IOSR Journal of Computer Engineering (IOSR-JCE)

March – April 2016 Volume 18 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : A Review Onsolving Ecdlp Over Large Finite Field Using Parallel Pollard's Rho (Ρ) Method
Country : India
Authors : Kaushal A. Chavan || Dr. Indivar Gupta || Dr. Dinesh B. Kulkarni

Abstract: Elliptic Curve Discrete Log Problem (ECDLP) is the underlyingbasis of many popular Public Key Scheme like Diffie-Hellman and ElGamal. The strength of such public key schemes is based on the difficulty of solving the ECDLP. The best method for solving the ECDLP has time complexity exponential in the size of the underlying field. ECDLP based cryptosystems are popular because they provide good security at key sizes much smaller than number theoretical Public Key Schemes like RSA cryptosystem......

Keyword: ECDLP, Parallel Pollard's Rho method, Cluster computing, Elliptic Curves

[1]. A. J. Menezes, D. Hankerson and S. Vanstone, "Guide to Elliptic Curve Cryptography", Springer-verlag New York, inc., 2003.

[2]. E. Wenger and P. Wolfger, "Solving the Discrete Logarithm of a 113- bit Koblitz Curve with an FPGA cluster", SAC, volume 8781 of LNCS, pages 363-379, Springer, 2014.
[3]. J. M. Pollard, "Monte Carlo Methods for Index Computation", Mathematics of Computation, Vol. 32, No. 143, American Mathematical Society Jun 1978.
[4]. P. C. van Oorshant and M. J. Wiener, "Parallel Collision Search with Cryptanalytic Applications", Journal of Cryptology, volume 12 No. 1, pages 1-28, 1999.
[5]. R. Harley, "Elliptic Curve Discrete Logarithms: ECC2K-108", 2000.


Paper Type : Research Paper
Title : Enhancement of Data Security in Cloud Computing: Issues and Challenges
Country : Nigeria
Authors : Obed Jatauwycliff || Abdulrahman Saidu || SuleimanAdamu

Abstract: Cloud computing can save an organization's time and money but trusting the system is very much important because the real asset of any organization is the data which they share in the cloud to use the needed service by putting it directly in the relational database.No organization can transfer its data or information to a third party until a bridge of trust is built.......

Keyword: Cloud computing, Information Technology, Data Integrity, Authentication, Security and Challenges.

[1]. Al Zain, M., Soh, B., &Pardede, E. (2012). A New Approach Using Redundancy Technique to Improve Security in Cloud Computing. IEEE.
[2]. Beckham, J. (2011), "The Top 5 Security Risks of Cloud Computing‟ available at: http://blogs.cisco.com/smallbusiness/the-top-5-security-risks-of-cloud-computing/(accessed 17/09/2013).
[3]. Chanderetal.(2013)International Journal of Advanced Research in Computer Science and Software Engineering Vol 3(5) May -2013, pp. 570-575
[4]. Han, D. and Zhang, F. (2012), Applying Agents to the Data Security in Cloud Computing. International Conference on Computer Science and Information Processing (CSIP). IEEExplore Pp. 1126 – 1127


Paper Type : Research Paper
Title : Learner Model for Automatic Detection of Learning Style Using FCM in Adaptive E-Learning System
Country : India
Authors : Soni Sweta || Kanhaiya Lal

Abstract: The aim of this paper is to introduce an automatic student modeling approach for identifying learning style in learning management systems according to Felder Silverman Learning Style Model (FSLSM).This paper proposes the use of fuzzy cognitive maps FCMs as a tool for identifying learner's learning style to individualizing each learner's according to their needs. FCMs are a soft computing tool which is a combination of fuzzy logic and neural network. Result shows that according to this model student learning style can be detected which give high precision value.

