• Tidak ada hasil yang ditemukan

Advances in Computer Science and Information Technology

N/A
N/A
Protected

Academic year: 2023

Membagikan "Advances in Computer Science and Information Technology"

Copied!
647
0
0

Teks penuh

Michal Wozniak Wroclaw University of Technology, Poland Mohsen Sharifi Iran University of Science and Technology, Iran Murugan D. Mokhov Concordia University, Canada SunYoung Han Konkuk University, South Korea Susana Sargento University of Aveiro, Portugal Salah S .

Organized By

Suresh Sankaranarayanan Unibersidad ti Laud nga Indies, Jamaica Michael Peterson Unibersidad ti Hawaii idiay Hilo, E.U.A. Brajesh Kumar Kaushik Yan Luo Unibersidad ti Massachusetts Lowell, E.U.A. Yao-Nan Lien Nailian nga Unibersidad ti Chengchi, Taiwan Rituparna Chaki Unibersidad ti Teknolohia ti Laud a Bengal, India Somitra Sanadhya IIT - Delhi, India, ti India.

Distributed and Parallel Systems and Algorithms

DSP/Image Processing/Pattern Recognition/

Multimedia

Software Engineering

Database and Data Mining

Keyframe Detection Based Semantic Event Detection and Classification Using Heirarchical Approach for Cricket Sports Video.

Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)

Networks and Communications

Network and Communications Security

Sur Samarendra Nath, Bhaskar Debasish, and Bera Soumyasree A Lightweight Protocol for Data Integrity and Authentication in.

Wireless and Mobile Networks

Implementation of invisible digital watermarking by embedding data in computationally compressed form in image using variable length. Arun Srinivas Parthibarajan, and Vigneswaran Narayanamurthy An Intelligent Network for Offline Signature Verification Using Chain.

Security and Information Assurance

Ad Hoc and Ubiquitous Computing

Wireless Ad Hoc Networks and Sensor Networks

Improved Ant Colony Optimization Technique for Mobile Adhoc Networks

1 Introduction

In this work, we present an improved optimization technique for mobile adhoc networks using the ACO concept. Simulation results are presented in Section 5, and Section 6 provides conclusions and directions for future work.

2 Related Work

In early applications, ACO was used for routing in telecommunication networks, and a successful algorithm in this domain is Ant Net [11].

3 Applying ACO on MANETs

  • FORWARDING
  • BACKTRACKING 1. At destination node
  • PACKET FORWARDING
  • ROUTE MAINTENANCE

Each node in the network has a routing table whose size is the degree of the node multiplied by the number of nodes in the network. The pheromone value is updated in the node's routing table according to the quality of this route.

4 The Model Formulation

Transition Probability

The transition probability [ ] mainly helps to find the location of a new pixel in the movement of ants and is defined as .

Directional Probability

Pheromone Update

5 Simulation Framework and Results

Average End to End Delay

But for all speed values, the average end-to-end delay for I-ACO is much less compared to AODV. It can be seen in Figure 5 that as the transmission range of the nodes increases, the value of the average end-to-end delay decreases for both schemes.

Fig. 2. Pause Time Vs End-to-end-delay (for 50 nodes)
Fig. 2. Pause Time Vs End-to-end-delay (for 50 nodes)

Packet Delivery Ratio

It can be seen from Figure 9 that increasing the transmission range of the nodes increases the value of the packet delivery ratio for both schemes. But again I-ACO is a better option in terms of the number of successful packets for different values ​​of the nodes' transmission range from 150 meters to 300 meters.

Fig. 6. Packet delivery ration Vs. pause Time
Fig. 6. Packet delivery ration Vs. pause Time

6 Conclusion and Future Work

At a very high transmission range of 300 meters, I-ACO can successfully deliver more than 98% of packets, while AODV can deliver about 96%. The analysis of the scheme is still in progress to verify the value of the control overhead incurred for different network scenarios, and I-ACO also needs a better approach for network energy management.

I: Proceedings of the International Conference on Advanced Computing and Communication Technologies for High Performance Applications (2008).

A Performance Comparison Study of Two Position-Based Routing Protocols and Their Improved Versions

Typically, the source includes information about the intended location of the destination in each data packet. The source node includes the recently acquired coordinates of the destination location in the header of the data packets.

2 Review of Position-Based Routing Protocols

The location of the forwarding node in which greedy forwarding failed (and perimeter forwarding started to be used) is recorded in the data packet. According to DNP, before forwarding a data packet based on the location information of the destination in the packet header, each node searches its neighbor list for the destination node.

