Version-1 (Jan-Feb 2015)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Development of a D.C Circuit Analysis Software Using Microsoft Visual C#.Net |
| Country | : | Nigeria |
| Authors | : | B.O. Omijeh || M. Ehikhamenle |
Abstract:In this paper, the development of D.C circuit simulation software, using Microsoft visual C#.net, has
been achieved. This paper aims at (i) analysing a purely resistive planar circuit, (ii) displaying current direction
as they flow through components and (iii) having a user-friendly Graphic User Interface (GUI). The
methodology employed in this work includes: (i) equations, (ii) pseudo code, (iii)algorithm, (iv)flowchart and
(v) Microsoft C#.Net codes. The solutions obtained from the software correlate with those generated manually.
The software has an efficiency of 99.3396% which makes it very reliable for circuit analysis and simulation.
Keywords: D.C circuit, Circuit simulation software, Microsoft Visual C#.net, CiRSiS
[1]. Bart D.S. (2011): C# 4.0 Unleashed, Sams, Indianapolis, Indiana, ISBN:13-978-0-672-33079-7
[2]. Butow .E and Ryan .T (2002): C#. Your visual blueprint for building .net applications, Maran graphics and Hungry minds, New-York, ISBN: 0-7645-3601-X
[3]. Malvino (1993): Electronic Principles 5th edition, Macmillian/McGraw-Hill, ISBN 0-02-800846-6.
[4]. Mehta V. K. and Mehta R. (2006): Basic Electrical Engineering, S. Chand & Company ltd, New Belhi, India, ISBN 81-219-0871-X.
[5]. Mitchell E. S. (2007): Basic Electronics 10th edition, McGraw-Hill, ISBN-13 978-0-07-297475-1
[6]. Omijeh B.O. (2009): Circuit Analysis & Simulation (with MATLAB and TINA applications), Joint Heirs publishers Nig. Ltd, ISBN 978-978-48383-4-7.
[7]. Sadiku M.N.O. and Charles K.A. (2004): Fundamentals of Electric Circuits, McGraw Hill, ISBN 0-07-304718-X.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Novel Method of Generating (Stream Cipher) Keys for Secure Communication |
| Country | : | Iraq |
| Authors | : | Zainalabideen Abdullasamd Rasheed || Ali Abdul Azeez Mohammad Baker |
Abstract: Security is an important part of computer science that deals with the protection of important information from access, change or modified, and delete, so there are many ways to improve the security of information like cryptography, steganography, biometrics, passwords, barcode….. However most of these methods are considered keys required.These keys are used to implement the changing of the information for secure style purpose. For that reason, generating and keeping these keys is a major part of the appropriate security system. Moreover, sending the key to the wanted person in unsacred channel is a widely weakness part for any system. The proposed system is a novel method for generating a secret unique key from an image. A generating process is applied by discovering the essential colors in the image and constructing a table values for these essential colors , after that a suitable threshold is used to considered these values are (0, 1) bits which will be used as stream bits key.
Keywords: stream cipher, secret key, x-or, ciphering, security.
[1]. Ali Abdul Azeez Mohammad Baker, ZainalabideenAbdullasamdRasheed" Secure Keys Constructing", Education College, Kufa University, International Journal of Advanced Research in Computer Science and Software Engineering ,2014, Iraq.
[2]. NesirRasoolMahmood, Ali Abdul Azeez Mohammad baker, ZahraaNesirRasool " Public Key Steganography", Kufa University ,Education College, International Journal of Computer Applications,2014, Iraq.
[3]. Abhishek Roy, Sunil Karforma" STREAM CIPHER BASED USER AUTHENTI-CATION TECHNIQUE IN E-GOVERNANCE TRANSACTIONS", Journal of Research in Electrical and Electronics Engineering, 2014, INDIA.
[4]. PratishDatta, Dibyendu Roy and SouravMukhopadhyay "A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers", India.
[5]. Xinxin Fan and Guang Gong "Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms", 2012, CANADA.1.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | How Are Mainframes Still Better Than Cloud? |
| Country | : | India |
| Authors | : | Sophia Sharda |
Abstract: This article presents a summary of the Mainframes which are breathing new life in business within the wake of a new computing commonly termed as Cloud Computing in which colossal clusters of remote servers are arranged & structured in a circuitry in such a way so as to permit centralized data storage and online approach to computer services or resources. It discusses varied potential advantages of Mainframes over the Cloud significantly in terms of processing power, storage and security. It argues that given somewhat slower growth projection, the Cloud will reach a declining phase, posing security issues and inflexible environment but the Mainframes will still stand the test of time since the asserted advantages are far more copious that its drawbacks could be overlooked. It also bounces off the wherewithal benefactors of using mainframes prominently in terms of its pursuance on the businesses and adduces out notions & validations that make it a prime platform for fleckless & unerring computing.
Keywords: colossal, circuitry, copious, pursuance, adduces
[1]. History of IBM mainframe operating systems. (n.d.). Retrieved April 24, 2014, from wikipedia: http://en.wikipedia.org /wiki/History_of_IBM_mainframe_operating_systems
[2]. Mainframe - Advantages and Disadvantages. (n.d.). Retrieved April 24, 2014, from biznik: http://biznik.com/members/rakesh-s/articles/mainframe-advantages-and-disadvantages
[3]. Mainframe architecture. (n.d.). Retrieved April 24, 2014, from ibm: http://www01.ibm.com/ support /knowledgecenter/ zosbasics/com.ibm.zos.zmainframe/ zconc_evolvarch.htm
[4]. Mainframe computer. (n.d.). Retrieved April 24, 2014, from wikipedia: http://en.wikipedia.org/wiki/Mainframe_computer
[5]. Mainframe strengths. (n.d.). Retrieved April 24, 2014, from ibm: http://www 01.ibm.com/support/knowledgecenter/ zosbasics/com.ibm.zos.zmainframe/zconc_RAS.htm
[6]. Mainframe strengths. (n.d.). Retrieved April 24, 2014, from ibm: http://www-01.ibm.com/support/ knowledgecenter /zosbasics/com.ibm.zos.zmainframe/ zconc_security.htm [7]. What is a mainframe? It's a style of computing. (n.d.). Retrieved April 24, 2014, from ibm: http://www01.ibm.com/support/ knowledgecenter/zosbasics/com.ibm.zos.zmainframe/ zconc_whatismainframe.htm