In the current era of wide use of internet by the users across the globe, the data generated and its security both are the important issues. Hence, in any network to prevent the malicious activities from the intrusion...
详细信息
ISBN:
(纸本)9781728140421
In the current era of wide use of internet by the users across the globe, the data generated and its security both are the important issues. Hence, in any network to prevent the malicious activities from the intrusions, the early and correct detection of intruders is important. For that we are using Intrusion Detection systems (IDS), developed with many effective algorithms which are helping us to get rid of these attacks. But, sometimes these systems do respond withthe detection of intruders who are in real, not the intruders, but the normal users. this makes these users difficult to continue withthe normal communication and can be prevented from accessing the important services over the World Wide Web. Similarly, not tolerable at all, when it's false negative i.e. intruder is allowed to enter into network traffic being a normal user, as it may cost to an organization to the extent of being demolished their future. though the percentage of these false positives and false negatives is less, it is creating issues in many important services. For that we can have a machine learning techniques which can effectively detect intrusions in the system without creating obstacles of false positives and false negatives, also we are proposing it for the online streamed data. Also, this IDS implementation using machine learning techniques is proposed with Distributed & parallel approach for simultaneous processing of network traffic data by these different machine learning techniques. this approach enables us to implement this IDS design for Online streamed data for faster detection i.e. increasing efficiency of IDS.
Traditional programming languages for parallel computer systems do not efficiently separate the algorithm description from the details of its hardware implementation. As a result, a significant code modification is re...
详细信息
the Distance-Regularized Level Set Evolution (DRLSE) algorithm solves many problems that plague the class of Level Set algorithms, but has a significant computational cost and is sensitive to its many parameters. Conf...
详细信息
the calculation of eigenvalues (EVs) is important in the domain of complex computation and processing of matrices of a higher order. For real-time applications, to get superior performance, the architecture of EV comp...
详细信息
ISBN:
(纸本)9781728139883
the calculation of eigenvalues (EVs) is important in the domain of complex computation and processing of matrices of a higher order. For real-time applications, to get superior performance, the architecture of EV computation comes in handy. In this paper, the authors have investigated an efficient architecture for EV computation using the Jacobi algorithm on the Xilinx Zed-Board FPGA evaluation platform, Artix-7 family. the iterative algorithm proves to be faster and more efficient in terms of area consumed in the FPGA architecture and also in terms of accuracy of the EV computation. the proposed architecture can take up to matrices of order 20 x 20 using the Jacobi algorithm. the algorithm also works for odd order matrices with few modifications in the input matrix. the architecture was implemented on Zynq-7000 xc7z020clg484-1 FPGA and it takes around 4216 LUTs out of 53200 LUTs for matrices of dimensions 4 x 4.
the Matrix2 Accelerator is a high performance multi-core vector processor for high-density computing. We design an efficient parallel implementation of the Linpack benchmark for the Matrix2. (1) We propose an efficien...
详细信息
While the ability to access a small fraction of data records from a large volume of scientific datasets is vital to accelerate scientific discovery, existing parallel file systems face serious challenges in managing s...
详细信息
Quantum Computing is a prominent word in this era as it allows computation to be performed in no time. the motive of using Quantum Computing (QC) is that even exponentially large number of problems can be solved using...
详细信息
ISBN:
(数字)9781728163246
ISBN:
(纸本)9781728163253
Quantum Computing is a prominent word in this era as it allows computation to be performed in no time. the motive of using Quantum Computing (QC) is that even exponentially large number of problems can be solved using it which was earlier difficult withthe classical computing. Conventional methods are based on usage of bits which consist of 0's and 1's while QC works with qubits. the main issue is that conventional computing has issue of storage as well as computation even when parallel computation is performed on it. Concept of quantum parallelism allows the computation to be performed in exponentially very low time as compared to conventional method. this paper will discuss about Quantum Computing algorithms and how Shor's algorithm is able to break RSA algorithms is discussed. Entanglement and superposition of qubits helps fast computation. the demonstration of the applicability has been evaluated based on Computation time, storage capacity, accuracy, confidentiality, efficiency, integrity, and availability. Among various algorithms Shor's technique is able to break various encryption algorithm with more supremacy as compared to conventional computing methods. In nutshell, paper will discuss about various QC algorithms and will illustrate how shor's algorithm is able to crack RSA.
Big Data refers to the extremely big datasets that are produced from different areas which exhibits certain trends and associations. Major areas of big data include medical data, sensor data, social networks such as f...
详细信息
ISBN:
(纸本)9781538695333
Big Data refers to the extremely big datasets that are produced from different areas which exhibits certain trends and associations. Major areas of big data include medical data, sensor data, social networks such as facebook, twitter, youtube etc. Among this, social networks produce large amount of data per millisecond which can be analysed for several predictive and analytic purposes. Tweets produced by twitter is used in sentiment analysis and polarity detection that helps in identifying the attitude, polarity of words, text or documents. Applying polarity detection in big data is a tedious task as it includes both historical and streaming data. Several frameworks have been proposed for analysing both historical and streaming data in big data. In this paper, lambda architecture for polarity detection of tweets has been proposed which analyses both streaming and historical data. Boththe data can be analysed in parallel and used for certain predictive and analytic purposes.
the Chinese Beidou-3 global navigation system broadcasts two modern open-service signals, named B1C and B2a, which are suggested to be involved in the Beidou-3 dual-frequency receivers. As acquisition is the largest r...
详细信息
ISBN:
(数字)9781728168968
ISBN:
(纸本)9781728168975
the Chinese Beidou-3 global navigation system broadcasts two modern open-service signals, named B1C and B2a, which are suggested to be involved in the Beidou-3 dual-frequency receivers. As acquisition is the largest resource consumption process in the baseband signal processing of a GNSS receiver, the optimization algorithms of it are of interest. To reduce the reliance on high-performance hardware and the cost of the commercial Beidou-3 receivers, this paper proposed an efficient dual-frequency signal acquisition strategy. the proposed method utilizes the relationships of B1C and B2a, enables a direct acquisition of B2a using accurate signal components (i.e. Doppler and code phase) predicted after captured the B1C signal. the experiment results on real signals demonstrate that the proposed method can successfully capture the B2a signal without a series of FFT blocks but only use three short parallel correlations. Compared withthe direct acquisition method, the proposed method can reduce the number of multiplications by 99.9% when the sampling frequency is set to 50MHz, while provide the same acquisition sensitivity.
Withthe rapid development of the information society, network information security has attracted more attention. Traditional software encryption technology is becoming more and more difficult to ensure people's i...
详细信息
ISBN:
(纸本)9781665423144;9781665446235
Withthe rapid development of the information society, network information security has attracted more attention. Traditional software encryption technology is becoming more and more difficult to ensure people's information security. How to quickly and efficiently ensure people's information security has become one of the key projects studied by scholars. Under this background, this paper designs a simple advanced encryption standard AES FPGA hardware implementation. the content includes the hardware structure design of AES encryption algorithm, comprehensive wiring with Quartus II 13.0, and simulation verification on Modelsim se 10.5.
暂无评论