this paper presents VLSI implementation of an area efficient 8-error correcting (63,47) Reed-Solomon(RS) encoder and decoder for the CDPD (Cellular Digital Packet Data)communication systems[1]. We implement this RS de...
详细信息
ISBN:
(纸本)0780366778
this paper presents VLSI implementation of an area efficient 8-error correcting (63,47) Reed-Solomon(RS) encoder and decoder for the CDPD (Cellular Digital Packet Data)communication systems[1]. We implement this RS decoder using Euclidean algorithms which is regular, simple and naturally suitable for VLSI implementation. Constant multipliers based on certain composite field are deployed in the encoder, which significantly decreases the encoder's area. Multipliers over certain composite field GF((2(n))(2)) adopted in this paper lowers the complexity of the multiplication of the decoder. the RS encoder and decoder can independently operates at a clock frequency of 30 MHz. this chip was fabricated in 0.6mum CMOS 1P2M technology with a supply of voltage of 5v, with die area 4mm x 4mm. the chip has been fully tested and stratifies the demand of the CDPD communication systems.
the on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cl...
详细信息
ISBN:
(纸本)9798350397284
the on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cloud functions are usually spread among several locations, each of which constitutes a data center. Customers may save money on capital expenses by using cloud computing, which frequently takes a 'pay-as-you-go' approach. Coherence in cloud computing is achieved by sharing resources. In today's world of the Internet, demand for cloud services is increasing drastically leading to the production of new services day by day. As the services increase, the data gets primarily targeted by spiteful users who attempt to steal the data for their own atrocious and unethical activities. Users and trustworthy applications are considering more security and privacy and services get more in demand. Moreover, this study has reviewed several algorithms such as CPE-ABE (Ciphertext policy attribute-based encryption), ABE, KP-ABE (Key policy attribute-based encryption) CSP (Constraint satisfaction problem), PKG, AES (Advanced Encryption Standards), SHA-1 (Secure Hash Algorithm), Photo encryption, Photo decryption, PRE, IDEA (international Data Encryption algorithm) and LSBG (Least Significant Bit Grouping) for image data security. As already discussed, the increasing threats and frauds around the world, safe and secure applications and services should be created to resolve this problem so that people can store data on a platform that can be relied on. this research study has discussed about the concept of what are the paradigms required for securing and protecting the data and securing the image data at an encrypted level. this study has reviewed several existing research works, studied different algorithms which have been used in different research articles, and compared their strengths and drawbacks accordingly. Different research works have been summarized in a form of ta
Performance evaluation of platform resource management protocols, require realistic workload models as input to obtain reliable, accurate results. this is particularly important for workloads with large variations, su...
详细信息
ISBN:
(纸本)9789897581960
Performance evaluation of platform resource management protocols, require realistic workload models as input to obtain reliable, accurate results. this is particularly important for workloads with large variations, such as video streams generated by advanced encoders using complex coding tools. In the modern High Efficiency Video Coding (HEVC) standard, a frame is logically subdivided into rectangular coding units. this work presents synthetic HEVC decoding workload generation algorithms classified at the frame and coding unit levels, where a group of pictures is considered as a directed acyclic graph based taskset. Video streams are encoded using a minimum number of reference frames, compatible with low-memory decoders. Characteristic data from several HEVC video streams, is extracted to analyse inter-frame dependency patterns, reference data volume, frame/coding unit decoding times and other coding unit properties. Histograms are used to analyse their statistical characteristics and to fit to known theoretical probability density functions. Statistical properties of the analysed video streams are integrated into two novel algorithms, that can be used to synthetically generate HEVC decoding workloads, with realistic dependency patterns and frame-level properties.
As you know, this fifthinternational CompSysTech conference is dedicated to the 30th anniversary of the Department of Computer systems and Technologies of Rousse University and to the 5th anniversary of the ACADEMIC ...
ISBN:
(纸本)9789549641387
As you know, this fifthinternational CompSysTech conference is dedicated to the 30th anniversary of the Department of Computer systems and Technologies of Rousse University and to the 5th anniversary of the ACADEMIC SOCIETY OF COMPUTER systems AND TECHNOLOGIES. On such occasions it is common practice to read lengthy and boring academic addresses which slowly but surely send the audience to sleep. We shall try to somehow depart from this tradition.
the proceedings contain 24 papers. the special focus in this conference is on Invited Lecture;Regular Papers. the topics include: A Case for Message Oriented Middleware;Revisiting the Weakest Failure Detector for Unif...