3 Simulation Environment and Performance Results

Control Message Overhead

We measure the total check message count as the number of destination location update query messages received by nodes in the network. Note that we measure the total control message count as the number of control messages received by nodes in the network, rather than the number of control messages transmitted.

Hop Count per Path

The main reason for this increase in the hop count for GRPP is that while forwarding a data packet to the destination, the forwarding node selects the next hop node as the neighbor node that exists (i.e. currently exists and is predicted to exist ​​for the next three seconds) closer to the straight line joining the forwarding node's location and the location of the final packet destination, as specified in the data packet header. The hop count would have been minimized if the forwarding node chose the next hop node as the neighbor node closer to the destination (similar to the GPSR approach).

End-to-End Delay per Data Packet

The packet delivery ratio of GRPP, GPSR_AGF and GRPP_AGF is the largest in most simulation conditions. Note that the packet delivery rates for GPSR and GRPP decrease as the value of MaxTupdate increases.

4 Conclusions and Future Work

This is attributed to the lack of accurate destination location information as the time period between two consecutive destination location update searches increases. GRPP and its improved versions deliver a relatively higher packet delivery ratio compared to GPSR and its improved versions.

Privacy Preserving Naïve Bayes Classification Using Trusted Third Party Computation over Distributed

Progressive Databases

Privacy Preserving Naïve Bayes Classification Using Trusted Third-Party Computing 25 dataset consists of the union of these datasets. One of the methods in a distributed computing environment, which uses the secure sum multiparty calculation technique for privacy protection, is Naive Bayes classification [1].

3 Progressive Naïve Bayes Classification Using Trusted Third Party Computation over Distributed Databases

Horizontal Partition

Assuming that the total number of cases is public, the required probability can be calculated by dividing the corresponding global sums, leaving the local number of cases undisclosed. Since tcurrent exceeds the POI, we also need to remove cases that are no longer in the required period of interest.

Fig. 1. Algorithm for Horizontal Scenario
Fig. 1. Algorithm for Horizontal Scenario

4 Results

The trusted third party is aware of the distribution of different parties with all attributes and class values.

Table 2. Vertical partition classification analysis  Sl.
Table 2. Vertical partition classification analysis Sl.

5 Conclusion

Cluster Based Mobility Considered Routing Protocol for Mobile Ad Hoc Network

So, reasonable, cluster head election is important for the performance of the mobile ad hoc network. In section 2, a comparative study of some of the existing routing topologies was performed.

2 Related Works

The two-step Cluster Head Selection routing protocol [6] is used to solve the LEACH cluster head count variability problem [13]. A cluster head with heavy relay traffic has fewer cluster members, so the load on the cluster heads will be balanced.

3 Proposed New Routing Protocol

A routing protocol for a mobile ad hoc network based on cluster-based mobility 37 timeout value for location information, ie. when the limit set for location information is exceeded, the resource resorts to a recovery process. In Mobile Ad hoc Network Routing Protocol [2], we can calculate the movement of mobile nodes with respect to time using beacon messages.

Table 1. Node Information: Node infolist
Table 1. Node Information: Node infolist

4 Performance Analysis

3, there is a comparison between number of nodes and hop count for finding route from source to destination. Here we also observed that as the number of nodes increases, the hop count initially also increases.

5 Conclusions

From the above two figures, we observed that our new proposed and implemented CBMCRP routing algorithm performs better and also its time complexity is less than another routing protocol called AMOBIROUTE [1]. In: Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 1998), Dallas, TX, p.

Speech Transaction for Blinds Using Speech-Text-Speech Conversions

2 Problem Statement

3 Architecture of Speech Recognition Method

4 Unit Selection Synthesis

6 Steps for Dictionary System

In example 2.a, the database is connected and the word will be checked against the words in the database and the corresponding meaning defined there will be identified. 4.

7 Conclusion

25] Segi, H., Takagi, T., Ito, T.: A concatenative speech synthesis method using variable-length context-dependent phoneme sequences as search units. 26] Lewis, E., Tatham, M.: Combining words and syllables in text-to-speech synthesis [27] Gros, J.Z., Žganec, M.: An efficient unit selection method for combining text-to-speech.

Floating-Point Adder in Techology Driven High-Level Synthesis

1 Introduction

High-Level Synthesis

The parser converts the HDL input syntax into an annotated parse tree, which is then constructed into an intermediate representation.

