首页 > 最新文献

2012 World Congress on Information and Communication Technologies最新文献

英文 中文
Modeling two way concurrent buffer system using timed automata in UPPAAL UPPAAL中使用时间自动机的双向并发缓冲系统建模
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409193
R. Mishra, M. Zeeshaan, S. Singh
Two way buffer system is a system that exhibits transfer of data using two buffers concurrently. It includes processes that synchronize to exchange data with each other along with executing certain delays between these synchronizations. In existing Tiny two way buffer system, both generators produce packets in half duplex manner after a delay of 10 seconds. However, generator one has an initial shift of 5 seconds after which it begins sending a packet every 10 seconds. Hence, initial delay for generator one is 15 seconds and for generator two it is 10 seconds. Due to this initial shift, both generators produce packets alternatively and is deadlock free as the packets do not meet at the same time instant. Moreover, the existing system model is not concurrent and hence takes more time for packet transfer in every iteration. In this paper we have proposed a model of buffer system using an additional dummy buffer for transfer of data packets, by introducing delay in various buffers of the proposed system that speeds up the transfer of packets. As a result the transfer of data becomes concurrent, deadlock free and hence the model proposed is time efficient. To model and simulate the proposed system we have used UPPAAL as a model checking tool environment for modeling, validation and verification of real-time systems modeled as networks of timed automata. Simulation results shows that the proposed two way buffer system is fully concurrent and time efficient as compared to the existing buffer system.
双向缓冲系统是一种同时使用两个缓冲区进行数据传输的系统。它包括同步以相互交换数据的进程,以及在这些同步之间执行某些延迟。在现有的Tiny双向缓冲系统中,两个发生器在延迟10秒后以半双工方式产生数据包。然而,发生器1的初始位移为5秒,之后它开始每10秒发送一个数据包。因此,发电机1的初始延迟为15秒,发电机2的初始延迟为10秒。由于这种初始转换,两个生成器交替生成数据包,并且不会死锁,因为数据包不会同时满足。此外,现有的系统模型不是并发的,因此在每次迭代中需要花费更多的时间来传输数据包。在本文中,我们提出了一个缓冲系统的模型,使用一个额外的虚拟缓冲区来传输数据包,通过在所提出的系统的各个缓冲区中引入延迟来加快数据包的传输。因此,数据传输成为并发的,无死锁,因此所提出的模型具有时间效率。为了对所提出的系统进行建模和仿真,我们使用UPPAAL作为模型检查工具环境,用于建模、验证和验证作为时间自动机网络建模的实时系统。仿真结果表明,与现有的缓冲系统相比,所提出的双向缓冲系统具有完全并发性和时间效率。
{"title":"Modeling two way concurrent buffer system using timed automata in UPPAAL","authors":"R. Mishra, M. Zeeshaan, S. Singh","doi":"10.1109/WICT.2012.6409193","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409193","url":null,"abstract":"Two way buffer system is a system that exhibits transfer of data using two buffers concurrently. It includes processes that synchronize to exchange data with each other along with executing certain delays between these synchronizations. In existing Tiny two way buffer system, both generators produce packets in half duplex manner after a delay of 10 seconds. However, generator one has an initial shift of 5 seconds after which it begins sending a packet every 10 seconds. Hence, initial delay for generator one is 15 seconds and for generator two it is 10 seconds. Due to this initial shift, both generators produce packets alternatively and is deadlock free as the packets do not meet at the same time instant. Moreover, the existing system model is not concurrent and hence takes more time for packet transfer in every iteration. In this paper we have proposed a model of buffer system using an additional dummy buffer for transfer of data packets, by introducing delay in various buffers of the proposed system that speeds up the transfer of packets. As a result the transfer of data becomes concurrent, deadlock free and hence the model proposed is time efficient. To model and simulate the proposed system we have used UPPAAL as a model checking tool environment for modeling, validation and verification of real-time systems modeled as networks of timed automata. Simulation results shows that the proposed two way buffer system is fully concurrent and time efficient as compared to the existing buffer system.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure real time remote video monitoring using selective encryption 安全的实时远程视频监控使用选择性加密
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409120
D. C. Gavankar, M. Chatterjee, S. J. Lawand
Advances in video technology and computing gave a way to the growth for applications and devices in real time video monitoring. Video data containing real and accurate information is being used greatly by monitoring system. Monitoring systems are widely used at public institutions, banks, corporate and laboratories where security is very an important aspect. There is a growing need to visually monitor an area from a remote location using a video camera or web cam. The proliferation of web cams and the increasing use of streaming media have improved the ability of users to communicate with each other, to be entertained and to monitor or perform surveillance. Along with this the security of data travelling over network becomes essential. In this paper we propose a selective encryption based video monitoring system (SEVMS), which securely transfer data over untrusted nefwork. The live video data transferred over network is compressed and then selectively encrypted. Since the live video is selectively encrypted any unauthenticated person will not be able to view it. The system also provides facility of video on demand (VOD).