Keyword: Adaptive e-learning, Fuzzy cognitive map, Individualize, Learning Process, Personalized Learning

[1]. S. Graf, Kinshuk, and T. C. Liu, "Identifying learning styles in learning management systems by using indications from students‟ behaviour," Proc. - 8th IEEE Int. Conf. Adv. Learn. Technol. ICALT 2008, pp. 482–486, 2008.
[2]. N. B. H. Ahmad and S. M. Shamsuddin, "A comparative analysis of mining techniques for automatic detection of student‟s learning style," 2010 10th Int. Conf. Intell. Syst. Des. Appl., pp. 877–882, 2010.
[3]. T. Gaikwad and M. A. Potey, "Personalized course retrieval using literature based method in e-learning system," Proc. - 2013 IEEE 5th Int. Conf. Technol. Educ. T4E 2013, pp. 147–150, 2013.
[4]. P. Q. Dung and a M. Florea, "Adaptation to Learners‟ Learning Styles in a Multi-Agent E-Learning System," Leveraging Technol. Learn. Vol Ii, vol. 2, no. 1, pp. 259–266, 2012.


Paper Type : Research Paper
Title : Conceptual Design of "Lotos" Motorcar
Country : Russia
Authors : Iftikhar B. Abbasov || Hrachy Gabrilyan

Abstract: This work presents conceptual design of new "Lotos" motorcar. Brief review of analogue prototypes of different world-known motorcar manufacturers was made. When body concept design was created, bionic form of lotus petals was used. The prototypes of body outlines were developed in the form of sketch projects.......

Keyword: Conceptual design, motorcar, bionics, natural forms, car body, polygonal extrusion, shaded model, rendering.

[1] C. Eckert, M. Stacey, Sources of inspiration: a language of design, Design Studies,21(5), 2000. 523–538.
[2] C. Bouchard, A. Aoussat, R. Duchamp. Role of sketching in conceptual design of car styling, Journal of Design Research, 5(1), 2006, 116–148. doi:10.1504/JDR.2006.010810
[3] D. Damujanovic, D. Kozak, Z. Ivandic, M. Kokanovic. Car design as a new conceptual solution and CFD-analysis in purpose of improving aerodynamics. Fisita World Automotive Congress 2010, Budapest, Hungary, 2010, 3877-3885.
[4] E. Kroll, S.S. Condoor, D.G. Jansson, Innovative Conceptual Design: Theory and application of parameter analysis (Cambridge University Press. 2001).
[5] I.B. Abbasov, V.V. Orekhov, Amphibious. Computational modeling (Saarbrucken, Germany.: LAP Lambert Academic Publishing, 2012).


Paper Type : Research Paper
Title : Numerical and Experimental Study the Effect of Impeller Design on the Performance of Submerged Turbine
Country : Iraq
Authors : Assist. Prof. Dr. Muna S. Kassim || Hannen A. Noaf

Abstract: "This work presents the design and fabrication of Gorlov helical water turbine. The turbine was tested theoretically and experimentally. For the experimental part open channel was long=1600cm, high=45cm and width=30cm. six water velocity were tested namely (0.86, 1.26, 1.311, 1.51, 1.697 and 1.81 m/s). The results showed that the extracted power increased with velocity.......

Keyword: Hydrokintic, Hydropower, Gorlov Turbine, helical blade, Renewable energy

[1]. Amir Bashirzadeh Tabrizi1,*, Nassir Gifani2 " Economical and Environmental Effects of Tidal Stream Power plant Using near to Queshm Island in South of Iran " Master of Science in Mechanical Engineering Department M.SC.
[2]. Kari Sornes" Small-scale Water Current Turbinesfor River Applications" Zero Emission , Resourrce Organisation Maridalsveien 10 0178 Oslo www.zero.no, zero@zero.no2010 .
[3]. Taylor Jessica Hall " Numerical Simulation of a Cross Flow Marine Hydrokinetic Turbine" A thesis submitted in partial fulllment of the requirements for the degree of Master of Science in Mechanical Engineering University of Washington 2012.
[4]. Pete Bachant " Development of Hydrokinetic Test Bed and Turbine Performance Evaluation " Center for Ocean Renewable Energy University of New Hampshire 2010.
[5]. Alessandro Schonborn, Matthew Chantzidakis " Development of a hydraulic control mechanism for cyclic pitch marine current turbines " Renewable Energy , available online, vol.32,pp.662-679,2007.


