Recently, cryptographic applications based on finite fields have attracted much interest. This paper presents a unified systolic multiplier under the method of the multiply-by-alpha 2 and the folded technique. This c...
详细信息
Recently, cryptographic applications based on finite fields have attracted much interest. This paper presents a unified systolic multiplier under the method of the multiply-by-alpha 2 and the folded technique. This circuit can be suited for implementing both multiplication and squaring in GF(2 m ). The results show that our proposed multiplier saves about 75% space complexity and 50% latency as compared to the traditional multipliers proposed by Yeh et al. and Wang-Lin. Also, the proposed squarer saves about 45% space complexity as compared to the traditional squarer presented by Guo and Wang.
Multi-Agent Systems (MAS) are collection of loosely coupled intelligent agents. These systems operate in a distributed, highly dynamic, unpredictable and unreliable environment in order to meet their overall goals. Ag...
详细信息
In this paper we have developed a fuzzy intelligent agent with a fuzzy emotional component. This component evaluates the degree of anger emotion which the intelligent agent may feel when it encounters to a persecuting...
详细信息
ISBN:
(纸本)9780889866638
In this paper we have developed a fuzzy intelligent agent with a fuzzy emotional component. This component evaluates the degree of anger emotion which the intelligent agent may feel when it encounters to a persecuting event. For this purpose we have implemented a fuzzy inference system using Java environment and we have considered three parameters related on human anger emotion as the inputs of this system. The system outputs can be used in agent decision making process by combination this anger intensity to other emotion intensities and applies them for choosing a proper action from some available actions.
This paper studied the effect of chaos-based spreading sequences on the performance of asynchronous multi-carrier (MC) direct sequence (DS) code division multiple access (CDMA) systems. It is demonstrated that the per...
详细信息
Optical SMART (Scalable Multi-Access Reconfigurable Transport) network [J] is an emerging optical networking paradigm that can effectively provide connectivity based on the hypergraph theory. Similar to a conventional...
详细信息
We have studied various methods for improving the performance of SMP clusters. Most of them are using special hardware, non standard protocols, so that need special added library and complex programming, tending to ra...
详细信息
We have studied various methods for improving the performance of SMP clusters. Most of them are using special hardware, non standard protocols, so that need special added library and complex programming, tending to raise their cost and to spoil their flexibility. To solve their problems we propose a CPU vs. NIC one to one correspondence method for improving parallel processing performance in a PC cluster, using comparatively simple method where transmitting NICs are fixedly assigned to CPUs one to one. So that the communication load between PCs can be balanced. Applying this method to parallel processing in a dual PC cluster, and comparing this method with conventional ordinary ones, we have obtained better result for some benchmarks.
Energy efficiency is a key issue because most wireless sensor networks use battery-oriented computing and sensing devices. A network of these devices will collaborate for a common application such as environment monit...
详细信息
ISBN:
(纸本)9781424431526;9780769525588
Energy efficiency is a key issue because most wireless sensor networks use battery-oriented computing and sensing devices. A network of these devices will collaborate for a common application such as environment monitoring. Thus, energy-efficient MAC protocols have focused on minimizing idle listening time at sensor nodes. Recently, energy-efficient protocols such as S-MAC, B-MAC and EA-ALPL proposed to reduce energy consumption. Here, we propose a cross-layer mechanism called cross layer medium access control (CLMAC) protocol that designed for wireless sensor networks. To meet energy-efficient routing, the CLMAC includes routing distance in the preamble field of the B-MAC. Because the CLMAC unified network layer and link layer uses routing distance without big routing table, it enables nodes to reduce control traffic routing overhead. Also, the CLMAC makes it possible to extend the lifetime of the wireless sensor networks that contain a number of nodes. The analytical results show that CLMAC protocol reduces routing overhead of the sensor nodes in wireless sensor networks.
As a security principle, separation of duty (SoD) is widely considered in computer security. In the role-based access control(RBAC) model, separation of duty constraints enforce conflict of interest policies. There ar...
详细信息
As a security principle, separation of duty (SoD) is widely considered in computer security. In the role-based access control(RBAC) model, separation of duty constraints enforce conflict of interest policies. There are two main types of separation of duty policies in RBAC, Static SoD (SSoD) and Dynamic SoD (DSoD). In RBAC, Statically Mutually Exclusive Role (SMER) constraints are used to enforce Static Separation of Duty policies. Dynamic Separation of duty policies, like SSoD policies, are intended to limit the permissions that are available to a user. However, DSoD policies differ from SSoD policies by the context in which these limitations are imposed. A DSoD policy limits the availability of the permissions over a users permission space by placing constraints on the roles that can be activated within or across a users sessions. Like SMER, in RBAC Dynamically Mutually Exclusive Role (DMER) constraints are used to enforce DSoD policies. We investigated using of a fuzzy approach to address the issue in order to provide a more practical solution. In this paper, we propose a model to express the separation of duty policies in RBAC using the fuzzy set theory. The concept of trustworthiness, which is fuzzy in nature, is used to express this model. In comparison with non-fuzzy methods, our method is more pragmatic and more consistent with the real world. The expressiveness of our method is higher than the non- fuzzy ones. We show expression of some constraints in our method which cannot be expressed by non-fuzzy methods. Applicability of the method is shown through an example of the real world.
Role-Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. However, due to the large number of users in nowadays online se...
详细信息
Role-Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. However, due to the large number of users in nowadays online services of organizations and enterprises, assigning users to roles is a tiresome task and maintaining user-role assignment up- to-date is costly and error-prone. Additionally, with the increasing number of users, RBAC may have problems in prohibiting cheat and changing roles of users. In order to categorize information and formulate security policies, human decision making is required which is naturally fuzzy in the real world. This leads using a fuzzy approach to address the issue in order to provide a more practical solution. In this paper, applicability of fuzzy set theory to RBAC has been investigated by identifying access control building blocks which are fuzzy in essence. An existing RBAC model is extended to allow imprecise access control policies, using the concept of trustworthiness which is fuzzy in nature. We call the extended model as Fuzzy RBAC. Applicability of the extended model has been evaluated through some case studies.
暂无评论