ISBN:
(纸本)3540665315
the proceedings contain 24 papers. the special focus in this conference is on Invited Lecture;Regular Papers. the topics include: A Case for Message Oriented Middleware;Revisiting the Weakest Failure Detector for Uniform Reliable Broadcast;Efficient algorithms to Implement Unreliable Failure Detectors in Partially Synchronous systems;Solving Consensus Using Chandra-Toueg's Unreliable Failure Detectors: A General Quorum-Based Approach;A Dynamic Primary Configuration Group Communication Service;Asynchronous Group Membership with Oracles;Generic Broadcast;Non-Blocking Asynchronous Byzantine Quorum systems;Byzantine Agreement Secure Against General Adversaries in the Dual Failure Model;Randomness Recycling in Constant-Round Private Computations;Abuse-free Multi-Party Contract Signing;Fair and Efficient Mutual Exclusion algorithms;Fast and Scalable Mutual Exclusion;the Congenial Talking Philosophers Problem in Computer Networks;Software Fault Tolerance of Concurrent Programs Using Controlled Re-execution;DUALITY: An Architecture Independent Design Model for Parallel systems Based on Partial Order Semantics;A New Rewrite Method for Proving Convergence of Self-Stabilizing systems;Stabilization-Preserving Atomicity Refinement;Self-Testing/Correcting Protocols;Randomization Helps to Perform Tasks on Processors Prone to Failures;A New Scheduling Algorithm for General Strict Multithreaded Computations;Consensus Numbers of Transactional Objects;Linearizability in the Presence of Drifting Clocks and Under Different Delay Assumptions and Maintenance of a Spanning Tree in Dynamic Networks.
the rapid expansion of wireless technologies demands effective management of complex RAN for MIMO in 5G systems. Current architectures and RAN Intelligent Controllers (RICs) lack critical real-time data processing and...
详细信息
Chest disease is one of the most common diseases. Chest X-ray is an important method to examine and diagnose chest diseases. the combination of artificial intelligence and X-ray images can appropriately alleviate the ...
详细信息
A system of indicators of the structure and dynamics of operational freight turnover, which includes environmental protection expenditure, carbon dioxide (CO2) emissions from railway transport enterprises was created....
详细信息
A system of indicators of the structure and dynamics of operational freight turnover, which includes environmental protection expenditure, carbon dioxide (CO2) emissions from railway transport enterprises was created. A multilevel hierarchical model of the relationship between: operational turnover and the amount of CO2 emissions by the relevant sources of pollution in terms of their volume and structure (the first level);environmental expenditure and the amount of CO2 emissions (the second level), was developed. the results of the study confirmed that largely the reduction of such harmful emissions is due to the size and structure of expenditure for environmental projects. the novelty of the article is the development of methodological approaches to test the hypothesis that with increasing environmental expenditure for environmental protection, CO2 emissions from rolling stock and stationary sources of pollution of the six railways of Ukraine are reduced.
Private and public organizations have long relied on intrusion detection systems to alert them of malicious activity in their digital networks. these systems were designed to detect threat signatures in static network...
详细信息
ISBN:
(纸本)9789916978917;9789916978900
Private and public organizations have long relied on intrusion detection systems to alert them of malicious activity in their digital networks. these systems were designed to detect threat signatures in static networks or infer anomalous activity based on their security 'logs'. they are, however, of limited use to detect threats across heterogeneous, modern-day networks, where computing resources are distributed across cloud or routing services. Recent advancements in machine learning have led to the development of autonomous threat detection (ATD) applications that monitor, evaluate, and respond to malicious activity with minimal human intervention. the use of 'intelligent' and programmable algorithms for ATD will reduce incident response times and enhance the capacity of states to detect threats originating from any layer of their territorial information and communications technologies (ICT) infrastructure. this paper argues that ATD technologies will influence the evolution of a due diligence Mc for cyberspace by raising the standard of care owed by states to prevent their networks from being used for malicious, transboundary ICT activities. this paper comprises five sections. Section 1 introduces the paper and its central argument. Section 2 outlines broad trends and operational factors pushing public and private entities towards the adoption of ATD. Section 3 offers an overview of a typical ATD application. Section 4 analyses the impact of ATD on the due diligence obligations of states. Section 5 presents the paper's conclusions.
暂无评论