Science Publications

Displaying 1-40 of 274 results

  • White Papers // Jan 2015

    FPGA Implementation of Power Aware FIR Filter Using Reduced Transition Pipelined Variable Precision Gating

    With the emergence of portable computing and communication system, power awareness is one of the major objectives of VLSI design. This is its ability to scale power consumption based on the time-varying nature of inputs. Even though the system is not designed for being power aware, systems display variations in...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases

    In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper, the authors presented a Secure Concurrency Control Protocol (SCCP) based on...

    Provided By Science Publications

  • White Papers // Jan 2015

    Distributed Shared Memory Consistency Object-Based Model

    Distributed Shared Memory (DSM) systems represent a successful hybrid of two parallel computer classes: shared-memory multiprocessors and distributed computer systems. They provide the shared memory abstraction in systems with physically distributed memories and consequently combine the advantages of both approaches. A novel model that describes consistency in shared memory was...

    Provided By Science Publications

  • White Papers // Jan 2015

    Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

    In this paper, the authors present the design concepts and realization of incorporating micro-operation simulation and FPGA implementation into a teaching tool for computer organization and architecture. This teaching tool helps computer engineering and computer science students to be familiarized practically with computer organization and architecture through the development of...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Efficient Approach for Computing Silhouette Coefficients

    One popular approach for finding the best number of clusters (K) in a data set is through computing the silhouette coefficients. The silhouette coefficients for different values of K, are first found and then the maximum value of these coefficients is chosen. However, computing the silhouette coefficient for different Ks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Low Power Hardware Implementation of High Speed FFT Core

    Fourier transforms play an important role in many digital signal processing applications including speech, signal and image processing. Applications based on Fast Fourier Transform (FFT) such as signal and image processing requires high computational power. This paper proposes the implementation of radix-4 based parallel pipelined fast fourier transform processor which...

    Provided By Science Publications

  • White Papers // Jan 2015

    Implementing a Large Data Bus VLIW Microprocessor

    Microprocessors have grown tremendously in its computing and data crunching capability since the early days of the invention of a microprocessor. Today, most microprocessors in the market are at 32 bits, while the latest microprocessors from IBM, Intel and AMD are at 64 bits. To further grow the computational capability...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effective Load Metric and Efficient Initial Job Placement for Dynamic Load Balancing in Cluster

    High performance clusters are being configured specially to give data centers that require extreme performance and the processing power they need. When the data is accessed across clusters the data latency time has significant impact on the performance. In the literature it is given that memory and I/O have become...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Reconfigurable Execution Core for Merged DSP Microcontroller

    In this paper, the authors present an execution core which can be reconfigured either for calculation of digital convolution or for computation of discrete orthogonal transform by appropriate local buffer initialization of processing cells. It is shown that the data flow pattern can be changed by a single bit control...

    Provided By Science Publications

  • White Papers // Dec 2014

    Android Based Energy Aware Framework for Porting Legacy Applications

    Trend is growing towards using complex multimedia functions on smaller devices. In this paper, the authors explore the effect of migrating legacy signal processing software applications algorithms from large form factor devices to the smaller one such as handheld mobile devices known as Energy Conscious Mobile Computing Systems (EConMCS). They...

    Provided By Science Publications

  • White Papers // Dec 2014

    Area Efficient Distributed Arithmetic Discrete Cosine Transform Using Modified Wallace Tree Multiplier

    In this paper, by using the modified Wallace tree multiplier, an error compensated adder tree is constructed in order to round off truncation errors and to obtain high through put discrete cosine transform design. Peak Signal to Noise Ratio (PSNR) is met efficiently since modified Wallace tree method is an...

    Provided By Science Publications

  • White Papers // Dec 2014

    RTOS Implementation of Non-Linear System Using Multi Tasking, Scheduling and Critical Section

    RTOS based embedded systems are designed with priority based multiple tasks. Inter task communication and data corruptions are major constraints in multi-tasking RTOS system. This paper the authors describe about the solution for these issues with an example real-time Liquid level control system. Message queue and mail box are used...

    Provided By Science Publications

  • White Papers // Nov 2014

    Resource Broker Management by Adopting Self-Adaptive Multi-Instance Broker Scheduling in Grid Computing

    A grid resource broker seeks to assign the appropriate jobs to the appropriate resources as part of resource management in the multi-grid environment. Multi instances of the broker system provide multiple instances of brokers to simultaneously process jobs between multiple resources in a hierarchical cluster grid environment. In this paper,...

