In this paper, we proposed an advanced Petri Net model to manage the workflow of a web-based multiple participants in virtual University. The presented approach not only can conspicuously help the developer to compreh...
详细信息
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key...
详细信息
In this paper, we derive a recursive algorithm for finite field multiplication over GF(2 m ) based on irreducible all-one-polynomials (AOP), where the modular reduction of degree is achieved by cyclic-left-shift witho...
详细信息
ISBN:
(纸本)9781424427482
In this paper, we derive a recursive algorithm for finite field multiplication over GF(2 m ) based on irreducible all-one-polynomials (AOP), where the modular reduction of degree is achieved by cyclic-left-shift without any logic operations. A regular and localized bit-level dependence graph (DG) is derived from the proposed algorithm and mapped into an array architecture, where the modular reduction is achieved by a serial-in parallel-out shift-register. The multiplier is optimized further to perform the accumulation of partial products by the T flip flops of the output register without XOR gates. It is interesting to note that the optimized structure consists of an array of (m+1) AND gates between an array of (m+1) D flip flops and an array of (m+1) T flip flops. The proposed structure therefore involves significantly less area and less computation time compared with the corresponding existing structures.
Emergency service vehicles need safety and fluent paths to save time. In this paper, a centralized traffic control mechanism is proposed for the evacuation of vehicles that drive toward the dedicated path of the emerg...
详细信息
The Radio Frequency Identification (RFID) positioning based on the signal strength is the well know and feasible method. But the researches based on signal strength only usually make unsatisfied positioning error beca...
详细信息
ISBN:
(纸本)9781424452279;9781424452286
The Radio Frequency Identification (RFID) positioning based on the signal strength is the well know and feasible method. But the researches based on signal strength only usually make unsatisfied positioning error because of the instable of RFID signal. In this paper, we propose an indoor RFID positioning system which is based on the analysis of signal strength, the layout of sensing region, and the tracks of users. Different from the other RFID positioning systems, we use only one RFID reader with user, and the tags are layout in the positioning area systematically. The system integrates two phase work of positioning: analysis of signal strength in overlapping sensing area (Level 1), and analysis of users' movement directions with signal comparison (Level 2). The experiments show that the proposed mechanism improves the accuracy of positioning successfully.
To fight against fault based side-channel cryptanalysis, a bit-parallel systolic dual basis multiplier using a time redundancy scheme is presented. This scheme is based on the extended dual multiplication to achieve t...
详细信息
To fight against fault based side-channel cryptanalysis, a bit-parallel systolic dual basis multiplier using a time redundancy scheme is presented. This scheme is based on the extended dual multiplication to achieve the concurrent error correction (CEC) in the results. Analytical results reveal that our proposed CEC multiplier demands 1.87% space overheads, while the existing multipliers using parity prediction and time/hardware redundancy schemes demand at least 45% space overheads. Moreover, the time overhead of the proposed scheme amounts to only two clock cycles.
Web services and AJAX technology is an application communication standard, component model and programming language that can solve the problems with enterprises' business integration. A new business logic framewor...
详细信息
We have studied various methods for improving the performance of PC clusters. Most of them have used special hardware, non standard protocols, so that need special added library and complex programming, tending to rai...
详细信息
We have studied various methods for improving the performance of PC clusters. Most of them have used special hardware, non standard protocols, so that need special added library and complex programming, tending to raise their cost and to spoil their flexibility. To solve their problems we propose improving of Bonding driver. This improvement have a good influence on some kinds of parallel applications on commodity PC clusters without costing a great deal, using comparatively simple method where distribute sending frames to multiple network interface cards (hereafter NICs) on a round-robin basis. This means divide communication loads equally between multiple NICs attached to each PC. We measured the maximum bandwidth and parallel performance for the PC cluster with Gigabit Ethernet. A result shows our proposal method improves the bandwidth and the performance of several parallel benchmarks in comparison with the system using single NIC (hereafter 1NIC) and existing Bonding driver (hereafter Bond). The bandwidth comes up to 1,249 Mbps which is 1.33 times and 1.47 times faster than those of 1NICand Bond. The bandwidth of Bond cannot even reach that of 1NIC. The results of SP and BT in NAS Parallel Benchmarks (NPB) come up to 1,715 Mop/s and 5,264 Mop/s which are 1.81 and 1.63 times faster than 1NIC, 1.17 and 1.15 times faster than Bond respectively.
The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, f...
详细信息
ISBN:
(纸本)9781424452279;9781424452286
The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, from being attacked. In the paper, Voronoi diagram is utilized to And a vulnerable path, which is a path that an intruder may pass through. While the vulnerable path passes over a TBP area, a backward tracing and critical sets selection schemes are used to move the fewest number of sensors such that the vulnerable path can be changed and the new vulnerable path will not pass over the TBP area. Moreover, a moving schemes is proposed to decide where mobile sensors shall move. Since sensor movement is the major resource of energy consumption, thus, in order not to cause much movement, the proposed mechanism can move the fewest number of sensors with the shortest distance. Simulation results also verify the advantages of the proposed mechanism.
Inquiring traffic information is an important issue in vehicular ad hoc networks. This paper proposes an aggregating data dissemination algorithm in vehicular ad hoc networks. This algorithm can offer the various degr...
详细信息
Inquiring traffic information is an important issue in vehicular ad hoc networks. This paper proposes an aggregating data dissemination algorithm in vehicular ad hoc networks. This algorithm can offer the various degrees of traffic information when users propose inquiry for different regional ranges. The user often needs to obtain the detailed data from the small area or the summary data for the large area. The traffic information is aggregated and kept in the periphery of region. When users inquire for the small area, they can get the detailed data. If the inquire is for the large area, users can obtain the summary data. The simulation results show that our algorithm decreases more communication cost and increases more accuracy than those for the previous work. Additionally, the users can obtain the data quickly, when they only need the summary data.
暂无评论