A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kalia, Arvind
- Performance Analysis of Symmetric Key Cryptography Algorithms:DES, AES and Blowfish
Authors
1 Department of Computer Science, Himachal Pradesh University, Shimla, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 28-37Abstract
Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming.Keywords
Cryptography, DES, AES, Blowfish, Encryption, Decryption.- Comparative Study of Technologies Related to Component-Based Applications Based on their Response Time Performance
Authors
1 Department of Computer Science, H.P University, Shimla (H.P), IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 102-113Abstract
Component Based software development is an approach to develop the software system by selecting appropriate off-the-shelf (COTS) components and assemble them into a target software system under a well-defined software architecture to perform a well defined function [4].Various component technologies such as Component Object Request Broker Architecture (CORBA), Component Object Model (COM) and Enterprise JavaBeans (EJB) are used to develop these Component-Based applications which should have high performance.
So appropriate component technology should be selected to develop the Component-Based application. This study basically uses a tool to measure the response time of Component-Based application based on various technologies. By comparing these response times, we can find out that COM-Based application has less response time than EJB-Based application and thus can provide the required performance.
Keywords
Component-Based Application, Response Time, Common Object Request Broker Architecture (CORBA), Component Object Model (COM), Enterprise Javabean (EJB).- Empirical Investigation of the Effect of the Lines of Code on Function Point in Embedded Software
Authors
1 Department of Computer Science, H.P. University, Shimla (H.P.), IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 123-130Abstract
The embedded software has grown complex and pervasive enough to attract the attention of the computer scientists and the researchers. As the embedded software market has grown in the last decade and will continue to grow in the coming years. The embedded software in majority are meant for performing in real time constraints in robust manner. So this makes the researchers to study the source code of embedded software and find out the relationship between the Lines of code and the function points in the embedded software. As the function points is supposed to be the predictors of the complexity of the software so the relationship between the Function Point and Lines of code can provide an insight to the developer to produce more reliable and less complex embedded software. For the empirical study the five versions of the embedded software namely gSOAP were taken. Then the collected data is analyzed using a source code analyzer Resource Standard Metrics (RSM) to get the data values for Lines of code and Function Point. Result shows that the Function Points and Lines of code has a positive relationship which means that as the Lines of code increases Function point also increases. However further empirical study are needed before the results can be generalized.Keywords
Embedded Software, Resource Standard Metrics (RSM) Tool, Function Point.- Handover in Universal Mobile Technology System
Authors
1 Department of Computer Science, Himachal Pradesh University, Shimla, IN