Paper Type : Research Paper
Title : Survey On Energy Efficient Data Collection In Densely Populated Wireless Sensor Network
Country : India
Authors : M. Thangaraj || M.Renuga Devi || S.Anuradha

Abstract: WSN uses a large number of wireless sensor nodes to collect information from their sensing terrain.WSN is battery-powered devices in which energy-saving is a crucial issue. Every node in sensor network consist of three subsystems, first sensor subsystem which senses the environment, the second processing subsystem which do local computation on sensed data and third communication subsystem which is responsible for message exchange. In this paper, various literature was reviewed on different data collection mechanism on energy efficiency and presented the current scenario

Keyword: Battery-powered, Data collection, Energy Efficiency local computation, sensing terrain .

[1]. Suchitha R. Wankhade,Nekita A.chavan, A review on data collection method with sink node in wireless sensor network. International Journal of Distributed and Parallel Systems (IJDPS), January 2013, Vol.4, No.1,pp 67-68.
[2]. C.Tharini and P. Vanaja Ranjan, An energy efficient spatial correlation based data gathering algorithm for wireless sensor networks, International Journal of Distributed and Parallel Systems (IJDPS), May 2011,Vol.2, No.3, pp 16-17.
[3]. Feng Wang, Student Member, IEEE, and Jiangchuan Liu, Senior Member Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches, submitted to ieee communications surveys & tutorials for possible publication, pp 1-2.
[4]. Xiang-Yang Li ¤ Yajun Wangy Yu Wan, Complexity of Data Collection, Aggregation, and Sensor for Wireless Sensor Networks ,pp 1-3.
[5]. Mohammad Hossein Anisi, Abdul Hanan Abdullah, Shukor Abd Razak, Energy-Efficient Data Collection in Wireless Sensor Networks, SciRPjournal,2011, 3, 329-333,pp 329-330.


Paper Type : Research Paper
Title : A Comprehensive Study of Data Warehousing Analysis
Country : Bangladesh
Authors : Md. Mobinul Islam Mobin || Md. Iftekharul Mobin

Abstract: Data Warehouses are accommodated stockpiling, usefulness and responsiveness to questions past the capacities exchange arranged databases. The utilization of Data Warehousing is to make front-end examination that will bolster business officials and operational directors. Subsequent to the decision and prepare actually requires an examination of sequential patterns, time and its administration accomplish a colossal hugeness.......

Keyword: Data warehousing, Legacy framework, Web base application, Traits and Ideas, Extensible data model, Business structure, De-standardization of information, physical change, Data center, Interface of data warehousing.

[1]. Gupta, Vivek R. "An introduction to data warehousing." System Services Corporation (1997).
[2]. Han, Jiawei, Micheline Kamber, and Jian Pei. Data mining: concepts and techniques. Elsevier, 2011.
[3]. Widom, Jennifer. "Research problems in data warehousing." Proceedings of the fourth international conference on Information and knowledge management. ACM, 1995.
[4]. Ponniah, Paulraj. Data warehousing fundamentals: a comprehensive guide for IT professionals. John Wiley & Sons, 2004.
[5]. Fildes, Robert. "Decision Support and Executive Information Systems." Journal of the Operational Research Society 47.5 (1996): 719-720.


Paper Type : Research Paper
Title : Network Layer Attacks: Analysis & Solutions, A Survey
Country : India
Authors : Shruthi N || C K Vinay

Abstract: An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, self-organized security management is one of prime considerations. Each layer in cognitive radios is susceptible to widespread threats and security attacks......

Keyword: Network Layer Attacks-Threats, network security, countermeasures, routing, cognitive radio networks (CRNs), protocols.

[1]. A framework of the PHY-layer Approach to Defense Against Security Threats in Cognitive Radio Networks – Hong Wen – IEEE June 2013.
[2]. International Journal of Advent Research in Computer & Electronics, Vol.1, No.2, April 2014 - Survey: Attacks on Cognitive Radio Mesh Networks, T.Pavan Kumar, Dr.K.Rajasekhara Rao & Dr.V.Srikanth.
[3]. A Survey on Security in Cognitive Radio Networks Mahmoud Khasawneh, Anjali Agarwal Department of Electrical and Computer Engineering, Concordia University, Montreal, Canada {m_khasaw, aagarwal}@encs.concordia.ca - 2014 6th International Conference on CSIT, ISBN:987-1-4799-3999-2.
[4]. Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003, 1(2-3):293–315.