视频技术和计算的进步为实时视频监控的应用和设备的增长提供了一条道路。视频数据中包含的信息真实准确,在监控系统中得到了广泛的应用。监控系统广泛应用于公共机构、银行、企业和实验室,在这些地方,安全是一个非常重要的方面。越来越多的人需要使用摄像机或网络摄像头从远程位置对一个区域进行视觉监控。网络摄像头的激增和流媒体的日益普及提高了用户相互交流、娱乐和监视或执行监视的能力。与此同时,通过网络传输的数据的安全性变得至关重要。本文提出了一种基于选择性加密的视频监控系统(SEVMS),该系统可以在非可信网络上安全地传输数据。通过网络传输的实时视频数据被压缩,然后有选择地加密。由于直播视频是选择性加密的,任何未经身份验证的人都无法观看。该系统还提供视频点播(VOD)功能。
{"title":"Secure real time remote video monitoring using selective encryption","authors":"D. C. Gavankar, M. Chatterjee, S. J. Lawand","doi":"10.1109/WICT.2012.6409120","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409120","url":null,"abstract":"Advances in video technology and computing gave a way to the growth for applications and devices in real time video monitoring. Video data containing real and accurate information is being used greatly by monitoring system. Monitoring systems are widely used at public institutions, banks, corporate and laboratories where security is very an important aspect. There is a growing need to visually monitor an area from a remote location using a video camera or web cam. The proliferation of web cams and the increasing use of streaming media have improved the ability of users to communicate with each other, to be entertained and to monitor or perform surveillance. Along with this the security of data travelling over network becomes essential. In this paper we propose a selective encryption based video monitoring system (SEVMS), which securely transfer data over untrusted nefwork. The live video data transferred over network is compressed and then selectively encrypted. Since the live video is selectively encrypted any unauthenticated person will not be able to view it. The system also provides facility of video on demand (VOD).","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of support vector machine in Continuous Authentication 支持向量机在连续认证中的应用
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409148
Tribhuvanesh Orekondy, S. Gosukonda, K. Srinivasa
Static Authentication provides a secure framework for a one-time authentication session, but fails to authenticate the user throughout the session. This presents the possibility of an imposter gaining access when a user session is active and the user moves away from the system. Continuous Authentication on the other hand, aims to authenticate the user right from the initial stages of log-in till logout. The proposed framework provides unobtrusive Continuous Authentication, by alternating between two modes which utilize hard and soft biometrics respectively, depending on certain confidence parameters. We use facial features as the hard biometric trait for recognizing the user. Employing face recognition for extended periods of time produces noise, which is dampened by using a supervised machine learning algorithm. The color of user's clothing as the soft biometric trait relieves the CPU of comparatively high computation and relaxes constraints on the user's upper body movement.