    Provided By Science Publications

  • White Papers // Jul 2014

    Database Replication in Heterogenous Platform

    The application of diverse database technologies in enterprises today is increasingly a common practice. To provide high availability and survivability of real-time information, a database replication technology that has capability to replicate databases under heterogenous platforms is required. This paper is to find the technology with such capability. In this...

    Provided By Science Publications

  • White Papers // Apr 2014

    Implementation of Central Queue Based Realtime Scheduler for Multiple Source Data Streaming

    Real-time data packet sources are required to remain robust against different security threats. This paper proposes a real-time secure scheduling strategy for data transmission to enhance the communication throughput and reduce the overheads. The proposed system combines real-time scheduling with security service enhancement, error detection and real-time scheduler based on...

    Provided By Science Publications

  • White Papers // Apr 2014

    Robust Memory Management Using Real Time Concepts

    Memory fragmentation is the development of a large number of separate free areas. Memory management in embedded systems demand effective implementation schemes to avoid fragmentation problem. Existing dynamic memory allocation methods fail to suit real time system requirements. Execution times need to be deterministic and this motivates the need for...

    Provided By Science Publications

  • White Papers // Feb 2014

    A New-Threshold Based Job Scheduling for Grid System

    In heterogeneous distributed systems, utility grids have emerged as a new model of service. In this service, workflow scheduling is one of the challenging problems for satisfying user's quality requirements. One of the main issues in work flow scheduling is to minimize the workflow execution cost in terms of time...

    Provided By Science Publications

  • White Papers // Jan 2014

    Quantitative Evaluation of Job and Resources for Better Selection to Improve Makespan in Grid Scheduling

    In this paper, the authors present the priority based ranking of jobs and resources to improve the makespan in the grid scheduling problem. Grid environment's effectiveness largely depends on scheduler's effectiveness/efficiency as they act as local resource brokers. The scheduler is responsible to select resources/scheduling jobs so that users/application requirements...

    Provided By Science Publications

  • White Papers // Nov 2013

    A Case for Hybrid Instruction Encoding for Reducing Code Size in Embedded System-on-Chips Based on RISC Processor Cores

    Embedded computing differs from general purpose computing in several aspects. In most embedded systems, size, cost and power consumption are more important than performance. In embedded System-on-Chips (SoCs), memory is a scarce resource and it poses constraints on chip space, cost and power consumption. Whereas fixed instruction length feature of...

    Provided By Science Publications

  • White Papers // Jul 2013

    Fuzzy Round Robin CPU Scheduling Algorithm

    One problem in round robin CPU scheduling is that if the time required for the running process is slightly more than time quantum even by a fraction value, then process gets preempted and context switch occurs. This causes more waiting time for that process and more overheads due to unnecessary...

    Provided By Science Publications

  • White Papers // Nov 2012

    Query Tuning in Oracle Database

    Oracle database is well suited to use for managing and exchanging of corporate data, especially for companies that have large-scale databases. Even though Oracle can work best, however, there are conditions where Oracle does not perform well and consume more time to perform the query transaction. This is when the...

    Provided By Science Publications

  • White Papers // Aug 2012

    Hybridization of Genetic Algorithm With Parallel Implementation of Simulated Annealing for Job Shop Scheduling

    Meta-heuristics is used to solve with the computationally hard optimization problems. Metaheuristics consist of a high level algorithm that guides the search using other particular methods. Metaheuristics can be used as a standalone approach for solving hard combinatorial optimization problems. But now the standalone approach is drastically changed and attention...

    Provided By Science Publications

  • White Papers // Jun 2012

    A Review of Security System for Smart Home Applications

    Now-a-days, the security level is very important, always emphasized and enhanced system. This system managed to help users to detect human presence around the house precisely. The use of wireless connectivity based on microcontroller facilitates the installation process at home and can prevent anyone hacking into security systems. This system...

    Provided By Science Publications

  • White Papers // May 2012

    Key Success Factors of 3rd Generation Mobile Network Services for M-Commerce in Malaysia

    While there has been a great deal of excitement in view of M-commerce, very little is actually known about conditions and critical success factors for successful introduction of the 3rd generation mobile network services here in Malaysia. This paper investigates the factors for successful diffusion of 3G network services and...

    Provided By Science Publications

  • White Papers // May 2012

    Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication

    A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...

