Hardware implementation of multiprecision modular multiplications in public-key cryptography has led to various developments of scalable Montgomery modular multipliers, which are fast enough constrained from limited h...
详细信息
ISBN:
(纸本)9781479905614
Hardware implementation of multiprecision modular multiplications in public-key cryptography has led to various developments of scalable Montgomery modular multipliers, which are fast enough constrained from limited hardware resources. Among the candidates, the feedforward scalable Montgomery modular multiplier achieves low latency with simple logics and little change in the algorithm. However, the performance of high-radix feedforward scalable Montgomery modular multiplier is deteriorated by quotient determination. In this work, the method of double Booth-encodings and precomputation, which is firstly proposed for a traditional scalable Montgomery modular multiplier by Pinckney et al., is applied to radix-4 feedforward scalable Montgomery modular multiplier. FPGA implementation shows that the critical path is reduced by about 31% while the cost of hardware resources also decreases.
The spectral clustering algorithm, which cluster by using the eigenvalues and eigenvectors of Laplacian matrix, may not be obtained the desired clustering results in some cases. It is possible to remedy this deficienc...
详细信息
ISBN:
(纸本)9781479905614
The spectral clustering algorithm, which cluster by using the eigenvalues and eigenvectors of Laplacian matrix, may not be obtained the desired clustering results in some cases. It is possible to remedy this deficiency by using the singular value decomposition (SVD) in the spectral clustering algorithm. It is presented in this article the algorithm of spectral clustering based on SVD which use singular value decomposition (SVD) instead of Laplacian eigenmaps. The choice of singular vectors, the estimate of the Gaussian kernel parameter, and the determine of the clusters number significantly influence the clustering results. The experiments show that these spectral clustering parameters such as the number of clusters, etc. can be calculated by use of the dimensionality reduction factor and the expression of singular value.
To increase the security of network system, we propose a network security situation awareness method based on intercepting the threat spread. This method firstly merges security data from different sensors to get the ...
详细信息
ISBN:
(纸本)9781479905614
To increase the security of network system, we propose a network security situation awareness method based on intercepting the threat spread. This method firstly merges security data from different sensors to get the normalization data of network nodes, threats and vulnerability. And secondly, the method intercepts the threat spread by the normalization data. Finally, the method constructs the game analysis among the attacker, defender and neutral. Then the system manager can reinforce the most vulnerable node in real time according to the analysis. Experiment results show that our method can stably improve the security performance of the network system with the system continuously running.
OSEK NM (network Management) is one of the important mechanisms to guarantee the safety of the automotive network and its working reliability has direct effect on the network communication. In order to analyze and imp...
详细信息
ISBN:
(纸本)9781479905614
OSEK NM (network Management) is one of the important mechanisms to guarantee the safety of the automotive network and its working reliability has direct effect on the network communication. In order to analyze and improve the reliability, the logical ring reconstruction mechanism is improved in the scenarios of node joining and dropping out. Meanwhile the time of ring reconstruction is reduced. Through the potential failure factors analysis and the quantitative calculation model in OSEK NM fault tree, an updated ring mechanism is proposed to improve the performance of OSEK NM. Simulation results prove the validity of the method in this paper which can effectively increase the reliability of OSEK NM.
Since the traditional detection method of wheat quality was tedious and time-consuming, near infrared reflectance spectroscopy (NIRS) combined with RBF artificial neural network was used to classification and detectio...
详细信息
ISBN:
(纸本)9781479905614
Since the traditional detection method of wheat quality was tedious and time-consuming, near infrared reflectance spectroscopy (NIRS) combined with RBF artificial neural network was used to classification and detection wheat quality non-destructively and quickly in this paper. The ware point of samples obtained by the NIRS is too many, resulting in the structure of RBF neural network is too complex, so we used the algorithm of radial basis function (PSO) to optimize RBF neural network, and made some improvement measures against the shortcoming of premature convergence and the set of inertia weight was too mechanical of PSO algorithm. The experimental analysis showed that the accuracy of model can reached 98%, which could satisfy the need of non-destructive and real-time detection of wheat in modern agriculture.
Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open mediu...
详细信息
ISBN:
(纸本)9781479905614
Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system. This system is able to identify different types of behaviors of a misbehaving node like suspicious, malicious but not intrusive and both malicious & intrusive. Simulation result shows the effectiveness of our proposal.
Aimed at the problem of hiding side and channel interference in wireless sensor network communication, a self-adaptively accessing network mechanism which nodes always choose LQI optimal network to access is proposed....
详细信息
ISBN:
(纸本)9781479905614
Aimed at the problem of hiding side and channel interference in wireless sensor network communication, a self-adaptively accessing network mechanism which nodes always choose LQI optimal network to access is proposed. On the basis of DSME network, getting the strongest anti-interference channel sequence by using greedy algorithms and avoiding interference through the sequence of timeslot based on dynamic interference channel jump channel to improve the anti interference of the network. Test results show that under the environment of the new system, the packet loss rate of the network was greatly reduced, and network nodes got the ability of self-healing. It verified the correctness and feasibility of the new method.
Aiming at the problem that it is difficult for BP algorithm to converge because of more parameters in training of process neural networks based on orthogonal basis expansion, a quantum shuffled frog leaping algorithm ...
详细信息
ISBN:
(纸本)9781479905614
Aiming at the problem that it is difficult for BP algorithm to converge because of more parameters in training of process neural networks based on orthogonal basis expansion, a quantum shuffled frog leaping algorithm is presented which combines the quantum theory and is to train the process neural network. In this algorithm, the individuals are expressed with Bloch spherical coordinates of qubits. The quantum individuals are updated by quantum rotation gates, and the mutation of individuals is achieved with Hadamard gates. For the size and direction of rotation angle of quantum rotation gates, a simple determining method is proposed. Above operations extend the search of the solution space effectively. To predict sunspot as an example to validate the presented algorithm.
network has been widely reported as a bottleneck resource for amounts of data transferring in cloud and big data computing frameworks. In this paper, we focus on the heterogeneous flows problem that various flows cons...
详细信息
ISBN:
(纸本)9781479905614
network has been widely reported as a bottleneck resource for amounts of data transferring in cloud and big data computing frameworks. In this paper, we focus on the heterogeneous flows problem that various flows consuming different amount of multiple resources. We develop a Resource Aware Queuing (RAQ) system to classify various flows into different categories according to their resource requirement amounts, and then schedule their processing order based on the switch multiple resource utilization. Based on the resource aware scheduling we also modify the packets dropping strategy so that the sending rates of different flows are also correspondingly modulated. We evaluate RAQ performance via simulation experiments and the results demonstrate that RAQ can improve network resources utilization and throughput without imposing serious negative impact on packets delays.
With the development of the server virtualization technology and the rapid growth of network applications, datacenters have received significant attention because of its cost-effective and promising for large date sto...
详细信息
暂无评论