The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing provides variety of services with the growth of their offerings. Due to efficient services, it faces numerous challenges. It is based on virtualization, which provides users a plethora computing resources by internet without managing any infrastructure of Virtual Machine (VM). With network virtualization, Virtual Machine Manager (VMM) gives isolation among different VMs. But, sometimes...
As virtualization becomes ubiquitous in datacenters, there is a growing interest in characterizing application performance in multi-tenant environments to improve datacenter resource management. The performance of parallel programs is notoriously difficult to reason about in virtualized environments. Although performance degradations caused by virtualization and interferences have been extensively...
Complex numbers multiplication is a key arithmetic operation to be performed with high speed and less consumption of power in high performance systems such as wireless communications. Hence, in this paper, two possible architectures are proposed for a Vedic real multiplier based on the URDHVA TIRYAKBHYAM (Vertically and cross wise) sutra of Indian Vedic mathematics and an expression for path delay...
This paper present method for constructions of the S-Box for Advanced Encryption Standard (AES) algorithm using composite field arithmetic in GF(((22)2)2). It is advantageous to implement the composite field arithmetic (CFA) on Field Programmable Gate Array for AES algorithm. Moreover, architectural implementation of S-Box using CFA reduces the hardware in terms of gates count as compared with that...
Floating-point arithmetic is ever-present in computer systems. All most all computer languages has supports a floating-point number types. Most of the computer compilers called upon floating-point algorithms from time to time for execution of the floating-point arithmetic operations and every operating system must be react virtually for floating-point exceptions like underflow and overflow. The double-precision...
The Advanced Encryption Standard (AES) is a symmetric key Block cipher that is used to provide data confidentiality in many embedded systems. Data confidentiality of each information is very important, either the information is related with bank account statements, credit card numbers, trade secrets, government documents or personal information. The confidentiality of a patient's physiological data...
Multiuser MIMO (MU-MIMO) in which the base station transmits multiple streams to multiple users, has received significant importance as a way of achieving spectral efficiency (SE) and energy efficiency (EE). However, these two important design criteria conflict with each other and a careful study of their trade-off is mandatory for designing future wireless communication systems. This paper investigates...
This paper focuses on the open source GNURadio Software and studies its use as a research tool coupled with USRP and RTL SDR. USRP, RTL SDR and GNU Radio software suite is introduced and briefly discussed. GNU Radio software suite can act as a simulation tool or a software subsystem to drive a SDR transceiver hardware. This is shown by implementing WBFM receiver using RTL SDR with GNU Radio. It concludes...
Structural analysis in Software Engineering hinders the colossal aspects of architecture and functional behavior of the systems. The analysis of the same yields in flow oriented view of the blocks involved, rather than their functional behavior. Thus a need to analyze the behavior of systems, leads us to a newer approach called behavior analysis. The ever increasing complexity of Safety Critical Systems...
Wide-area memory transfers between on-going computations and remote steering, analysis and visualization sites can be utilized in several High-Performance Computing (HPC) scenarios. Dedicated network connections with high capacity, low loss rates and low competing traffic, are typically provisioned over current HPC infrastructures to support such transfers. To gain insights into such transfers, we...
This paper presents a design approach for 70MHz elliptical band pass filter for IF signal processing and EMI applications. High roll off and low insertion loss with miniaturized foot print makes the filter suitable for EMI application in harmonic suppression. Extending the concepts of transforming the elliptical function based low pass filter into band pass filter. Parametric analysis is carried out...
Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been demonstrated using power supply traces and either...
Nowadays, there is a rapid increase in usage of the embedded systems in consumer, industrial, automation and commercial applications. Linux being an open source and fastest growing operating system supports many hardware architectures. The flexibility it offers for the developers makes Linux the default choice for many embedded system boards. There is a very high demand for Linux porting onto various...
A novel communication protocol - Adaptive Transmission Power Protocol - for Wireless Sensor Networks with the facility of reconfiguring the transmission power of the hardware is presented. Specifications of the protocol including the packet format and the contention avoidance methods are described. The protocol is implemented on a hardware platform and the performance is considered for a fundamental...
This paper describes the design of High frequency, low power DC-DC step down voltage regulator module validated on Field Programmable Gate Arrays (FPGA). The key components of voltage regulator are a digital pulse width modulator(DPWM) based on second order sigma-delta concept (Σ-Δ DPWM), Digital PID controller and reference voltage with soft start. The converter operates with a switching frequency...
Functional verification being the paramount in the design cycle of hardware IP; ample time and cost are spent for verifying the functional correctness of each and every hardware IP. The modern verification methodologies emphasize the concept of reusability to reduce the verification turn around time. The reusability aspect of each verification IP depends vastly on its implementation strategies &...
In recent times, biomedical technology has received a major boost due to advancements in electronics. Sophisticated surgical instruments and patient monitoring devices have not only eased the burden on the doctors shoulders but have also taken patient care to a whole new level. However, the field of dentistry is yet to experience a major surge of technological innovation particularly when it comes...
We present Pratham, an embedded platform with programmable wireless communication range and Over-The-Air programming capability. It is a new design for wireless node hardware aimed at creating a class of heterogeneous sensor networks which bridge the gap between ultra-low power short range and high power long range wireless sensor nodes, while maintaining ease of use and robustness of software. The...
The simulation of aerospace vehicles is a challenging job as it consists of various expensive, fragile and unique subsystems. Apart from this, these systems are electrically connected and dynamically operated with the state of the art simulation setup. The first release of the software embedded in them may not fulfil its complete requirements, which may lead to failure of subsystems. So simulation...
Intelligent controllers are widely used in industries to control non-linear plants, for which mathematical models are difficult to obtain. Fuzzy logic controllers (FLCs) are often used for the same purpose as they operate on linguistic rules and estimation of uncertainty, which represents the core essence of non-linear systems. However, realization of FLCs on hardware platform is quite an arduous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.