静态身份验证为一次性身份验证会话提供了安全框架,但在整个会话过程中无法对用户进行身份验证。当用户会话处于活动状态并且用户离开系统时,冒名顶替者就有可能获得访问权限。另一方面,持续身份验证旨在从用户登录到注销的初始阶段对用户进行身份验证。该框架根据一定的置信度参数,通过在分别利用硬生物识别和软生物识别的两种模式之间交替,提供了不引人注目的连续认证。我们使用面部特征作为识别用户的硬生物特征。长时间使用人脸识别会产生噪声,通过使用有监督的机器学习算法来抑制噪声。用户服装的颜色作为一种柔软的生物特征,缓解了运算量相对较高的CPU,放松了对用户上半身动作的约束。
{"title":"Application of support vector machine in Continuous Authentication","authors":"Tribhuvanesh Orekondy, S. Gosukonda, K. Srinivasa","doi":"10.1109/WICT.2012.6409148","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409148","url":null,"abstract":"Static Authentication provides a secure framework for a one-time authentication session, but fails to authenticate the user throughout the session. This presents the possibility of an imposter gaining access when a user session is active and the user moves away from the system. Continuous Authentication on the other hand, aims to authenticate the user right from the initial stages of log-in till logout. The proposed framework provides unobtrusive Continuous Authentication, by alternating between two modes which utilize hard and soft biometrics respectively, depending on certain confidence parameters. We use facial features as the hard biometric trait for recognizing the user. Employing face recognition for extended periods of time produces noise, which is dampened by using a supervised machine learning algorithm. The color of user's clothing as the soft biometric trait relieves the CPU of comparatively high computation and relaxes constraints on the user's upper body movement.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative Security Agents for MANET MANET的合作安全代理
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409138
V. Mohite, L. Ragha
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defence. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm, they enables dynamic, self-starting, multi hop routing between participating mobile nodes wishing to establish and maintain an Ad Hoc network. An intermediate node, which takes part in packets forwarding, may behave maliciously and drop packets which goes through it, instead of forwarding them to the following node, where a malicious node falsely advertises good paths to a destination node during the route discovery process, such behavior is called blackhole attack. This attack becomes more sever when a group of malicious nodes cooperate to each other. However, it is vulnerable to the well-known cooperative blackhole attack. In this paper, a Detecting mechanism is presented against a coordinated attack by cooperative blackhole nodes in a MANET plus a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks (grayhole attack) by analyzing these packet delivery records and avoid the blackhole and the cooperative blackhole attacks by using Cooperative Security Agents.
移动自组织网络(MANET)是一个自治节点的集合,这些节点通过形成多跳无线网络并以分散的方式保持连接来相互通信。由于这些网络具有开放介质、动态变化的拓扑结构、依赖于协作算法、缺乏集中监控点以及缺乏明确的防线等特点,安全性仍然是这些网络面临的主要挑战。自组织按需距离矢量路由(AODV)是一种非常流行的路由算法,它能够在希望建立和维护自组织网络的参与移动节点之间实现动态、自启动、多跳路由。参与报文转发的中间节点可能会表现出恶意行为,将经过它的报文丢弃,而不是转发给下一个节点,在路由发现过程中,恶意节点会错误地向目的节点发布好的路径,这种行为被称为黑洞攻击。当一组恶意节点相互合作时,这种攻击会变得更加严重。然而,它很容易受到众所周知的合作黑洞攻击。本文提出了一种针对MANET中合作黑洞节点协同攻击的检测机制,并提出了一种保护每次接触点的数据包传递信息历史记录的方法,以便其他节点通过分析这些数据包传递记录来检测内部攻击(灰洞攻击),并利用合作安全代理来避免黑洞和合作黑洞攻击。
{"title":"Cooperative Security Agents for MANET","authors":"V. Mohite, L. Ragha","doi":"10.1109/WICT.2012.6409138","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409138","url":null,"abstract":"A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defence. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm, they enables dynamic, self-starting, multi hop routing between participating mobile nodes wishing to establish and maintain an Ad Hoc network. An intermediate node, which takes part in packets forwarding, may behave maliciously and drop packets which goes through it, instead of forwarding them to the following node, where a malicious node falsely advertises good paths to a destination node during the route discovery process, such behavior is called blackhole attack. This attack becomes more sever when a group of malicious nodes cooperate to each other. However, it is vulnerable to the well-known cooperative blackhole attack. In this paper, a Detecting mechanism is presented against a coordinated attack by cooperative blackhole nodes in a MANET plus a method to secure the history records of packet delivery information at each contact so that other nodes can detect insider attacks (grayhole attack) by analyzing these packet delivery records and avoid the blackhole and the cooperative blackhole attacks by using Cooperative Security Agents.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An approach to personalize the web using XML based ontologies 一种使用基于XML的本体来个性化web的方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409176
S. Vigneshwari, M. Aramudhan
In the modernized computer era, everything is needed to be personalized for ease of access. XML plays an important role in information retrieval systems. Since XML is a common format, it is easy to understand as well as easy to construct. In this paper, a novel model is proposed for personalizing the web using XML based ontologies.
