The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new systolic array architecture to perform inversion operation in ${\mathrm{ GF}}(2^{m})$ based on a previously modified extended Euclidean algorithm. This architecture has low area and power complexities and it achieves a moderate speed. This architecture is explored by applying a regular technique to the inversion algorithm. The systolic architecture obtained has simple structure...
Quantitative risk assessment is a critical first step in risk management and assured design of networked computer systems. It is challenging to evaluate the marginal probabilities of target states/conditions when using a probabilistic attack graph to represent all possible attack paths and the probabilistic cause-consequence relations among nodes. The brute force approach has the exponential complexity...
As a new trend of thought and style today, the application of parametric intelligent design gets many success in the design of building and product, for meeting the development requirement of human beings and social development tendency, proving the real exploration for objective world. Parametric intelligent design isn't merely temporary thing in limited area, it will be having impressed effects...
In the Modern computers for performing the operationof ALU (Arithmetic Logic Unit) like Addition, Subtraction, different types of adders are using for achieving low delay and fastoutput. QSD numbers are using for giving the carry-free additionso that ALU operations can perform in low delay and speed of themodern computer can increase. In the modern digital system fastadder, Subtraction can perform...
For arbitrary precision numbers, reciprocal computing algorithms based on Newton iteration is asymptotically the fastest. In this work we provide a refined algorithm based on the Newton reciprocal algorithm by Brent and Zimmermann in their MCA book. The key techniques used in the refinement are D1 balancing, clear specification, remainder operation, and economical multiplication. The refined algorithm...
In our previous work, well balanced pseudo random signed binary sequence generated by using trace function and Legendre symbol has been researched. Our previous sequence generated by applying primitive polynomial over odd characteristic field Fp, trace function and Legendre symbol. The important features such as period, periodic autocorrelation, and cross-correlation have already been well discussed...
Dynamic checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. In this paper we present a lightweight approach, Control-flow checking using branch sequence signatures (CFCBS), to checking violation of control flow integrity at run-time. Our solution assigns a unique branch sequence signature, which enhances the capability of fault coverage, to each...
Most algorithms for identifying multiple rumor or infection sources require prior knowledge of the number of sources, or at least an upper bound on the number of sources. In this paper, we consider a deterministic Susceptible-Infected (SI) spreading model in which infection at different source nodes may start at different times. We introduce the concept of a minimal and linear cover of the infection...
An important problem in the field of bioinformaties is to identify interactive effects among profiled variables for outcome prediction. In this paper, a simple logistic regression model with pairwise interactions among a set of binary covariates is considered. Modeling the structure of the interactions by a graph, our goal is to recover the interaction graph from independently identically distributed...
Computing exact nearest and farthest neighbor is a challenging task, especially in the case of high-dimensional data. Several algorithms have been proposed to tackle the nearest neighbor problem. However, not much emphasis has been given on farthest neighbor problem. Most of the previous methods addressing this problem are not efficient when applied to high-dimensional data. In this paper, we present...
For a graph G = (V, E), a subset D of V is a total dominating set of G if every vertex in V has to be adjacent to a vertex of D. Vertex subset D is a disjunctive total dominating set if every vertex of V is adjacent to a vertex of D or has at least two vertices in D at distance 2 from it. The disjunctive total domination problem on G is to find a disjunctive total dominating set D of the minimum cardinality...
Kiwano is a distributed system that enables an unlimited number of avatars interact in the same virtual space. By separating the management of virtual world components -avatars, moving objects from the static décor- we take a novel approach and introduce a neighborhood relation between avatars. In Kiwano we employ Delaunay triangulations to provide each avatar with a constant number of neighbors independently...
The modern world is faced with the issues and concerns of business intelligence. Methodologies and techniques have been developed to facilitate the process of business analysis and comprehension. One such scientific field is focused on achieving the intelligent data before it can be utilized for intelligent analysis. The current size of information is huge and the tasks aimed out of analysis present...
Modeling and Simulation methods have been used to better analyze the behavior of complex physical systems and it is now common to use simulation as a part of the scientific and technological discovery process. Formal M&S proved to be successful in providing a sound base for the development of discrete-event simulation models, improving the ease of model definition and enhancing application development...
The dream of the world as a global village is gradually fulfilling with technology playing a magnificent role. Technologies such as Semantic Web and ontologies have contributed immensely to the realization of this dream — the world as a global village. However, the dream is yet to be fully realized as complexities keep unfolding even in such areas and instances where successes have been recorded....
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions. It explains testing methods of open addressing and factors that affect efficient...
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
Researching post-quantum cryptography has been an important task in cryptography. The section finding problem on algebraic surfaces (AS-SFP) is considered to be intractable also after building quantum computers. Thus AS-SFP is used as a basis of the security of the Algebraic Surface Cryptosystem (ASC), which is a candidate of post-quantum cryptosystems, and it is important for designing parameters...
Cyber-Physical Systems are embedded computers that control complex physical processes and components while cooperating as agents in distributed networks. Due to the scale and complexity of the interactions that occur within cyber-physical systems, requirements traceability strategies that are accurate and easy to manage are hard to implement and maintain. However, the information traces provide is...
As technology infiltrates every aspect of students' daily lives, game design acquires a bigger and more influential impact on shaping students' personalities and development of learning competencies. Considering the continuously increasing research on the use of educational games in classrooms, the researcher identifies another great interest in the constructivistic perspective of game design for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.