{"title":"Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms","authors":"Meghna H. Vekariya","doi":"10.26472/IJCES.V1I1.20","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.20","url":null,"abstract":"Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"102 1","pages":"1-8"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87661219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Documenting Software Architectural Component and Connector with UML 2","authors":"Vikram Agrawal","doi":"10.26472/IJCES.V1I1.19.G25","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.19.G25","url":null,"abstract":"Earlierversions of the UML have been an out of depth for documenting software architectures like component, port, connector and system. Users have adopted conventions for representing architectural concepts using different grouping of UML modeling element. They can also create profiles to focus the UML. Changes incorporated in UML 2 have improved UML’s suitability for software architectural documentation, but UML is still an out of your depth for documenting some types of architectural information. In this paper, there is description of documenting component and connector using UML but in particular case, documenting architectural connectors and components remains problematic.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"16 1","pages":"32-38"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82478467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of security issues in Mobile Ad hoc Networks","authors":"Vikaram M. Agrawal, Hiral U. Chauhan","doi":"10.26472/IJCES.V1I1.16","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.16","url":null,"abstract":"Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"39 1","pages":"9-17"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79388585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Digital Signature Schemes based on Hash Functions","authors":"P. Patel","doi":"10.26472/IJCES.V1I1.18","DOIUrl":"https://doi.org/10.26472/IJCES.V1I1.18","url":null,"abstract":"One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"82 1","pages":"27-32"},"PeriodicalIF":2.0,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79963194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A STUDY ON THE INFLUENCE OF JOB STRESS IN ORGANISATIONAL FACTORS","authors":"A. Jacob, M. Rengaraj","doi":"10.26472/IJCES.V1I3.33","DOIUrl":"https://doi.org/10.26472/IJCES.V1I3.33","url":null,"abstract":"Today, occupational accidents are considered among the potential threats because of their serious humanitarian, economic, social, and environmental consequences. Occupational accidents and injuries are the third cause of mortality in world and the second one in Iran. In addition, the economic and environmental damages of occupational accidents are catastrophic too.According to International Labor Organization (ILO) report in 1999 the average estimated fatal occupational accident rate was 140/100 000 workers and the number of fatal accidents was 335000. Though the registered number of accidents in Iran cannot be a faultless account of all the accidents happened, but in 2000, about 12000 work related accidents have been registered by the Department of Social Security. Calculations indicated that approximately 345000 fatal occupational accidents occurred in 1998 and that over 260 million occupational accidents causing at least 3 days absence happened in the same year. This work aims to study the relation of occupational stress of workers and the accidents in a rice milling industry. The data was collected using questionnaire. The questionnaire contained 30 questions to measure the perception s of the employees about the management practices. A five point likert scale was used. This was prepared based on review of related literature .The contents of this draft questionnaire were discussed with senior safety professional in the industry. Data was analyzed using IBM SPSS Statistics 20 software. Descriptive statistics and correlations of the studied variables were first analyzed. Confirmatory factor analysis was used to verify the reliability of the management practices. Regression analysis was conducted to test the goodness of fit of the various models.