在现代化的计算机时代,为了方便使用,一切都需要个性化。XML在信息检索系统中起着重要的作用。由于XML是一种通用格式,因此它易于理解,也易于构造。本文提出了一种基于XML本体的个性化web模型。
{"title":"An approach to personalize the web using XML based ontologies","authors":"S. Vigneshwari, M. Aramudhan","doi":"10.1109/WICT.2012.6409176","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409176","url":null,"abstract":"In the modernized computer era, everything is needed to be personalized for ease of access. XML plays an important role in information retrieval systems. Since XML is a common format, it is easy to understand as well as easy to construct. In this paper, a novel model is proposed for personalizing the web using XML based ontologies.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real time packet-injection-loss resistant data source authentication protocol for group communication 实时抗丢包的组通信数据源认证协议
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409238
Liu Zhirun, Li Guangyu
There are three problems at present that SAIDA and eSAIDA can resist packet-loss but cannot resist packet-injection, and PRABS can resist packet-injection but the communication cost is too large. We propose a new real-time packet-injection-loss resistant data source authentication protocol (RPILRSA) in this paper. Using merkle hash tree, RPILRSA can discover the packets which are injected by the attacker before verifying the signature. Using erasure codes, this protocol can resist packet-loss in a certain extent, and realize real-time authentication by dividing data into blocks. Analysis shows that RPILRSA's communication cost is about 7%~9% of PRABS, and the cost of computing and verifying authentication information in RPILRSA is also less than in PRABS.
目前存在三个问题:SAIDA和eSAIDA可以抵抗丢包,但不能抵抗包注入;PRABS可以抵抗包注入,但通信成本太大。本文提出了一种新的实时抗丢包的数据源认证协议(RPILRSA)。通过使用默克尔哈希树,RPILRSA可以在验证签名之前发现攻击者注入的报文。该协议采用纠删码,可以在一定程度上防止丢包,并通过数据块的划分实现实时认证。分析表明,RPILRSA的通信成本约为PRABS的7%~9%,并且RPILRSA中认证信息的计算和验证成本也低于PRABS。
{"title":"Real time packet-injection-loss resistant data source authentication protocol for group communication","authors":"Liu Zhirun, Li Guangyu","doi":"10.1109/WICT.2012.6409238","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409238","url":null,"abstract":"There are three problems at present that SAIDA and eSAIDA can resist packet-loss but cannot resist packet-injection, and PRABS can resist packet-injection but the communication cost is too large. We propose a new real-time packet-injection-loss resistant data source authentication protocol (RPILRSA) in this paper. Using merkle hash tree, RPILRSA can discover the packets which are injected by the attacker before verifying the signature. Using erasure codes, this protocol can resist packet-loss in a certain extent, and realize real-time authentication by dividing data into blocks. Analysis shows that RPILRSA's communication cost is about 7%~9% of PRABS, and the cost of computing and verifying authentication information in RPILRSA is also less than in PRABS.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copy-move forgery detection based on PHT 基于PHT的复制-移动伪造检测
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409232
Leida Li, Shushang Li, Jun Wang
Copy-move is one of the most common method for image tampering. Many methods have been proposed to detect the tampered regions. However, it is hard to detect the tampered regions when they are rotated before being pasted. To solve the problem, this paper presents a novel approach for detecting region-duplication forgery with rotation. Polar Harmonic Transform (PHT) is employed to extract the features of the circular blocks, which are then used to perform block matching. Experimental results show that the proposed method is not only robust to added noise and JPEG compression, but also robust to object rotation. Simulation results demonstrate the performances of the proposed scheme.
