Aggressive scaling increases the number of devices we can integrate per square millimeter but makes it increasingly difficult to guarantee that each device fabricated has the intended operational characteristics. With...
详细信息
ISBN:
(纸本)9781605584102
Aggressive scaling increases the number of devices we can integrate per square millimeter but makes it increasingly difficult to guarantee that each device fabricated has the intended operational characteristics. Without careful mitigation, component yield rates will fall, potentially negating the economic benefits of scaling. The fine-grained reconfigurability inherent in FPGAs is a powerful tool that can allow us to drop the stringent requirement that every device be fabricated perfectly in order for a component to be useful. To exploit inherent FPGA reconfigurability while avoiding full CAD mapping, we propose lightweight techniques compatible with the current single bitstream model that can avoid defective devices, reducing yield loss at high defect rates. In particular, by embedding testing operations and alternative path configurations into the bitstream, each FPGA can avoid defects by making only simple, greedy decisions at bitstream load time. With 20% additional tracks above the minimum routable hannel width, routes can tolerate 0.01% switch defect rates, raising yield from essentially 0% to near 100%. Copyright 2009 ACM.
Digital Image Processing (DIP) is a scientific discipline with techniques for processing images using computers. The digital image is expressed in a two-dimensional matrix. The research object is keratitis on the corn...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
Digital Image Processing (DIP) is a scientific discipline with techniques for processing images using computers. The digital image is expressed in a two-dimensional matrix. The research object is keratitis on the cornea. The keratitis image was obtained using a slit lamp photo at Rs. Padang Aye Center (PAC), based on the results ofthe diagnosis by looking at the development of the infiltrate or also called hypopyon, by measuring the ulcer borders horizontally and vertically with the aim of evaluating improvements that respond to treatment. The clinical results obtained cannot determine the extent and circumference of the keratitis layer area that responds to keratitis as a whole. The images used were 206 slit lamp images of keratitis. This research provides knowledge in the form of contrast values in the Active Contour method, resulting in an update called Contras Adjustment (CA)/CAimg, in correctly segmenting keratitis objects and providing measurements of the area and circumference of the keratitis area. The results of this study were from 206 slit lamp images, 195 slit lamp images of keratitis that detected keratitis correctly and 11 slit lamp images of keratitis that could not be detected, resulting in an accuracy of $\mathbf{9 5 \%}$.
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t...
详细信息
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and two flexible variants of 64-bit and 128-bit block sizes. In simulations, GIFT achieves good performance and surpasses both SIMON and SKINNY [1]. In 2013, Fuhr et al. [2] proposed a ciphertextonly fault analysis(CFA) of AES for three types of faults:zero-byte fault, zero-nibble fault,
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin...
详细信息
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t...
详细信息
CDMA cellular systems use soft handoff. Although the capacity of CDMA systems is interference-limited in nature, channel shortages may occur because soft handoff uses several channels simultaneously. To cope with this...
详细信息
CDMA cellular systems use soft handoff. Although the capacity of CDMA systems is interference-limited in nature, channel shortages may occur because soft handoff uses several channels simultaneously. To cope with this problem, we propose an improved handoff method which borrows channels from stationary calls participating in soft handoff and allocates the borrowed channels to handoff requests by moving calls when a channel shortage occurs. Borrowing from stationary calls is possible because these calls do not undergo fast-fading and do not require receiver diversity. The proposed method is designed to avoid increased interference resulting from channel-borrowing. The proposed channel-borrowing handoff scheme is analyzed in a situation involving both moving and stationary calls. A comparison is made between the performances of the typical IS-95-based handoff scheme and the proposed scheme. Numerical results show that the proposed scheme is better than the IS-95 scheme in view of the handoff refused probability, the handoff queuing delay.
Honeypots are traps designed to resemble easy-to-compromise computersystems in order to deceive botmasters. Such security traps help security professionals to collect valuable information about botmasters' techni...
详细信息
ISBN:
(纸本)9781457720529
Honeypots are traps designed to resemble easy-to-compromise computersystems in order to deceive botmasters. Such security traps help security professionals to collect valuable information about botmasters' techniques and true identities. Depending on the complexity of services provided by honeypots, botmasters might be able to detect these traps by performing a series of tests. In particular, to detect honeypots, botmasters can command compromised machines to perform specific actions such as targeting sensor machines controlled by them. If honeypots were designed to completely ignore these commands, then they can easily be detected by the botmasters. On the other hand, full participation by honeypots in such activities has its associated costs and may lead to legal liabilities. This raises the need for finding the optimal response strategy needed by the honeypot in order to prolong its stay within the botnet without sacrificing liability. In this paper, we address the problem of honeypot detection by botmasters. In particular, we present a Bayesian game theoretic framework that models the interaction between honeypots and botmasters as a non-zero-sum noncooperative game with uncertainty. The game solution illustrates the optimal response available for both players. Simulation results are conducted to show the botmasters' behavior update and possible interactions between the game players. The obtained results can be utilized by security professionals to determine their best response to these kind of probes by botmasters.
The flow around an elastic body is treated as a fluid-structure interaction (FSI), numerous fluid-structure coupled problems have been performed. Recently, two-way coupled analysis, which considers the fluid-structure...
详细信息
The 3D reconstruction of a Golgi-stained dendritic tree from a serial stack of images captured with a transmitted light bright-field microscope is investigated. Modifications to the boot-strap filter are discussed suc...
详细信息
The 3D reconstruction of a Golgi-stained dendritic tree from a serial stack of images captured with a transmitted light bright-field microscope is investigated. Modifications to the boot-strap filter are discussed such that the tree structure may be estimated recursively as a series of connected segments. The tracking performance of the bootstrap particle filter is compared against Differential Evolution, an evolutionary global optimisation method, both in terms of robustness and accuracy. It is found that the particle filtering approach is significantly more robust and accurate for the data considered.
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situ...
详细信息
ISBN:
(纸本)9781509017225
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situation are also in place. The systematic reviews of a well-known methods and approaches shows a significant numbers of researches been done in this area. Based on the number of effort and researches, the quality of services should proportionately increase alongside them. We look this matter from the perspectives of enforcement, that evident the stand of quality of services. Service Level Agreement (SLA) enforcement impact measures is a potential research area to be explored. Assumptions that this study is making are, SLA management will become better by a firm enforcement, where every customers are responsible to launch report of bugs or mischief of services such as unsatisfactory quality or service unavailability to a collection pool, and the provider will react immediately to the complaints so that the total downtime not exceeding the SLA value, with efficient enforcement. This study establishes fundamental theory to measure enforcement impact to SLA monitoring and management. We proposed eight activity phases from formulating until analyzing and decision formation. Descriptive statistics is utilized to analyze the extracted data. The SLA validation detection is the most frequent purpose of SLA monitoring systems in cloud by 58% and throughput is checked as an attribute target by 28%. The self-monitoring SLA, self-healing system, hierarchical structure are recognized points of SLA monitoring systems which need improvement before the enforcement could be based upon.
暂无评论