    Provided By Science Publications

  • White Papers // Apr 2012

    Release Process on Quality Improvement in Open Source Software Project Management

    This paper has provided an in depth understanding of OSS release process, which is an area of contemporary significance. The core finding of this paper is that in complex OSS projects, the volunteers experience many difficulties with the release approach. These include lack of coordination among OSS developers', who are...

    Provided By Science Publications

  • White Papers // Apr 2012

    Optical System Monitoring Based on Reflection Spectrum of Fiber Bragg Grating

    This paper presents fiber fault monitoring approaches for Fiber-To-The Home (FTTH) with a Passive Optical Network (PON). Current fiber fault monitoring approaches are difficult to be implemented due to its complexity and high loss as the amount of branches increase. Approach: A fiber fault monitoring scheme is proposed whereas Fiber...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Chaotic Block Cipher for Real-Time Multimedia

    The widespread usage of Internet is providing additional channels for a pirate to easily and quickly distribute the copyrighted digital content. As a result, the protection of content is now receiving a significant amount of consideration and strong security technology is required to protect user's sensitive digital data. Cryptography is...

    Provided By Science Publications

  • White Papers // Apr 2012

    Buffer Pocketing and Pre-Checking on Buffer Utilization

    A basic NoC architecture is composed of routers, communication links between routers and a Network-Interface Component (NIC) between each pair of router and processing element. NoC allows much higher bandwidth through parallel communication. Each router can accept at the same time the flits arriving from all of the input channels...

    Provided By Science Publications

  • White Papers // Apr 2012

    Application of Adaptive Neuro-Fuzzy Inference System for Information Security

    Computer networks are expanding at very fast rate and the number of network users is increasing day by day, for full utilization of networks it need to be secured against many threats including malware, which is harmful software with the capability to damage data and systems. Fuzzy rule based classification...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Fault Tolerant Resource Allocation Architecture for Mobile Grid

    In this paper, the authors have developed a fault tolerant technique to improve reliability in mobile grid environment. The proposed technique handles both resource and network failure and present recovery techniques also. When the job is assigned to the node, acknowledgement must reach monitoring agent within certain time interval else...

    Provided By Science Publications

  • White Papers // Apr 2012

    Impact of the Use of Object Request Broker Middleware for Inter-Component Communications in C6416 Digital Signal Processor Based Software Communications Architecture Radio Systems

    Software Communications Architecture (SCA), ORB middleware, ORB express DSP, inter-component communications, stub code, encoding, marshalling are necessary in order to meet the requirements of a wide range of today's communication needs. The advent of software defined radio and the use of the Digital Signal Processor (DSP) as a suitable device...

    Provided By Science Publications

  • White Papers // Apr 2012

    Congestion Free Routing in Adhoc Networks

    A Mobile Ad-Hoc Network (MANET) is a temporary network; the mobile devices in an ad-hoc network are communicating through wireless links without any pre-existing infrastructure. The one major problem of this network is network congestion, it may take place at any intermediate nodes when data packets are traveling from source...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network

    In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Framework for .NET Mobile-Based Application Services

    A Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants at different locations. WSNs have a wide range of applications in object tracking, object localization, habitat observation, health monitoring...

    Provided By Science Publications

  • White Papers // Mar 2012

    Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks

    One of the up coming technologies is the wireless sensor network and now it has attained much consideration from the field of research. A sensor network consists of numerous small devices which are inexpensive and organize itself into an ad-hoc system. The wireless sensor network monitors the physical environment to...

    Provided By Science Publications

  • White Papers // Mar 2012

    Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

    Broadcasting is the most frequently used operation in Mobile Ad hoc NETworks (MANETs) for the dissemination of data and control messages in many applications. Usually, a network backbone is constructed for efficient broadcasting to avoid the broadcast storm problem caused by simple blind flooding, where only selected nodes, called forwarding...

    Provided By Science Publications

  • White Papers // Mar 2012

    New Optical Splitter Design for Application in Fibre-to-the Home Passive Optical Network using Virtual Lab Platform

    In this study, authors present a new design of optical splitter to be applied in FTTH-PON named Multi Ratio Optical Splitter (MROS). MROS was introduced to enhance the power distribution in the optical network. The authors also bring in new approach for designing a new optical device that enable one...

    Provided By Science Publications

  • White Papers // Mar 2012

    Privacy Preserved Collaborative Secure Multiparty Data Mining

    In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...

    Provided By Science Publications

  • White Papers // Mar 2012

    Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

    In 802.11-based Wireless LAN (WLAN), there is an improved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. The authors propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition...

