Learn More
This paper mainly analysis and describe the design issue of stream ciphers in Network security as the streams are widely used to protecting the privacy of digital information. A variety of attacks against stream cipher exist;(algebraic and so on). These attacks have been very successful against a variety of stream ciphers. So in this paper efforts have been(More)
In this paper I investigate factors of the testability of structured programs. The starting point is given by a study of the literature to obtain both an initial model of testability and existing models related to testability. The main objective of this paper is to propose models for the estimation of testability (Tb), on the basis of various affecting(More)
There are two obvious methods to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Traditionally, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for database(More)
In distributed system field, there are many challenges, and one of them is leader election. It is really tough task to find suitable and efficient algorithms for leader election. The main role of an elected leader is that it performs a centralized coordination after being selected and manages the use of a shared resource in an optimal manner. Whenever a(More)
In distributed computing field, there are many challenges, and one of them is leader election in distributed system. It is really tough task to find suitable and efficient algorithms for leader election. The main role of an elected leader is that it performs a centralized coordination after being selected and manages the use of a shared resource in an(More)
  • 1