复制-移动是最常见的图像篡改方法之一。人们提出了许多检测篡改区域的方法。但是,在粘贴前旋转篡改区域时,很难检测到篡改区域。为了解决这一问题,本文提出了一种旋转检测区域重复伪造的新方法。利用极谐波变换(PHT)提取圆形块的特征,然后进行块匹配。实验结果表明,该方法不仅对附加噪声和JPEG压缩具有鲁棒性,而且对目标旋转具有鲁棒性。仿真结果验证了该方案的有效性。
{"title":"Copy-move forgery detection based on PHT","authors":"Leida Li, Shushang Li, Jun Wang","doi":"10.1109/WICT.2012.6409232","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409232","url":null,"abstract":"Copy-move is one of the most common method for image tampering. Many methods have been proposed to detect the tampered regions. However, it is hard to detect the tampered regions when they are rotated before being pasted. To solve the problem, this paper presents a novel approach for detecting region-duplication forgery with rotation. Polar Harmonic Transform (PHT) is employed to extract the features of the circular blocks, which are then used to perform block matching. Experimental results show that the proposed method is not only robust to added noise and JPEG compression, but also robust to object rotation. Simulation results demonstrate the performances of the proposed scheme.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Design of compact reversible decimal adder using RPS gates 采用RPS门的小型可逆十进制加法器的设计
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409100
R. K. James, K. Jacob, S. Sasi
This paper presents two universal 4×4 `reversible RPS gates' that can function as a reversible 4-bit Binary to BCD converter with a garbage count of zero. The new `fully or partially reversible RPS gate' gives an optimized design of the offset correction circuit of a reversible Binary Coded Decimal (BCD) adder. The paper proposes reversible implementations of BCD adder using fully reversible RPS gates and using combination of HNC-RPS (fully and partially) gates; and the comparisons are tabulated. The HNG-RPS designs achieve a reduction in garbage outputs and logical complexity compared to the existing reversible BCD adder designs. This can form the basic building block of a high speed decimal `Arithmetic and Logic Unit (ALU)' for a low power reversible `Central Processing Unit (CPU)'.
本文提出了两个通用4×4“可逆RPS门”,可以作为可逆的4位二进制到BCD转换器,垃圾计数为零。新的“完全或部分可逆RPS门”给出了可逆二进制编码十进制(BCD)加法器的偏移校正电路的优化设计。本文提出了利用完全可逆RPS门和HNC-RPS(完全和部分)门的组合实现BCD加法器;比较结果被制成表格。与现有的可逆BCD加法器设计相比,HNG-RPS设计减少了垃圾输出和逻辑复杂性。这可以形成高速十进制“算术和逻辑单元(ALU)”的基本构建块,用于低功耗可逆的“中央处理单元(CPU)”。
{"title":"Design of compact reversible decimal adder using RPS gates","authors":"R. K. James, K. Jacob, S. Sasi","doi":"10.1109/WICT.2012.6409100","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409100","url":null,"abstract":"This paper presents two universal 4×4 `reversible RPS gates' that can function as a reversible 4-bit Binary to BCD converter with a garbage count of zero. The new `fully or partially reversible RPS gate' gives an optimized design of the offset correction circuit of a reversible Binary Coded Decimal (BCD) adder. The paper proposes reversible implementations of BCD adder using fully reversible RPS gates and using combination of HNC-RPS (fully and partially) gates; and the comparisons are tabulated. The HNG-RPS designs achieve a reduction in garbage outputs and logical complexity compared to the existing reversible BCD adder designs. This can form the basic building block of a high speed decimal `Arithmetic and Logic Unit (ALU)' for a low power reversible `Central Processing Unit (CPU)'.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A fast compression algorithm for seismic data from non-cable seismographs 非电缆地震仪地震数据的快速压缩算法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409260
F. Zheng, Shufen Liu
Considering data storage characteristics of noncable seismograph, accommodating to the requirement of further processing, a new parallel seismic data compression algorithm is developed based on the integer wavelet transform. First, separate the valid file header and extract the valid data to 4 one-dimensional matrixes. Then compress the four matrixes in parallel: the time signals are converted into transform domain by using the integer wavelet transform, where low frequency wavelet coefficients are retained and high frequency ones are scalar quantized. Lossless encoding is then conducted to deliver compression output. Experiments have shown that, at the same compression ratio, the proposed algorithm compresses 30% faster than traditional approach which directly uses two-dimensional wavelet transform to process two-dimensional matrixes, and yields good compression results.