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"16 1","pages":"6"},"PeriodicalIF":2.0,"publicationDate":"2014-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76638033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programming Projects in C - for Students of Engineering, Science, and Mathematics","authors":"R. Rostamian","doi":"10.1137/1.9781611973501","DOIUrl":"https://doi.org/10.1137/1.9781611973501","url":null,"abstract":"Like a pianist who practices from a book of tudes, readers of Programming Projects in C for Students of Engineering, Science, and Mathematics will learn by doing. Written as a tutorial on how to think about, organize, and implement programs in scientific computing, this book achieves its goal through an eclectic and wide-ranging collection of projects. Each project presents a problem and an algorithm for solving it, and the reader is guided through implementing the algorithm in C and compiling and testing the results. It is not necessary to carry out the projects in sequential order. The projects contain suggested algorithms and partially completed programs for implementing them to enable the reader to exercise and develop skills in scientific computing; require only a working knowledge of undergraduate multivariable calculus, differential equations, and linear algebra; and are written in platform-independent standard C. The Unix command-line is used to illustrate compilation and execution. The primary audience of this book is graduate students in mathematics, engineering, and the sciences. The book will also be of interest to advanced undergraduates and working professionals who wish to exercise and hone their skills in programming mathematical algorithms in C. A working knowledge of the C programming language is assumed.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"26 1","pages":"I-XV, 1-393"},"PeriodicalIF":2.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87277949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DDoS protection as a service: hiding behind the giants","authors":"Zakaria Al Qudah, B. Duwairi, O. Khaleel","doi":"10.1504/ijcse.2014.060711","DOIUrl":"https://doi.org/10.1504/ijcse.2014.060711","url":null,"abstract":"","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"122 1","pages":"292"},"PeriodicalIF":2.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87717277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recipes for Continuation","authors":"H. Dankowicz, F. Schilder","doi":"10.1137/1.9781611972573","DOIUrl":"https://doi.org/10.1137/1.9781611972573","url":null,"abstract":"This book provides a comprehensive introduction to the mathematical methodology of parameter continuation, the computational analysis of families of solutions to nonlinear mathematical equations. It develops a systematic formalism for constructing abstract representations of continuation problems and for implementing these in an existing computational platform. Recipes for Continuation lends equal importance to theoretical rigor, algorithm development, and software engineering. The book demonstrates the use of fully developed toolbox templates for single- and multisegment boundary-value problems to the analysis of periodic orbits in smooth and hybrid dynamical systems, quasi-periodic invariant tori, and homoclinic and heteroclinic connecting orbits between equilibria and/or periodic orbits. It also shows the use of vectorization for optimal computational efficiency, an object-oriented paradigm for the modular construction of continuation problems, and adaptive discretization algorithms for guaranteed bounds on estimated errors. The book contains extensive and fully worked examples that illustrate the application of the MATLAB-based Computational Continuation Core (COCO) to problems from recent research literature that are relevant to dynamical system models from mechanics, electronics, biology, economics, and neuroscience. A large number of the exercises at the end of each chapter can be used as self-study or for course assignments that range from reflections on theoretical content to implementations in code of algorithms and toolboxes that generalize the discussion in the book or the literature. Open-ended projects throughout the book provide opportunities for summative assessments. Audience: It is intended for students and teachers of nonlinear dynamics and engineering, as well as engineers and scientists engaged in modeling and simulation, and is valuable to potential developers of computational tools for analysis of nonlinear dynamical systems. It assumes some familiarity with MATLAB programming and a theoretical sophistication expected of upper-level undergraduate or first-year graduate students in applied mathematics and/or computational science and engineering. Contents: Part I: Design Fundamentals: Chapter 1: A Continuation Paradigm; Chapter 2: Encapsulation; Chapter 3: Construction; Chapter 4: Toolbox Development; Chapter 5: Task Embedding; Part II: Toolbox Templates: Chapter 6: Discretization; Chapter 7: The Collocation Continuation Problem; Chapter 8: Single-Segment Continuation Problems; Chapter 9: Multisegment Continuation Problems; Chapter 10: The Variational Collocation Problem; Part III: Atlas Algorithms: Chapter 11: Covering Manifolds; Chapter 12: Single-Dimensional Atlas Algorithms; Chapter 13: Multidimensional Manifolds; Chapter 14: Computational Domains; Part IV: Event Handling: Chapter 15: Special Points and Events; Chapter 16: Atlas Events and Toolbox Integration; Chapter 17: Event Handlers and Branch Switching; Part V: Adap","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"307 1","pages":"I-XV, 