    Provided By Science Publications

  • White Papers // Nov 2012

    Query Tuning in Oracle Database

    Oracle database is well suited to use for managing and exchanging of corporate data, especially for companies that have large-scale databases. Even though Oracle can work best, however, there are conditions where Oracle does not perform well and consume more time to perform the query transaction. This is when the...

    Provided By Science Publications

  • White Papers // Aug 2012

    Hybridization of Genetic Algorithm With Parallel Implementation of Simulated Annealing for Job Shop Scheduling

    Meta-heuristics is used to solve with the computationally hard optimization problems. Metaheuristics consist of a high level algorithm that guides the search using other particular methods. Metaheuristics can be used as a standalone approach for solving hard combinatorial optimization problems. But now the standalone approach is drastically changed and attention...

    Provided By Science Publications

  • White Papers // Apr 2009

    Verifying Complex Interaction Between Hardware Processes

    The advances in the manufacturing process technologies over the past two decades have made it possible to produce extremely complex semiconductor devices. However, the ability to design such devices and verify their correct behavior still lags the advances in the process technologies. The state of art today is to develop...

    Provided By Science Publications

  • White Papers // Apr 2010

    A Derivative-Free Optimization Method for Solving Classification Problem

    The aim of data classification is to establish rules for the classification of some observations assuming that the classes of data are known. To find these rules, a researcher can use known training subsets of the specified classes. The construction of a classification procedure may also be a pattern recognition...

    Provided By Science Publications

  • White Papers // Jan 2015

    FPGA Implementation of Power Aware FIR Filter Using Reduced Transition Pipelined Variable Precision Gating

    With the emergence of portable computing and communication system, power awareness is one of the major objectives of VLSI design. This is its ability to scale power consumption based on the time-varying nature of inputs. Even though the system is not designed for being power aware, systems display variations in...

    Provided By Science Publications

  • White Papers // May 2011

    Cache Based Distributed Query Processing in Mobile Ad Hoc Networks

    Millions of users around the world today regularly access several wireless devices like personal digital assistants, cellular phones and laptop computers. Mobile devices or mobile computers and network of computers in conventional wired mode are the two aspects to be considered in the general environment of mobile computing. In the...

    Provided By Science Publications

  • White Papers // Jul 2014

    Database Replication in Heterogenous Platform

    The application of diverse database technologies in enterprises today is increasingly a common practice. To provide high availability and survivability of real-time information, a database replication technology that has capability to replicate databases under heterogenous platforms is required. This paper is to find the technology with such capability. In this...

    Provided By Science Publications

  • White Papers // Dec 2014

    Area Efficient Distributed Arithmetic Discrete Cosine Transform Using Modified Wallace Tree Multiplier

    In this paper, by using the modified Wallace tree multiplier, an error compensated adder tree is constructed in order to round off truncation errors and to obtain high through put discrete cosine transform design. Peak Signal to Noise Ratio (PSNR) is met efficiently since modified Wallace tree method is an...

    Provided By Science Publications

  • White Papers // Oct 2009

    An Improved Lazy Release Consistency Model

    Usage of network of workstations for parallel processing is very common. Such an environment can be viewed by the programmer as a message passing environment or Distributed Shared Memory (DSM) environment. The shared memory view makes parallel programming easier by using threads concept, whereas the message passing view makes development...

    Provided By Science Publications

  • White Papers // Feb 2014

    A New-Threshold Based Job Scheduling for Grid System

    In heterogeneous distributed systems, utility grids have emerged as a new model of service. In this service, workflow scheduling is one of the challenging problems for satisfying user's quality requirements. One of the main issues in work flow scheduling is to minimize the workflow execution cost in terms of time...

    Provided By Science Publications

  • White Papers // Apr 2010

    Analyzing Performance and Power of Multicore Architecture Using Multithreaded Iterative Solver

    Computational modeling and simulations have been popularly used in science and engineering community to describe and understand complex phenomena instead of expensive or dangerous experiments such as drug design, global climate simulation, radiation simulation, crash testing aerodynamics and combustion. These modeling and simulations are usually represented as Partial Differential Equations...

    Provided By Science Publications

  • White Papers // Mar 2011

    Field Programmable Gate Array-Based System-on-Chip for Real-Time Power Process Control

    A way to get the maximum performance from motors controlling machinery in industrial applications is to employ more efficient and sophisticated control algorithms to optimize the efficiency of motors in a factory. These new sophisticated algorithms place larger computational requirements on the processor due to the growth of complexity. Therefore,...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases

    In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper, the authors presented a Secure Concurrency Control Protocol (SCCP) based on...