考虑到无缆地震仪的数据存储特点,适应进一步处理的要求,提出了一种基于整数小波变换的地震数据并行压缩算法。首先,分离有效文件头并将有效数据提取为4个一维矩阵。然后对四个矩阵进行并行压缩,利用整数小波变换将时间信号转换到变换域,保留低频小波系数,对高频小波系数进行标量量化。然后进行无损编码以提供压缩输出。实验表明,在相同压缩比下,该算法比直接使用二维小波变换处理二维矩阵的传统方法压缩速度快30%,压缩效果良好。
{"title":"A fast compression algorithm for seismic data from non-cable seismographs","authors":"F. Zheng, Shufen Liu","doi":"10.1109/WICT.2012.6409260","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409260","url":null,"abstract":"Considering data storage characteristics of noncable seismograph, accommodating to the requirement of further processing, a new parallel seismic data compression algorithm is developed based on the integer wavelet transform. First, separate the valid file header and extract the valid data to 4 one-dimensional matrixes. Then compress the four matrixes in parallel: the time signals are converted into transform domain by using the integer wavelet transform, where low frequency wavelet coefficients are retained and high frequency ones are scalar quantized. Lossless encoding is then conducted to deliver compression output. Experiments have shown that, at the same compression ratio, the proposed algorithm compresses 30% faster than traditional approach which directly uses two-dimensional wavelet transform to process two-dimensional matrixes, and yields good compression results.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An improved method of Muti-Generation Mixing Network Coding 一种改进的多代混合网络编码方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409237
Rui Liu, Jianjun Hao, Yijun Guo
Network coding has contributed a lot for improving the throughput of network. In scenarios with packet losses, insufficient reception of encoded packets causes NC losses which are expensive. Multi-Generation Mixing Network Coding (MGM-NC) increases the successful decoding probability through grouping different generations into a mixing-generation. However, the cost is high calculation complexity and large decoding time delay. In this paper, an improved method of MGM-NC is proposed, which achieves extremely low consumption, while maintaining its excellent performance resisting to NC losses. System performance is improved in three respects compared with MGM-NC, including decoding time delay, calculation complexity and transport overhead. Both theoretical and simulations are presented to demonstrate the improved method has a better performance than both traditional network coding and MGM-NC.
网络编码对提高网络的吞吐量做出了很大的贡献。在丢包的情况下,编码报文接收不足会导致NC丢失,损失很大。多代混合网络编码(MGM-NC)通过将不同的代分组为一个混合代来提高译码成功率。但代价是计算复杂度高,译码延时大。本文提出了一种改进的MGM-NC方法,在保持其优异的抗NC损耗性能的同时,实现了极低的功耗。与MGM-NC相比,系统性能从解码时延、计算复杂度和传输开销三个方面得到了提高。理论和仿真结果表明,改进后的方法比传统的网络编码和MGM-NC都具有更好的性能。
{"title":"An improved method of Muti-Generation Mixing Network Coding","authors":"Rui Liu, Jianjun Hao, Yijun Guo","doi":"10.1109/WICT.2012.6409237","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409237","url":null,"abstract":"Network coding has contributed a lot for improving the throughput of network. In scenarios with packet losses, insufficient reception of encoded packets causes NC losses which are expensive. Multi-Generation Mixing Network Coding (MGM-NC) increases the successful decoding probability through grouping different generations into a mixing-generation. However, the cost is high calculation complexity and large decoding time delay. In this paper, an improved method of MGM-NC is proposed, which achieves extremely low consumption, while maintaining its excellent performance resisting to NC losses. System performance is improved in three respects compared with MGM-NC, including decoding time delay, calculation complexity and transport overhead. Both theoretical and simulations are presented to demonstrate the improved method has a better performance than both traditional network coding and MGM-NC.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115891194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1