With the exponential growth of data and computational needs, traditional computing approaches find them- selves increasingly limited. While quantum computing emerges as a revolutionary alternative that promises soluti...
详细信息
Virtual community is the specific application of virtual reality technology in the digital era. Virtual community reproduces the landscape and architecture of the real community, enabling people to roam on the compute...
详细信息
In cricket training, preventing injuries and developing skills are of utmost importance, especially concerning the school cricketers. This research presents a web application, 'CricBoost' which would serve to ...
详细信息
Von-Neumann architecture has been the popular choice for the processing of instructions for various applications. With the scaling of MOSFETs, the performance of logic gate improves and interconnect delay becomes barr...
详细信息
ISBN:
(纸本)9798350385939;9798350385922
Von-Neumann architecture has been the popular choice for the processing of instructions for various applications. With the scaling of MOSFETs, the performance of logic gate improves and interconnect delay becomes barrier to latency during instruction execution. Solutions for this are logic in memory (LIM), in-memory computing (IMC). In this paper, 6T and 8T static random access memory (SRAM) cells are used for in memory computing applications. 8T static random access memory cell-based logic offers better noise margin and consumes less energy compared to 6T cell-based logic. While observing logical NOR operation using 6T cell the maximum delay of 37.96ps occurs for the input 10 and power consumption of 40.58 mu W for the input 00/11. When the same operation had performed with 8T cell the maximum delay of 17.67ps occurs for the input 01/10 and power consumption of 157.4nW. Therefore, 8T SRAM based LIM can provide energy efficient solution.
Cloud computing has indeed been a transformative milestone in the computing landscape, reshaping traditional practices. However, the expansion of cloud computing faces its hurdles, with forecasting computing resource ...
详细信息
This exploratory research aims to offer a slice-edge frame that merges Virtual Reality (VR) technology with Internet of Things (IoT) detector networks, augmented reality (AR), and mixed reality (MR) to achieve greater...
详细信息
This exploratory research aims to offer a slice-edge frame that merges Virtual Reality (VR) technology with Internet of Things (IoT) detector networks, augmented reality (AR), and mixed reality (MR) to achieve greater data processing capabilities. The purpose of this study is to accomplish this goal. The framework incorporates the fundamentals of e-commerce, customer relationship management (CRM), and management information systems (MIS) to produce an output that is comprehensive in nature. The frame seeks to give immersive and engaging gestures while simultaneously handling and analyzing huge amounts of data efficiently. In addition to leveraging virtual reality, augmented reality, and mixed reality, the frame will also utilize mixed reality. Through the implementation of this integration, it is possible to enhance decision-making processes, increase customer involvement, and speed up operational operations across a wide range of industries. Throughout the course of this investigation, the suggested framework's design, implementation, and evaluation are thoroughly examined. The study also highlights the potential for the framework to be used to adjust data recycling methods and to reshape the geographical landscape of digital ecosystems. Both of these possibilities are highlighted in the research
In parallel computing applications, containerization technology provides an efficient, reliable, and scalable way to manage and deploy applications. Additionally, RDMA (Remote Direct Memory Access) technology meets th...
详细信息
Mutual funds hold significant appeal as investment instruments. Nevertheless, some investors express concerns regarding the safety and effectiveness of purchasing mutual funds online or through a mobile app. This stud...
详细信息
Software-defined networking (SDN) has revolutionized the landscape of network management by decoupling control and data planes and becoming the backbone of many IT infrastructures including data centers, cloud computi...
详细信息
ISBN:
(纸本)9798350377774;9798350377767
Software-defined networking (SDN) has revolutionized the landscape of network management by decoupling control and data planes and becoming the backbone of many IT infrastructures including data centers, cloud computing, and enterprise networks. At the same time, however, the control plane has become a prime target for adversaries due to its critical role in network operations and centralized control functions. In this paper, we demonstrate how to discover the identity of different SDN controllers, which could be leveraged for more sophisticated attacks by adversaries. Our approach adopts a timing-based side channel and deep neural networks (DNN). To achieve this, we analyze real-world SDN traffic in a research computing center and accurately identify the controllers, minimizing the impact of random noise. Despite various factors that influence controller behaviors, our finger-printing approach achieves an average accuracy of more than 90%. Lastly, the mitigation strategies are also discussed.
Blockchain is the technology on which cryptocurrencies operate within the 6G Internet of Things. Due to its flexibility, it has received significant adoption in numerous applications as a possible distributed data man...
详细信息
暂无评论