Target Technology

2 Related Work

This compiler converts the floating-point algorithms into the corresponding fixed-point algorithms, synthesizes and generates optimized technology-specific netlist for a fixed-point processor.

3 Technology Driven HLS

Right Inference in Parsing

TSIR

4 Floating-Point Algorithms in THLS

5 Floating-Point Adder in THLS

Floating-Point Adder

Conversion of floating-point model to fixed-point model is performed by a set of Verilog files in the above adder. It takes two single precision floating point numbers and divides two numbers: the large mantissa with a 1 in the MSB (Most Significant Bit) and the minor mantissa.

Compiler Transformations

6 Implementation Framework

Its devices are manufactured on a state-of-the-art 90nm copper process using 300mm (12-inch) wafer technology. There are up to 40 speeds in the Virtex-IV Configurable Logic Block (CLB) compared to previous generation devices [11].

Fig. 1. Compiler transformations for adding mantissas in FPA FPA - Floating-Point Adder
Fig. 1. Compiler transformations for adding mantissas in FPA FPA - Floating-Point Adder

7 Results

Silicon Usage

Advanced Silicon Modular Block's innovative column architecture is unique in the programmable logic industry.

Power Consumption

THLS compiler has 26% reduction in silicon consumption compared to the conversion (fixed-point) and compiler methodology (ISE).

8 Conclusion

Tripp, J.L., Peterson, K.D., Ahrens, C., Poznanovic, J.D., Gokhale, M.B.: TRIDENT: 'n FPGA-samestellerraamwerk vir drywende puntalgoritmes. In: International Conference on Advanced Computing and Communication - ADCOM 2007, IEEE, Indian Institute of Technology Guwahati, Indië (Desember 2007).

Differential Artificial Bee Colony for Dynamic Environment

This paper proposes a new strategy based on differential update and the external result, and is therefore called Differential Artificial Bee Colony (DABC). Again, an external archive is maintained to maintain the number of good solutions produced, and the members of the archive are randomly selected for differential updates.

2 Artificial Bee Colony (ABC) Algorithm

Differential Artificial Bee Colony for Dynamic Environment 61 consists of the employed bees and the second half includes the onlookers. The dance of the employed bees decides where the onlooker bees go to forage.

3 Differential Artificial Bee Colony (DABC)

Differential Update Strategy with Elite Bee

The bees search for the food sources to maximize the objective function F(θ), θ∈R(for maximization problem). Theθi is the position of the ideal food source and F(θi) the fitness of the nectar quantity located at θi.

Preserving Good Solutions: The Archive

According to the differential updating strategy, the weighted difference between the bee and its neighbor is added under the guidance of the elite bee as shown in Fig.

Differential Update Strategy with Exemplars of Archive

4 Simulation

Parameter Settings and PC Configuration

Algorithms

Benchmark Functions

The functions are shifted by adding the random bias to the original value−→x to obtain the new shifted variable−→y =−→x−O. The random bias is generated in the search range for each direction (trace) and the algorithms are allowed to search that run as follows.

5 Results

Mean Results

Robustness

Differential artificial bee colony for dynamic environment 65 Table 2. Optimum values ​​achieved with functions of dimension=10. Differential artificial bee colony for dynamic environment 67 Table 4. Optimum values ​​achieved with functions of dimension=50.

Table 3. Optimum values achieved with functions of dimension=30
Table 3. Optimum values achieved with functions of dimension=30

Mean Result Comparison with Other State-of-the-Art

A value of 0.0 for the standard deviation indicates a very stable nature of the algorithm, any other value indicates the deviation. Table 4, which records the results of 50D problems, shows the stable nature of DABC for all problems except problems f4, f6.

6 Conclusion

Alok, S.: An artificial bee colony algorithm for the minimum leaf span tree problem. Karaboga, D., Basturk, B.: A powerful and efficient algorithm for numerical function optimization: artificial bee colony (abc) algorithm.

FAM2BP: Transformation Framework of UML Behavioral Elements into BPMN Design Element

2 Review of Related Work

3 Scope of Work

FAM2BP: UML Behavioral Element Transformation Framework 71 framework based on the relational model to address this need. Finally, an algorithm is presented to automatically transform UML elements into BPMN elements.

4 FAM2BP: Proposed Transformation Model

Formalized Analysis Model

The Relational Model

A use case activity whose node is marked as "end" will be assigned as the end event of the BPMN node. A use case activity whose node is labeled "action / decision" will be assigned as an intermediate BPMN node event.

