As the network-on-chip (NoC) integrated into an SoC design can come from an untrusted third party, there is a growing risk that data integrity and security get compromised when supposedly sensitive data flows through ...
详细信息
As the network-on-chip (NoC) integrated into an SoC design can come from an untrusted third party, there is a growing risk that data integrity and security get compromised when supposedly sensitive data flows through such an untrusted NoC. We thus introduce a new method that can ensure secure and secret data transmission over such an untrusted NoC. Essentially, the proposed scheme relies on encoding binary data as delays between packets travelling across the source and destination pair. The maximum data transmission rate of this inter-packet-delay (IPD)-based communication channel can be determined from the analytical model developed in this article. To further improve the undetectability and robustness of the proposed data transmission scheme, a new block coding method and communication protocol are also proposed. Experimental results show that the proposed IPD-based method can achieve a packet error rate (PER) of as low as 0.3% and an effective throughput of 2.3 x 10(5) b/s, outperforming the methods of thermal covert channel, cache covert channel, and circuit-based encryption and, thus, is suitable for secure data transmission in unsecure systems.
In this study, we present our findings with regard to teaching basic programming concepts at an Open Access Institution. The goal was to gather insight into how to best introduce programming to our students. We found ...
详细信息
ISBN:
(纸本)9781450399210
In this study, we present our findings with regard to teaching basic programming concepts at an Open Access Institution. The goal was to gather insight into how to best introduce programming to our students. We found that our students should start with block coding, as a means to slowly and easily introduce coding concepts. Then they are ready for text-based programming skills. This flow allows them to understand and be able to apply basic computing concepts and enjoy the process of learning. Also, introducing block coding should be done via a fun game or activity to entice them to want to learn programming.
This paper is devoted to a transform-based quantitative data compression technique involving rapid enumeration in a unary-binary time-based numeral system (NS). The symbols comprising the alphabets of human-computer i...
详细信息
ISBN:
(纸本)9781728168234
This paper is devoted to a transform-based quantitative data compression technique involving rapid enumeration in a unary-binary time-based numeral system (NS). The symbols comprising the alphabets of human-computer interaction languages (HCIL), which are used in an informational message (IM), are collected in primary code tables, such as the ASCII table. The statistical-oriented data compression method using unconventional timer encryption and encoding information are proposed by us. It was constructed probability - discrete model of the set of character sequences and characterized some probabilistic algorithms associated with the recovery of text by its public key and its cipher. We find the possibility of parallel implementation of this method by building a block of timer tags. The necessary complex assessments are made. The method can be used to compress SMS messages. Probabilistic-statistical analysis and evaluation of their effectiveness are obtained.
This article introduces a parity-check code based on the Rademacher function. The error-correction model of the code corresponds to a binary symmetrical channel: bits may be inverted randomly and independently, but no...
详细信息
We are proposing a workshop that instructs the audience on how to develop fun and engaging projects involving different technologies. These types of projects can be used by faculty to introduce programming skills in t...
详细信息
ISBN:
(纸本)9798400711060
We are proposing a workshop that instructs the audience on how to develop fun and engaging projects involving different technologies. These types of projects can be used by faculty to introduce programming skills in the classroom, but they are also a fantastic resource for outreach activities. Students can create these projects as a way to develop and promote their technical skills. Presenters will also share best practices and allow for discussion in creating and then conducting these projects at their institution.
The primary goal of this project is to educate our audience about algorithms. We used Sphero, a fun and engaging robot sphere, to pique the interest of our participants with the intent of promoting STEM and Informatio...
详细信息
ISBN:
(纸本)9798400711060
The primary goal of this project is to educate our audience about algorithms. We used Sphero, a fun and engaging robot sphere, to pique the interest of our participants with the intent of promoting STEM and Information Technology. By participating in our workshops, our audience experimented with *** and block coding, which allowed them to learn about algorithms through easily replicable examples. This project showed our workshop participants that programming can be fun. The workshop results proved that the audience had an increased interest in programming.
This paper shows how a novel infrastructure which makes use of the multiple antennas available on IEEE 802.11n Access Points can be combined with block erasure coding to multicast video with no packet loss. This paper...
详细信息
ISBN:
(纸本)9781479937554
This paper shows how a novel infrastructure which makes use of the multiple antennas available on IEEE 802.11n Access Points can be combined with block erasure coding to multicast video with no packet loss. This paper also shows that this can be obtained while maintaining an efficient code rate, which is better than 1) packet repetition on the new infrastructure, 2) block erasure coding on the legacy infrastructure and 3) Leader-Based Protocols used on the legacy infrastructure. This study employs physical layer data rates of 52Mbps, 58.5Mbps and 65Mbps. Hence the infrastructure proposed solves also the "Performance Anomaly Problem" which results with legacy multicast that transmits the data using the most robust modulation and coding scheme.
Erasure-and-error decoding is a general form of channel decoding and is a basis of important coding schemes, such as the concatenated coding scheme and coded ARQ. However, there do not exist enough discussions on the ...
详细信息
Erasure-and-error decoding is a general form of channel decoding and is a basis of important coding schemes, such as the concatenated coding scheme and coded ARQ. However, there do not exist enough discussions on the interrelationship between erasure-and-error decoding schemes. In this paper, threshold decoding schemes are discussed in a systematic manner and compared with Forney's optimal scheme. Some confusions in known results are pointed out and new results on threshold decoding are shown.
Modern medical imaging requires storage of large quantities of digitized clinical data. To provide high bandwidth and to reduce the storage space, a medical image must be compressed before transmission. One of the bes...
详细信息
Modern medical imaging requires storage of large quantities of digitized clinical data. To provide high bandwidth and to reduce the storage space, a medical image must be compressed before transmission. One of the best image compression techniques is using the Haar wavelet transform. The method of discrete cosine transform (DCT) is chosen to be the preprocessing scheme to identify the image frequency information and has excellent energy compaction property. The block coding algorithm uses a wavelet transform to generate the sub band samples, which can be quantized and coded. It is more robust to errors than many other wavelet-based schemes. In this article, simulations are carried out on different medical Images and it demonstrates the performance in terms of peak signal to noise ratio (PSNR) & bits per pixel (BPP). Our proposed method is found to preserve information fidelity while reducing the amount of data. (c) 2014 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 24, 175-181, 2014
暂无评论