1-584"},"PeriodicalIF":2.0,"publicationDate":"2013-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75674431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear and Nonlinear Inverse Problems with Practical Applications","authors":"J. Mueller, S. Siltanen","doi":"10.1137/1.9781611972344","DOIUrl":"https://doi.org/10.1137/1.9781611972344","url":null,"abstract":"Inverse problems arise in practical applications whenever there is a need to interpret indirect measurements. This book explains how to identify ill-posed inverse problems arising in practice and how to design computational solution methods for them; explains computational approaches in a hands-on fashion, with related codes available on a website; and serves as a convenient entry point to practical inversion. The guiding linear inversion examples are the problem of image deblurring, x-ray tomography, and backward parabolic problems, including heat transfer, and electrical impedance tomography is used as the guiding nonlinear inversion example. The book s nonlinear material combines the analytic-geometric research tradition and the regularization-based school of thought in a fruitful manner, paving the way to new theorems and algorithms for nonlinear inverse problems. Furthermore, it is the only mathematical textbook with a thorough treatment of electrical impedance tomography, and these sections are suitable for beginning and experienced researchers in mathematics and engineering. Audience: Linear and Nonlinear Inverse Problems with Practical Applications is well-suited for students in mathematics, engineering, physics, or computer science who wish to learn computational inversion (inverse problems). Professors will find that the exercises and project work topics make this a suitable textbook for advanced undergraduate and graduate courses on inverse problems. Researchers developing large-scale inversion methods for linear or nonlinear inverse problems, as well as engineers working in research and development departments at high-tech companies and in electrical impedance tomography, will also find this a valuable guide. Contents Part I: Linear Inverse Problems; Chapter 1: Introduction; Chapter 2: Nave Reconstructions and Inverse Crimes; Chapter 3: Ill-Posedness in Inverse Problems; Chapter 4: Truncated Singular Value Decomposition; Chapter 5: Tikhonov Regularization; Chapter 6: Total Variation Regularization; Chapter 7: Besov Space Regularization Using Wavelets; Chapter 8: Discretization-Invariance; Chapter 9: Practical X-ray Tomography with limited data; Chapter 10: Projects; Part II: Nonlinear Inverse Problems; Chapter 11: Nonlinear Inversion; Chapter 12: Electrical Impedance Tomography; Chapter 13: Simulation of Noisy EIT Data; Chapter 14: Complex Geometrical Optics Solutions; Chapter 15: A Regularized D-bar Method for Direct EIT; Chapter 16: Other Direct Solution Methods for EIT; Chapter 17: Projects; Appendix A: Banach Spaces and Hilbert Spaces; Appendix B: Mappings and Compact Operators; Appendix C: Fourier Transforms and Sobolev Spaces; Appendix D: Iterative Solution of Linear Equations","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"8 1","pages":"I-XIII, 1-351"},"PeriodicalIF":2.0,"publicationDate":"2012-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78499284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational Optimization of Systems Governed by Partial Differential Equations","authors":"A. Borzì, V. Schulz","doi":"10.1137/1.9781611972054","DOIUrl":"https://doi.org/10.1137/1.9781611972054","url":null,"abstract":"This book fills a gap between theory-oriented investigations in PDE-constrained optimization and the practical demands made by numerical solutions of PDE optimization problems. The authors discuss computational techniques representing recent developments that result from a combination of modern techniques for the numerical solution of PDEs and for sophisticated optimization schemes. Computational Optimization of Systems Governed by Partial Differential Equations offers readers a combined treatment of PDE-constrained optimization and uncertainties and an extensive discussion of multigrid optimization. It provides a bridge between continuous optimization and PDE modeling and focuses on the numerical solution of the corresponding problems. Audience: This book is intended for graduate students working in PDE-constrained optimization and students taking a seminar on numerical PDE-constrained optimization. It is also suitable as an introduction for researchers in scientific computing with PDEs who want to work in the field of optimization and for those in optimization who want to consider methodologies from the field of numerical PDEs. It will help researchers in the natural sciences and engineering to formulate and solve optimization problems.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"31 1","pages":"I-XX, 1-282"},"PeriodicalIF":2.0,"publicationDate":"2012-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82627534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}