Algorithm for Automated Transformation

  • Algorithm NodeGeneration to Generate BPMN Node
  • Algorithm FlowGeneration to Generate the Flow between bpmn Nodes We use an array representation FAM_flow to represent the flow between different

The following query is the realization of Rule 1 in Section 4.3. It generates the start of the #BPMN node. The following query is the realization of Rule 2 in Section 4.3. It generates the End of the # BPMN node.

5 Case Study

UC3 EV2 Income and other factor are taken as inputs. UC3 EV5 customer alternative loan amount is sanctioned. The UC4 EV1 base customer has applied for a home loan. UC4 EV2 core client submits property details etc.

Table 1. Table Use Case                                            Table 4. Table ActUCRelation  UC_id UC_name
Table 1. Table Use Case Table 4. Table ActUCRelation UC_id UC_name

6 Conclusion

Proceedings of the International Conference on Software Engineering Research and Practice, Las Vegas, Nevada, USA, June. In: Proceedings of the International Conference on Software Engineering and Practice (SERP 2004), Las Vegas, Nevada, USA, June.

A Cross-Layer Framework for Adaptive Video Streaming over IEEE 802.11 Wireless Networks

In this work, we use the layered architecture together with cross-layer information exchange to increase the video quality of the end user. Based on application requirements, various solutions to vary the video rate are proposed in the literature.

2 The Proposed Cross Layer Framework

Optimizer Block

When the input counter value is one, it means that there is no delay in the network, thus indicating that the channel condition is good. When the input counter value is three or four, it indicates that the channel condition is bad.

Output

When the channel condition is moderate, transcoder target bitrate will be the same as it is, to take full advantage of the channel. Optimizer block estimates the channel state based on the number of transmission attempts for a packet.

3 Simulation Setup

Results

Fig.7(b') and Fig.7(b”) are screenshots of three test videos when they are reconstructed on a decoder with a channel error rate of 3 percent and in the absence of the proposed framework. When the proposed cross-layer framework was applied to video streaming, the results are shown in Figures 7(c), Figures 7(c’) and Figures 7(c”).

Fig. 4. Objective video quality of the Mother-daughter test video sequence
Fig. 4. Objective video quality of the Mother-daughter test video sequence

4 Conclusion and Future Work

FIFO optimization for network-based chip* power trade-off. The trade-off between power and performance is performed by varying the FIFO depth and position of the MoT-based network.

2 Methodology for Performance Evaluation and Cost Metrics

Performance Metrics

There is also some overhead in the source and destination that contributes to the total delay. Let P be the total number of packets that reach their destination IPs, the average total delay, Lavg, is then calculated as:.

Cost Metrics

The power consumption of the middle wire is derived for all 64 possible transitions in all three wires. The width and spacing between the connecting wires is taken from the interconnect dimension as shown in Fig.

3 Experimental Results and Analysis

Accepted Traffic vs. Offered Load

The overall average latency of any network depends on both the load served and the locality factor. 4 shows the overall average delay profile for the MoT varying the load offered and the locality factor.

Fig. 3. Performance variation profile. (a) Variation of accepted traffic with offered load with  uniform traffic, (b) Variation of Throughput with Locality Factor
Fig. 3. Performance variation profile. (a) Variation of accepted traffic with offered load with uniform traffic, (b) Variation of Throughput with Locality Factor

Energy Consumption at Different Locality Factors

This is due to the fact that at lower traffic, the contention in the network is less, but it will increase as the load increases, which in turn increases the delay. It has been observed that the traffic localization has a significant impact on the MT topology as the delay decreases with the increase of the locality factor.

4 FIFO Optimization for Energy and Performance Trade-off

Jeang, Y.L., Huang, W.H., Fang, W.F.: A Binary Tree Architecture for Application Specific Network on Chip (ASNOC) Design. Kundu, S., Chattopadhyay, S.: Network-on-Chip Architecture Design Based on Mesh-of-Tree Deterministic Routing Topology.

Table 3. Energy Performance Trade-off in MoT at saturation (load = 300)  Locality Factor
Table 3. Energy Performance Trade-off in MoT at saturation (load = 300) Locality Factor

Outliers Detection as Network Intrusion Detection System Using Multi Layered Framework

If the IDS generates too many false positives, we will lose confidence in the IDS's ability to protect the network. In this case, there is an attack on the network and the IDS does not raise an alarm, even though it is designed to detect such an attack.

