Power consumption has been recognized as a grand challenge for nanoelectronics. With continuous scaling, wires (much more than devices) are going to be determining (almost entirely) the dynamic power: (i) their number...
详细信息
Power consumption has been recognized as a grand challenge for nanoelectronics. With continuous scaling, wires (much more than devices) are going to be determining (almost entirely) the dynamic power: (i) their numbers are increasing exponentially, as each device needs a few wires; and (ii) they do not scale well, as their parasitic capacitances and RC-delays are not scaling in synch with device scaling. That is why innovations on both evolutionary (i.e., based-on-wires) as well as revolutionary (i.e., without-wire, or beyond-wire) solutions are called upon to tackle this challenge. Trying to find inspiration from neurons, we focus on axons which are able to communicate at quite large distances on an amazingly limited power budget. In particular, the paper analyzes axon-inspired communications as dense locally-connected arrays of voltage-gated (non-linear) ion channels. Our theoretical results suggest that hexagonal arrays should minimize power consumption. Emulating the logical functioning of voltage-gated ion channels by single-electron technology/transistor gates can lead to practical power/energy lower bounds for nanoelectronics.
Wireless sensor network is a growing technology which is offering solution to variety of application areas such as health care, military and industry. These kinds of networks usually apply number of devices known as s...
详细信息
Wireless sensor network is a growing technology which is offering solution to variety of application areas such as health care, military and industry. These kinds of networks usually apply number of devices known as sensor devices. These sensors which are limited are distributed over the environment and communicate through the wireless media. As sensor devices are limited the network exposed to variety of attacks. Conventional security mechanisms are not suitable for WSNs as they are usually heavy and nodes are limited. One of the most severe attacks to detect and defend in wireless sensor network is wormhole attack which data will be forwarded from one part of the network to the other part trough the wormhole tunnel. In this paper we focused on wormhole attack and proposed distributed network discovery approach to mitigate its effect. According to the simulation our approach can mitigated almost 100% of wormhole attack overload in the environment where 54% of nodes are affected with the wormhole.
Current neonatal illness scoring systems are not designed to predict outcomes for individual patients, but rather can provide an overview of a population of patients for objective comparison when reporting outcomes. H...
详细信息
Nowadays, Web Services are considered as de facto and attracting distributed approach of application/services integration over the Internet. Web Services can also operate within communities to improve their visibility...
详细信息
Nowadays, Web Services are considered as de facto and attracting distributed approach of application/services integration over the Internet. Web Services can also operate within communities to improve their visibility and market share. In a community, Web Services usually offer competing and/or complementing services. In this paper, we augment the community approach by defining a specific-purpose community to monitor Web Services operating in any Web Services community. This monitoring community consists of a set of Web Services capable of observing other Web Services. Clients, providers, as well as managers of communities can make use of the monitoring community to check if a Web Service is operating as expected. This paper defines the overall architecture of the monitoring community, the business model behind, different rules and terms to be respected by its members, services it offers to its various classes of customers. The paper also presents promising experimental results using the monitoring community.
In this study, a multi-phase time series prediction approaches is proposed for solving the motorway flow forecasting problem. The schemes presented here is based on an extensive study of flow patterns that were collec...
详细信息
In this study, a multi-phase time series prediction approaches is proposed for solving the motorway flow forecasting problem. The schemes presented here is based on an extensive study of flow patterns that were collected from a densely used ring road of Amsterdam, The Netherlands. The new prediction approach proposed here is based on a multiphase information extraction whose ultimate goal is to forecast traffic states at the boundary points of a network. With its simple architecture that makes the proposed approach of interest of practical application, a significant improvement is achieved in comparison with existing models. In its general form, the proposed approach could handle the curse of dimensionality, a common problem associated with the number of dimensions of input space.
Single-row routing is a method for routing pair of nodes set in a single-row axis. The nets construct the wire without traverse each other in the printed circuit board design that has been drawn from left to right. Th...
详细信息
Single-row routing is a method for routing pair of nodes set in a single-row axis. The nets construct the wire without traverse each other in the printed circuit board design that has been drawn from left to right. The main purpose in single-row routing is to achieve the optimal results of minimum congestion arise from the number of horizontal tracks in the network. Optimal results for a single layer network have been achieved through a model called Enhanced Simulated Annealing Single-row Routing (ESSR). However, a single layer model suffers from non-tolerable lower bound values with high congestion depending on the network size. These results may further be improved by partitioning the network into two or more layers. In this paper, a technique for partitioning the nodes from a single-row network into several layers of planar graphs by using k-means algorithm has been proposed. The experiment result shows that the proposed technique is able to minimize the network congestions.
The TF21 group of eLPCO (Aoyama Gakuin University General Institute) researches the business process and the education method of the Product Life-cycle Management;PLM in the manufacturing business. In this project, We...
详细信息
ISBN:
(纸本)9783839602935
The TF21 group of eLPCO (Aoyama Gakuin University General Institute) researches the business process and the education method of the Product Life-cycle Management;PLM in the manufacturing business. In this project, We designed and developed "Production and Sales Service Management" education program to understand the demand forecasting, Supply Chain Management;SCM, and inventory management in the university education. In this paper, we discuss the class content design and development to understand the SCM and inventory management that is a part of this lesson program. This paper is shown below. First, the virtual manufacturing industry and the virtual business process are designed. Next, the lesson scenario is designed. Thirdly, the SCM experience simulator that used the spreadsheet software is developed. Finally, the developed lesson is executed, and the teaching evaluation is described.
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over the world, there is evidence that most of...
详细信息
ISBN:
(纸本)9783901882449
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over the world, there is evidence that most of the malicious hosts are, in fact, concentrated in small fractions of the IP address space, on certain networks. Based on that, the Bad Neighborhood concept was introduced. The general idea of Bad Neighborhoods is to rate a subnetwork by the number of malicious hosts that have been observed in that subnetwork. Even though Bad Neighborhoods were successfully employed in mail filtering, the very concept was not investigated in further details. Therefore, in this work we provide a closer look on it, by proposing four definitions for spam-based Bad Neighborhoods that take into account the way spammers operate. We apply the definitions to real world data sets and show that they provide valuable insight into the behavior of spammers and the networks hosting them. Among our findings, we show that 10% of the Bad Neighborhoods are responsible for the majority of spam.
In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between t...
详细信息
In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data in an eHealth network over an insecure communication link, the data might be tampered with or trapped and disclosed by intruders, which is a serious offence for the clients of an eHealth P2PDBMS. As there is no centralized control for data exchange in eHealth P2PDBMS, it is infeasible to assume a centralized third party security infrastructure to protect confidential data. So far, there is currently no available/existing security protocol for secured data exchange in eHealth P2PDBMS. In this paper we propose three models for secure data exchange in eHealth P2PDBMSs and the corresponding security protocols. The proposed protocol allows the peers to compute their secret session keys dynamically during data exchange based on the policies between them. Our proposed protocol is robust against the man-in-the middle attack, the masquerade attack, and the replay attack.
Software development effort estimation is a branch of forecasting that has received increased interest in academia as well as in the field of research and development. Predicting software effort with any acceptable de...
详细信息
Software development effort estimation is a branch of forecasting that has received increased interest in academia as well as in the field of research and development. Predicting software effort with any acceptable degree remains challenging. In this paper we have developed 2 different linear regression models using fuzzy function point (FFP) and non fuzzy function point in order to predict the software project effort and further we have also considered that the entire projects are organic in nature i.e. the project size lies between 2 to 50 KLOC. After obtaining the software effort, project manager can control the cost and ensures the quality more accurately.
暂无评论