    Provided By Science Publications

  • White Papers // Aug 2009

    Three Algorithms for Flexible Flow-Shop Scheduling

    Scheduling is an important process widely used in manufacturing, production, management, computer science, and so on. Appropriate scheduling can reduce material handling costs and time. Finding good schedules for given sets of jobs can thus help factory supervisors effectively control job flows and provide solutions for job sequencing. In simple...

    Provided By Science Publications

  • White Papers // Nov 2013

    A Case for Hybrid Instruction Encoding for Reducing Code Size in Embedded System-on-Chips Based on RISC Processor Cores

    Embedded computing differs from general purpose computing in several aspects. In most embedded systems, size, cost and power consumption are more important than performance. In embedded System-on-Chips (SoCs), memory is a scarce resource and it poses constraints on chip space, cost and power consumption. Whereas fixed instruction length feature of...

    Provided By Science Publications

  • White Papers // Aug 2011

    Composite Pseudo Associative Cache with Victim Cache for Mobile Processors

    While processors with multi-cores already thrived in general purpose processor area, mobile processor companies are recently starting to release their multi-core version which are used in net books, smart phones or tablet PCs. Many design issues presented in general-purpose processors are more critical in mobile processors. Especially, power and heating...

    Provided By Science Publications

  • White Papers // Mar 2010

    Development of a "Programmable Logic Controller Circuitry" for Optimal Power Distribution in a Manufacturing Industries

    In large and medium scale industries, the physically implemented power demand indicator is programmed using microprocessors. The major setback in the functioning of the demand indicator using microprocessor circuitry is that it runs on an unchangeable programme, thereby, the once fixed demand level cannot be altered suiting the requirements of...

    Provided By Science Publications

  • White Papers // Apr 2014

    Implementation of Central Queue Based Realtime Scheduler for Multiple Source Data Streaming

    Real-time data packet sources are required to remain robust against different security threats. This paper proposes a real-time secure scheduling strategy for data transmission to enhance the communication throughput and reduce the overheads. The proposed system combines real-time scheduling with security service enhancement, error detection and real-time scheduler based on...

    Provided By Science Publications

  • White Papers // Apr 2014

    Robust Memory Management Using Real Time Concepts

    Memory fragmentation is the development of a large number of separate free areas. Memory management in embedded systems demand effective implementation schemes to avoid fragmentation problem. Existing dynamic memory allocation methods fail to suit real time system requirements. Execution times need to be deterministic and this motivates the need for...

    Provided By Science Publications

  • White Papers // May 2010

    Numerical Solution of the Taylor-Quette Flow Problem: A Commodious Statistical Approach

    It is observed that the results obtained from the TRMC and the DSMC methods have many similarities. In general, due to the application of the Maxwellian equilibrium conditions in each time step, the results obtained from the TRMC are more uniform and show less fluctuations. Therefore, the TRMC method, by...

    Provided By Science Publications

  • White Papers // Jan 2015

    Distributed Shared Memory Consistency Object-Based Model

    Distributed Shared Memory (DSM) systems represent a successful hybrid of two parallel computer classes: shared-memory multiprocessors and distributed computer systems. They provide the shared memory abstraction in systems with physically distributed memories and consequently combine the advantages of both approaches. A novel model that describes consistency in shared memory was...

    Provided By Science Publications

  • White Papers // Dec 2014

    Android Based Energy Aware Framework for Porting Legacy Applications

    Trend is growing towards using complex multimedia functions on smaller devices. In this paper, the authors explore the effect of migrating legacy signal processing software applications algorithms from large form factor devices to the smaller one such as handheld mobile devices known as Energy Conscious Mobile Computing Systems (EConMCS). They...

    Provided By Science Publications

  • White Papers // Jan 2015

    Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

    In this paper, the authors present the design concepts and realization of incorporating micro-operation simulation and FPGA implementation into a teaching tool for computer organization and architecture. This teaching tool helps computer engineering and computer science students to be familiarized practically with computer organization and architecture through the development of...