2 Dataset Description

3 Proposed Framework

For each selected feature calculate the z-score and set a threshold value to separate the objects into normal and outliers. Here we do this for each attribute

Outlier Detection as a Network Intrusion Detection System 103 We take majority vote to decide whether the object is outlier or normal. For a record or object that has four results showing it is an outlier and three results showing it is a normal object, it is considered an outlier or intruder because the majority votes.

Use the Bayesian network classifier to classify outliers into different classes

  • Sampling
  • Features Selection Using Entropy

For example, there are seven attributes and calculated z-scores and set the threshold values. In the z-score method, we first calculate the mean and standard deviation values ​​for each attribute, Ai.

Table 1. The features with their rank using Entropy method
Table 1. The features with their rank using Entropy method

A zscore v

  • Bayesian Network Classifier
  • Learning Bayesian Networks

These networks [12] are directed acyclic graphs that allow efficient and effective representation of the joint probability distribution over a set of random variables. A Bayesian network [13] is an annotated directed acyclic graph that encodes a joint probability distribution over a set of random variables U.

K-Nearest Neighbor (k-NN) Method

Xdist

4 Experimental Results

TPR TP

Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based modeling for fraud and intrusion detection: Results from the jam project. In: Proceedings of the 3rd International Workshop on Distributed Statistical Computing (DSC 2003), Vienna, Austria, March.

Table 5. Confusion Matrix
Table 5. Confusion Matrix

A New Routing Protocol for Mobile Ad Hoc Networks

  • Proactive MANET Protocol (PMP)
  • Reactive MANET Protocol (RMP)
  • Hybrid Routing Protocol
  • Geographic Routing Protocol
  • Gossip Routing Protocol

7], propose a gossip-based approach where each node forwards a message with a certain probability to reduce the cost of routing protocols. With a smaller number of executions, the maximum number of nodes gets the message, which depends on the gossip probability and network topology.

3 Gossip Routing in Adhoc Networks

Yuval Shavitt and Amir Shay [5] introduce the Gossip Network model where travelers can obtain information about the state of dynamic networks by gossiping with peer travelers using ad-hoc communication. The protocol cost is insignificant since the frequency of the communication is low compared to classical message delays.

Sleep Scheduling Mechanisms

A node (which wants to communicate) maintains a control variable called C that represents the active number of neighbors. Thus, new protocol sensibly consumes power based on local error conditions, maximizing the lifetime of the network and reducing the cost of the power consumed per successfully delivered data.

5 Simulation Results

  • Simulation Model and Parameters
  • Performance Metrics
  • Results
  • Based on number of neighbor nodes
  • Based on Probability Value

From the figure, the number of packet dropped is less in new protocol compared to existing protocol. A new routing protocol for mobile ad hoc networks 121 Figure gives the throughput of both the protocols when the number of Probability values ​​is increased.

Fig. 2. Energy consumption for varying number of nodes
Fig. 2. Energy consumption for varying number of nodes

6 Based on Rate

A New Routing Protocol for Mobile Ad Hoc Networks 123 The figure shows the energy consumption results for different varying data rates. Hou, X., Tipper, D.: Gossip-based sleep protocol (GSP) for energy-efficient routing in wireless ad hoc networks.

Fig. 14. Packets delivery Ratio for varying data rates
Fig. 14. Packets delivery Ratio for varying data rates

Remote-Memory Based Network Swap for Performance Improvement

The concept of using external memory started for workstation networking where high-bandwidth, low-latency networks became affordable. They further discussed their user-level implementation, which required modifying the memory allocator code to allocate memory remotely.

3 System Design

  • Design Issues
  • Client Module
  • Server Module
  • Communication Protocol

Therefore, the size of the device can only be a multiple of the size of the Swap Block. Swap Block Map maps the swap block number to the logical starting address of the Swap Block.

Fig. 1. Block Diagram of the System
Fig. 1. Block Diagram of the System

4 Experimentation and Results

Experimental Setup

Read: This control command is sent by the client to the server to send n bytes of data from a specified swap block, starting at a given offset. Write: This control command is sent by the client to the server to receive n bytes of data in the specified swap block, starting at the specified offset.

Job Description and Performance Results

5 Conclusions and Future Work

Acknowledgements

Arpaci, R.H., Dusseau, A.C., Vahdat, A.M., Liu, L.T., Anderson, T.E., Patterson, D.A.: The interaction of parallel and sequential workloads on a network of workstations. Cooperation alarm in a reputation system 143. a) Entity Mobility Scenario (b) Group Mobility Scenario Fig. a) Entity Mobility Scenario (b) Group Mobility Scenario Fig. confidence intervals on the graphs. The packet delivery fraction of CARS was increased by 24–51% and 11–27% compared to the DL scenario, 21–26% and 11–19% compared to the WP scheme under the entity and group mobility scenario, respectively, as shown in a,b of Fig.

Fig. 1. Functional Block Diagram of CARS
Fig. 1. Functional Block Diagram of CARS

Secure Service Discovery Protocols for Ad Hoc Networks

The paper is organized as follows: Section 2 lists the main service discovery protocols proposed so far in the literature. We will see that neither adapts well to ad-hoc networks. In ad-hoc networks, it is very important to minimize the total number of transmissions to reduce battery consumption.

3 SPDP: Secure Pervasive Discovery Protocol

Algorithm Description

  • SPDP User Agent
  • SPSP Service Agent

The SPDP has two mandatory messages: SPDP Service Request, which is used to send service announcements and SPDP Service Reply, which is used to answer an SPDP Service Request, which announces available services. It should process SPDP service request messages and generate the corresponding SPDP service response, if necessary.

4 Evaluating the SPDP Protocol

10] Koodli, R., Perkins, C.E.: Service discovery in ondemand ad hoc networks (draft-koodli- manetservicediscovery- 00.txt), Internet-draft (work in progress) (October 2002). 31] Campo, C., Munõz, M., Perea, J.C., Mariń, A., García-Rubio, C.: GSDL and PDP: a new service discovery middleware to support spontaneous interactions in pervasive systems.

Fig. 1. Comparison of SPDP with others protocols
Fig. 1. Comparison of SPDP with others protocols

Certificate Path Verification in Peer-to-Peer Public Key Infrastructures by Constructing DFS Spanning Tree

PKI Components

A user does not issue a certificate, instead they rely on other PKI components to obtain certificates. Even for user certificate verification, it must depend on other PKI components.

PKI Models

This model is used to reduce the number of cross-certification paths in the mesh model. The first is the hierarchical cross-certificate [5] which runs parallel to the paths of the subordinate hierarchies, but extends upward towards the root CAs.

Cross Certification

The difference between the hierarchical cross-certification and the peer-to-peer cross-certification is the location of the user's trust anchors relative to the user. All certificate validation for clients within an autonomous CA starts with the local CA's self-signed certificate.

Fig. 1. Hierarchical Cross-Certification Between a root (autonomous) CA and sub- sub-ordinate (non-autonomous) CAs
Fig. 1. Hierarchical Cross-Certification Between a root (autonomous) CA and sub- sub-ordinate (non-autonomous) CAs

3 Path Verification in Mesh PKI

In the peer-to-peer model, path discovery is difficult because the trust relationship is bidirectional, where as in hierarchical it is unidirectional. 4 Proposed method to convert Peer-to-Peer PKI to DFS Spanning Tree to simplify certificate path validation.

4 Proposed Method of Converting Peer-to-Peer PKI to DFS Spanning Tree to Simplify Certificate Path Validation

In mesh or Peer-to-Peer PKI, certificate path verification is a complex task as multiple paths exist between CAs. In this paper, we proposed an efficient method to convert a mesh of Peer-to-Peer PKI to its equivalent DFS spanning tree to simplify the certificate path construction.

Fig. 5. A Peer-to-Peer PKI
Fig. 5. A Peer-to-Peer PKI

A Novel Deadlock-Free Shortest-Path Dimension Order Routing Algorithm for Mesh-of-Tree

A New Deadlock-Free Shortest-Path Dimension Order Routing Algorithm 169 (row) and then along the y dimension (column). The algorithm ensures a simple addressing scheme, simpler routing algorithm and reduced area overhead compared to [2, 3, 4].

2 Related Works and Our Contributions

3 Addressing Scheme

4 Routing Algorithm

Otherwise, if ROW CHECK is true, the packet is in the row it belongs to. If the value does not match the router's group ID, the packet is forwarded to the UP LINK.

5 Guaranteed Shortest Path

Gambar

Fig. 2. Pause Time Vs End-to-end-delay (for 50 nodes)
Fig. 2. Speech synthesis
Fig. 1. Compiler transformations for adding mantissas in FPA FPA - Floating-Point Adder
Table 1. Table Use Case                                            Table 4. Table ActUCRelation  UC_id UC_name
+7

Referensi

Dokumen terkait

Parameter values on the model SEIITR and the unit Variable Information Parameter Unit Source Birth-rate of the human population 1 Time-1 [9] Natural death rate 0.00123 Time-1 The