Paper Type : Research Paper
Title : Quantum Cellular Automata Circuit Mixed Strategy Game Theoretic Optimization
Country : United States
Authors : Patrick Harrington

Abstract: Gates and circuits made of Quantum Cellular Automata are subject to manufacturing errors due to imprecision of measurement. Our work examines the use of game theory optimization to correct Gaussian measurement error in Quantum Cellular Automata studies. We examine the use of game theory as a possible tool of optimization, specifically that of mixed strategy games. Simulation results show improvement in standard deviation of noise for mixed strategy games, as well as improvement in average polarity of gate.

Keyword: Game theory, Mixed strategy games, Noise removal, Optimization, Quantum Cellular Automata

[1]. P. D. Tougaw and C. S. Lent, Logical device implementation using quantum cellular automata, Journal of Applied Physics, (75), Feb. 1994, 1818-1825.
[2]. C.S. Lent and P.D. Tougaw, A device architecture for computing with quantum dots, Proceedings of the IEEE, 85(4), 1997.
[3]. M.T. Niemier, M.J. Kontz, P.M. Kogge, A design of and design tools for a novel quantum dot based microprocessor, Design Automation Conference, June 2000, 227-232.
[4]. W. Porod, Quantum-dot devices and quantum-dot cellular automata, International Journal of Bifurcation and Chaos, 7(10), 1997, 2199-2218.


Paper Type : Research Paper
Title : Analysis of C4.5 and K-Nearest Neighbor (KNN) Method on Algorithm of Clustering For Deciding Mainstay Area
Country : Indonesia
Authors : Heru Ismanto || Retantyo Wardoyo

Abstract: Development as a sustainable activity needs a good plan, so the programs can be effective and have a clear objective. Therefore, a model to help the analysis is significantly needed in determining the priority area to conduct better development in the future. This research applies the concept of Klassen Typology to analyze PDRB data in Papua Province......

Keyword: Klassen Typology, C 4.5, KNN, Clustering, Priority Area

[1]. Mursidah, A. Hamzah, dan Sofyan, Analisis Pengembangan Kawasan Andalan Di Kabupaten Aceh Besar, Jurnal Ilmu Ekonomi, Volume 1, No. 1, Februari 2013, pp. 43- 55, 2013.
[2]. Yunisti, Trias Dewi, Analisis Ketimpangan Pembangunan Antar Kabupaten/Kota Di Provinsi Banten, Tesis Program Magister, 2012
[3]. Alfita, Riza, Perancangan Sistem Pendukung Keputusan Penentuan Prioritas Produk Unggulan Daerah Menggunakan Metode Weighted Product (WP), Prosiding Seminas Competitive Advantage, Vol 1, No 1 (2011), 2011.
[4]. Dhyatmika, Ketut Wahyu, Analisis Ketimpangan Pembangunan Provinsi Banten Pasca Pemekaran, Skripsi Fakultas Ekonomi dan Bisnis Universitas Diponegori, Semarang, 2013


Paper Type : Research Paper
Title : Communist Manifesto Marx's Published Work (1818-1883):A Critique
Country : Nigeria
Authors : Dr. Kabir Mohammed

Abstract: This study titled "Communist Manifesto; Marx's Published Work (1818-1883): A critique has been carried out to briefly examine the biography of Marx, his philosophical ideas and intellectual role, as the most great and leading philosopher of his own particular age. The focus of the study is the examination of the motives, successes and failures associated with the above mentioned book, published in 1848, in London.......

Keyword: Communist, manifesto, Marx's work, critique

[1]. Allen, Oakley. Marx's Critique of Political Economy; 1844-1860(Rutledge, 1984)
[2]. Bottomore, T.B. A Dictionary of Marxist Thought (Willey Blackwell, ( Moscow)
[3]. Foster, Bellaway, John; Theory of Metabolic Rift Classical Foundations for Environmental Sociology "American Journal of Sociology vol.105 No.2 (September, 1999)
[4]. Frederic, Engels " The Condition of the Working class in England Contained in the Collected Works of Karl Marx and Frederick, Engels. Volume 4 (International publishers NewYork, 1975)
[5]. Isaah, Berlin. Karl Marx: His Life and EnvironmentJump up to " Marx the Millennium's Greatest Thinker" BBC News on line 1st October, 1999 accessed on November, 23rd 2010.


Researcher can also search IOSR published article contents through

IOSR Xplore