; Chapter 3: Ill-Posedness in Inverse Problems; Chapter 4: Truncated Singular Value Decomposition; Chapter 5: Tikhonov Regularization; Chapter 6: Total Variation Regularization; Chapter 7: Besov Space Regularization Using Wavelets; Chapter 8: Discretization-Invariance; Chapter 9: Practical X-ray Tomography with limited data; Chapter 10: Projects; Part II: Nonlinear Inverse Problems; Chapter 11: Nonlinear Inversion; Chapter 12: Electrical Impedance Tomography; Chapter 13: Simulation of Noisy EIT Data; Chapter 14: Complex Geometrical Optics Solutions; Chapter 15: A Regularized D-bar Method for Direct EIT; Chapter 16: Other Direct Solution Methods for EIT; Chapter 17: Projects; Appendix A: Banach Spaces and Hilbert Spaces; Appendix B: Mappings and Compact Operators; Appendix C: Fourier Transforms and Sobolev Spaces; Appendix D: Iterative Solution of Linear Equations","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"8 1","pages":"I-XIII, 1-351"},"PeriodicalIF":2.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78499284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 443
Computational Optimization of Systems Governed by Partial Differential Equations 偏微分方程控制系统的计算优化
IF 2
International Journal of Computational Science and Engineering Pub Date : 2012-01-26 DOI: 10.1137/1.9781611972054
A. Borzì, V. Schulz
{"title":"Computational Optimization of Systems Governed by Partial Differential Equations","authors":"A. Borzì, V. Schulz","doi":"10.1137/1.9781611972054","DOIUrl":"https://doi.org/10.1137/1.9781611972054","url":null,"abstract":"This book fills a gap between theory-oriented investigations in PDE-constrained optimization and the practical demands made by numerical solutions of PDE optimization problems. The authors discuss computational techniques representing recent developments that result from a combination of modern techniques for the numerical solution of PDEs and for sophisticated optimization schemes. Computational Optimization of Systems Governed by Partial Differential Equations offers readers a combined treatment of PDE-constrained optimization and uncertainties and an extensive discussion of multigrid optimization. It provides a bridge between continuous optimization and PDE modeling and focuses on the numerical solution of the corresponding problems. Audience: This book is intended for graduate students working in PDE-constrained optimization and students taking a seminar on numerical PDE-constrained optimization. It is also suitable as an introduction for researchers in scientific computing with PDEs who want to work in the field of optimization and for those in optimization who want to consider methodologies from the field of numerical PDEs. It will help researchers in the natural sciences and engineering to formulate and solve optimization problems.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"31 1","pages":"I-XX, 1-282"},"PeriodicalIF":2.0,"publicationDate":"2012-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82627534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 311
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信