    Provided By Science Publications

  • White Papers // Nov 2014

    Resource Broker Management by Adopting Self-Adaptive Multi-Instance Broker Scheduling in Grid Computing

    A grid resource broker seeks to assign the appropriate jobs to the appropriate resources as part of resource management in the multi-grid environment. Multi instances of the broker system provide multiple instances of brokers to simultaneously process jobs between multiple resources in a hierarchical cluster grid environment. In this paper,...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Efficient Approach for Computing Silhouette Coefficients

    One popular approach for finding the best number of clusters (K) in a data set is through computing the silhouette coefficients. The silhouette coefficients for different values of K, are first found and then the maximum value of these coefficients is chosen. However, computing the silhouette coefficient for different Ks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Low Power Hardware Implementation of High Speed FFT Core

    Fourier transforms play an important role in many digital signal processing applications including speech, signal and image processing. Applications based on Fast Fourier Transform (FFT) such as signal and image processing requires high computational power. This paper proposes the implementation of radix-4 based parallel pipelined fast fourier transform processor which...

    Provided By Science Publications

  • White Papers // Jan 2015

    Implementing a Large Data Bus VLIW Microprocessor

    Microprocessors have grown tremendously in its computing and data crunching capability since the early days of the invention of a microprocessor. Today, most microprocessors in the market are at 32 bits, while the latest microprocessors from IBM, Intel and AMD are at 64 bits. To further grow the computational capability...

    Provided By Science Publications

  • White Papers // Dec 2008

    Implementation of Low-Memory Reference FFT on Digital Signal Processor

    In order to solve the drawback, many Fast Fourier Transforms (FFTs) are proposed and implemented on different platforms. To reduce the complexity computation is central ideal on most of FFT algorithms. These algorithms focus on twiddle factor or radix order to perform a simply and efficient algorithm which includes the...

    Provided By Science Publications

  • White Papers // Jan 2014

    Quantitative Evaluation of Job and Resources for Better Selection to Improve Makespan in Grid Scheduling

    In this paper, the authors present the priority based ranking of jobs and resources to improve the makespan in the grid scheduling problem. Grid environment's effectiveness largely depends on scheduler's effectiveness/efficiency as they act as local resource brokers. The scheduler is responsible to select resources/scheduling jobs so that users/application requirements...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effective Load Metric and Efficient Initial Job Placement for Dynamic Load Balancing in Cluster

    High performance clusters are being configured specially to give data centers that require extreme performance and the processing power they need. When the data is accessed across clusters the data latency time has significant impact on the performance. In the literature it is given that memory and I/O have become...

    Provided By Science Publications

  • White Papers // Dec 2014

    RTOS Implementation of Non-Linear System Using Multi Tasking, Scheduling and Critical Section

    RTOS based embedded systems are designed with priority based multiple tasks. Inter task communication and data corruptions are major constraints in multi-tasking RTOS system. This paper the authors describe about the solution for these issues with an example real-time Liquid level control system. Message queue and mail box are used...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Reconfigurable Execution Core for Merged DSP Microcontroller

    In this paper, the authors present an execution core which can be reconfigured either for calculation of digital convolution or for computation of discrete orthogonal transform by appropriate local buffer initialization of processing cells. It is shown that the data flow pattern can be changed by a single bit control...

    Provided By Science Publications

  • White Papers // Jul 2013

    Fuzzy Round Robin CPU Scheduling Algorithm

    One problem in round robin CPU scheduling is that if the time required for the running process is slightly more than time quantum even by a fraction value, then process gets preempted and context switch occurs. This causes more waiting time for that process and more overheads due to unnecessary...

    Provided By Science Publications

  • White Papers // Jan 2012

    Effective Utilization of Multicore Processor for Unified Threat Management Functions

    Network security is one of the most critical issues facing today's internet. Traditionally, for an enterprise, a firewall was used as a first line of defense. With more complicated network environment and mature attack means, the traditional firewall strategy cannot meet the demands of security. For the combined protection against...

    Provided By Science Publications

  • White Papers // Nov 2009

    Self-Adjustment Time Quantum in Round Robin Algorithm Depending on Burst Time of the Now Running Processes

    Modern operating systems become more complex, they have evolved from a single task to a multitasking environment in which processes run in a concurrent manner. CPU scheduling is an essential operating system task; therefore its scheduling is central to operating system design. When there is more than one process in...

    Provided By Science Publications

  • White Papers // Jan 2011

    Experimental Evaluation of Medium Access Schemes in 802.11 Wireless Networks

    Deployment of real time services over 802.11 wireless networks requires Quality of Service (QoS) differentiation mechanisms for different traffic types. This required investigations into the performance of the Medium Access Control (MAC) schemes like Distributed Coordinated Function (DCF) and Enhanced DCF with respect to the stringent QoS requirements imposed by...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications