Home > Archives > Latest issue
International Review on Computers and Software - Papers
Automatic
Determination of Information System Subsystems Execution and Development
Order
by Robert
Kudelić, Alen Lovrenčić
Vol. 6. n. 4, pp. 455-461
Abstract - At the moment information system subsystems ordering is mainly done according to business rules, and often arbitrarily. By contrast, we will devise an automated approach based on the information system subsystems communication through data classes, so that subsystems of an information system, if possible, do not use data classes that are not yet generated. The development of an information system according to such data class interaction will enable to eliminate the unnecessary waiting for the data that need to be processed. Also, when the data which the implemented information system needs to operate on are available, adequate testing can be conducted. On the other hand, without this development and execution sequence, an information system is developed and later on executed in such a way that it needs to work on data that it currently does not have.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Information System, Execution Sequence, Automatic Search, Algorithm.
Ontology
Instance Matching Using Distributional Similarity Measure
by
Farinaz Alamiyan, Kamran Zamanifar
Vol. 6. n. 4, pp. 462-472
Abstract - Information integration and interoperability between heterogeneous systems is still a vital issue to the realization of the semantic web. Ontologies as a layer of semantic web architecture represent explicit conceptualizations of a domain, and ontology matching algorithms can provide a solution to semantic interoperability. The most active part of ontology is instance data. They reflect ontology semantics in real usage. The quality of instance matching approaches can extremely affect the performance of ontology mapping. In this paper, we present an approach which uses our proposed distributional instance similarity measure and study how the choice of different algorithmic variations of this measure can improve the quality of instance mapping. Our study contains results from experiments on various datasets. We have compared our results to another matcher's, too.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Instance Matching, Ontology Matching, Distributional Similarity Measure.
by Xiliang Zeng, Yan Feng, Jian Ren
Vol. 6. n. 4, pp. 473-476
Abstract - Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique serial number called fingerprint. Generally, the serial number is generated from collusion secure code to resist collusion attack launched by some malicious customers. A well known collusion secure code is Tardos code, which is considered to be optimal. However, the Tardos code is designed for protecting text and document data instead of multimedia data. In this paper, we propose a digital fingerprinting scheme using Tardos code for protecting multimedia data by taking the underlying characteristics of the multimedia data into account.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Digital fingerprinting, Digital Copyright Protection, Random Code, Collusion Attack, Collusion Resistance.
New
Multi-Agent's Control Architecture for the Autonomous Mobile Robots
by
S.Benaissa, F. Moutaouakkil, H.Medromi
Vol. 6. n. 4, pp. 477-480
Abstract - In this
document we propose a control architecture of mobile robot purely based
on multi-agent systems where each agent has several algorithms to carry
out its tasks, and to select the best algorithm relevant to the
situation of the mobile robot in its environment. To do so, we
considered the design of an architecture based on multi-agent systems.
Robots, unlike many software multi-agents systems, operate under
real-world, real-time constraints where sensors and effectors with
specific physical characteristics need to be controlled. To facilitate
research in autonomous robotics and help architecture designers in
managing the complexity of embodied agents, in this paper an autonomous
robot control architecture have been developed that support various
aspects of the agent development process, ranging from the design of an
agent architecture, to its implementation on robot hardware, to
executing it on the robot.
Copyright © 2011 Praise Worthy Prize S.r.l. -
All rights reserved
Keywords: Robotics, Autonomous Mobile Robots, Multi-Agents System, Programming Environment.
A
Novel Evolutionary Neural Network Based Temperature Forecaster Using Ant
Colony Optimization Metaheuristic
by
Akshay Gupta
Vol. 6. n. 4, pp. 481-485
Abstract - A novel temperature forecasting method has been proposed based on the evolutionary neural networks. The architecture converts the disadvantages of the backpropagation neural network to its advantage and gives better simulation results than the existing architectures. Ant colony algorithm optimized genetic algorithms are employed to evolve a no of neural networks in order to obtain the optimum network architecture and weights. Further, a context layer is added to the hidden layers of the neuro-fuzzy model to incorporate a feedback mechanism. The proposed architecture is applied to forecast temperature for New Delhi and results are analyzed. Input parameters were chosen in accordance to conditions at New Delhi and its past 10 years’ weather data (2000-2010) was used to train the network. The proposed architecture was tested on 90 test cases and its results and performance analysis are shown.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Evolutionary Neural Networks, Fuzzy Logic, Ant Colony, Artificial Neural Networks, Temperature Forecasting.
Simple
Island Parallel Genetic Algorithm Based on MapReduce Using Cloud
Computing
by Jianfeng Zhao,
Wenghua Zeng, Min Liu, Guangming Li
Vol. 6. n. 4, pp. 486-493
Abstract - It’s intractable to implement parallel genetic algorithm (PGA). By analyzing the framework of MapReduce and characteristics of Island PGA, using Mappers as Islands, Reducer administers the whole algorithm evolution, proposed Island MapReduce-based Parallel Genetic Algorithm (IMRPGA). The advantages of IMRPGA are: 1) Comparing with traditional PGAs, the implement of IMRPGA is simple, it doesn’t need to be concerned about that the synchronization, dealing with communication errors caused by parallelism; 2) It is easy for IMRPGA to expand to very large scale. This paper showed the detail design, analyzed the theoretical speed-up and implemented IMRPGA on Hadoop platform. Verified the feasibility of IMRPGA and its speed-up, the results indicate that IMRPGA suits to solve the time-consuming problems and the complex object functions.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Cloud Computing, Island Mode, Mapreduce, Parallel Genetic Algorithm.
Communicating
Positional Accuracy within a Standard-based Geospatial Service Chain
by Morteza
Karimzadeh, Ali A. Alesheikh, Pouria Amirian
Vol. 6. n. 4, pp. 494-504
Abstract - OGC (Open Geospatial Consortium) has defined several geospatial web service interfaces and data encodings to provide the Geographic Information (GI) community with interoperable standards. These standards try to tackle special characteristics of geospatial data; however, one critical aspect is missing, namely, positional accuracy. Geography Markup Language (GML) is the main interchange format for geographic transactions between Geospatial Web Services defined by OGC. GML encodes positions of geographic features, without offering a unified way to record their positional accuracy. Accuracy indicators must be encoded and transported in geospatial transactions in an open way, because some applications need to use the positional accuracy of geographic features directly in computations. In this study, a prototype map-matching geospatial service chain is developed to illustrate the transport and use of positional accuracy in calculations. To model and communicate positional accuracy throughout the chain of services, confidence regions are introduced and encoded using UncertML, which is a developing standard within the OGC. The capabilities and drawbacks of UncertML are examined in the context of map-matching problem. Finally, we propose three different levels to encode positional accuracy for geographic features based on application requirements.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: GIS, Positional Accuracy, Geospatial Web Services, Geography Markup Language, WPS, Geospatial Service Chain.
Effects
of Software Manager Profile on Maturity Level of Software Development Process
by Meric Merih
Aykol, Zuhal Tanrikulu
Vol. 6. n. 4, pp. 505-511
Abstract -
Methodology and application of
software standards develop mainly in the direction of managers’ visions,
perspective and initiative in the absence of such challenging factors
from customers and regulatory agencies. The aim of this article is to
identify the managers’ profiles’ effects on the maturity level of the
software process and determine which features (education, knowledge,
experience, the discipline the manager comes from, etc.) are effective.
Increasing levels of process maturity means reduction of uncertainties
and unexpected results. When the maturity level improves, outcomes
become more predictable, software quality increases, and risks get lower.
This research covers a total of 90 firms in the software industry and in
31 of those firms, the software process maturity levels were assessed.
In this work, we show how managers’ approach, profession, and their
rights to execute the company affect the software process maturity level
using correlation analysis.
Copyright © 2011 Praise
Worthy Prize S.r.l. - All rights reserved
Keywords: Software Development, Software Processes Improvement, Software Project Management, Software Quality, Software Quality Models.
Soft Computing-Based Software Test Cases Optimization: a Survey
by Manoj Kumar, Arun Sharma, Rajesh Kumar
Vol. 6. n. 4, pp. 512-526
Abstract - Software testing is very labor-intensive and expensive process. It is a core activity in quality assurance. This paper presents a comprehensive review of the work done in soft computing techniques to solve software test cases optimization problem. Test cases minimization, selection, prioritization and filtration are related by a common thread of test cases optimization. Test case optimization is a multi-objective optimization, peculiar nature and NP-Complete problem. Testing efforts can be reduced by applying more appropriate test case optimization techniques. Automation of testing process and multi-objective test cases optimization will help in improving the overall quality of the software. Present paper gives the insight in existing single objective test cases optimization techniques such as Genetic Algorithms, Ant Colony Optimization, Hybrid Genetic, Intelligent Search Agent Techniques, Particle Swan Optimization, Graph based Intelligent Techniques, Hybridization of Soft Computing techniques devised by various researchers or practionners by using single parameter like number of defect detecting capability, cost, efforts, coveragebility of requirement/ code and quality of the results. This paper summarizes the various proposals related to test cases optimization. In addition to this, it highlights some research issues relating to above. Gaps in present study may suggest and guide the direction of future research.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: : Evolutionary Computing Techniques, Multi-Objective Optimization, Soft Computing Techniques, Test Cases, Test Data Adequacy Criteria.
A
Service-Oriented Architecture for Distributed Geoprocessing- A Case
Study of Landslide Susceptibility Mapping
by Mahsa Amini
Tareh, Ali Asghar Alesheikh, Mohammad Ebrahim Poorazizi
Vol. 6. n. 4, pp. 527-533
Abstract - Geologic hazards are mainly considered as natural sources of devastation around the world. Tehran, the capital of Iran, is not an exception. For effective reduction of such hazards and enhancement of situation awareness, environmental management systems are needed to comprehensively analyze the landscape based on loosely coupled, distributed architectures to support incorporating processing operations in terms of dynamic configuration and operation selection. One of the main technical challenges in developing such GIS (Geospatial Information System)-based systems is integrating large amounts of distributed geospatial resources (data and services) which are non-compliant to standards. This paper proposes a geospatial Service Oriented Architecture (SOA) as an efficient solution to the problem. It provides a novel implementation strategy that addresses the issues of distributed processing and service interoperability for environmental models. In this research, we have designed and developed a dynamic chain of geospatial processing services to generate landslide susceptibility map based on users’ preferences. Web services technology and OGC (Open Geospatial Consortium) WPS (Web Processing Service) standard specification were used to implement the required components of the geoprocessing engine. OpenLayers API (Application Programming Interface) and Web client technologies were used at the client-side to provide interactive user interface. The evaluation of the prototype system proved that the proposed architecture can improve chaining of distributed geospatial services, both in terms of reusability and performance, in environmental modeling applications. It is also concluded that coupling the Web services technology with OGC framework provides standards-based, interoperable services facilitating access, processing, and visualization of geospatial data to support effective decision making either in case of an emergency or in advance planning.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: GIS, Web Processing Service, Service Chaining, Landslide Susceptibility Analysis.
Anti-Collusion
Digital Fingerprinting Scheme Using Hybrid Coding
by Youwu Xu
Vol. 6. n. 4, pp. 534-537
Abstract - Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique serial number called fingerprint. In order to resist collusion attack that launched by some malicious customers, the serial number is usually generated from collusion secure code which can provide some traceabilities from the pirated data. Each of the existing collusion secure codes has advantages and disadvantages. This paper proposes a digital fingerprinting scheme for protecting multimedia data using hybrid coding, where the advantages of two well known collusion secure codes are combined together. Compared to previous schemes, the proposed scheme can not only trace traitors with a high probability, but also accommodate a lot of customers.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Digital Fingerprinting, Digital Copyright Protection, Collusion Secure Code, Collusion Resistance.
A
4.1-bit, 20 GS/s Comparator for High Speed Flash ADC in 45 nm CMOS
Technology
by M.J. Taghizadeh.
Marvast, H.Sanusi, M. A. Mohd. Ali
Vol. 6. n. 4, pp. 538-541
Abstract - A 4.1-bit, high speed comparator for high-speed flash analog-to-digital converter and K-band applications that can work at a sampling rate of 20GS/s is presented in this paper. This fully differential comparator consists of three stages using a new structure to improve its performance. The offset voltage of the designed comparator has been reduced by means of an active positive feedback. The CMOS positive feedback and a new structure as output circuit are used to improve sampling rate and performance of comparator. The analyses and simulation results were obtained by using CMOS parameters. The comparator can operate with a 1 V peak to peak input range consuming 0.561 mW. The predicted performance is verified by analyses and simulations using HSPICE tool.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Analog –to- Digital Converter, Comparator, Preamplifier.
A
Fuzzy Collaborative Intelligence System for Job Cycle Time Forecasting
in a Semiconductor Manufacturing Factory
by
Yu-Cheng Lin, Toly Chen, Yu Cheng Wang
Vol. 6. n. 4, pp. 542-549
Abstract - A fuzzy collaborative intelligence system is constructed in the present work to enhance the performance of job cycle time forecasting in a semiconductor manufacturing factory. In the fuzzy collaborative intelligence system, some experts from the application domain are gathered together and asked to put forward their points of view regarding several aspects. These views are incorporated into a fuzzy back propagation network (FBPN) to generate fuzzy-valued cycle time forecasts. To derive a single representative value from these fuzzy cycle time forecasts, a radial basis function (RBF) network is employed as both the aggregator and the defuzzifier in a multiple-input-single-output (MISO) manner. After validating the effectiveness of the fuzzy collaborative intelligence system with a real case, satisfactory results were obtained from which we also derived some directions for further improvement.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Semiconductor, Cycle Time, Forecasting, Fuzzy Back Propagation Network, Fuzzy Collaborative Intelligence.
Low
Power Compression in Linear Decompressor-Based Test Compression Environment
by
WeizhengWang, Jishun Kuang, Zhiqiang You
Vol. 6. n. 4, pp. 550-554
Abstract - Excessive power dissipation and growing test data volume are major issues in the testing of very large scale integrated (VLSI) circuits. It is meaningful to develop a holistic solution that targets both test compression and power reduction together. A new low power and high test-data compressibility test scheme in linear decompressor-based test compression environment is presented. The scheme is based on selective capture and shift during test. The key contribution of this paper is a flexible test-application framework that achieves significant reductions in switching activity during all phases of scan test: capture and shift. Moreover, our approach does not compromise compression ratios but rather improves the test-data compressibility. Experimental results on several larger ITC’ 99 benchmark circuits show that approximately 50% peak power reduction and 80% average power reduction during test, as well as saving of up to 20% specified bits that have to be encoded by decompressor, can be obtained.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Test Data Compression, Low Power Test, Test Patterns Reordering.
VLIW
Architecture Compilation-Simulation and its Implementation into FPGA
by D.
Saptono, V. Brost, F. Yang
Vol. 6. n. 4, pp. 555-564
Abstract - TEmbedded systems present a tremendous opportunity to customize designs by exploiting the application behavior. Shrinking time-to-market, coupled with short product lifetimes, create a critical need for rapid exploration and evaluation of candidate architectures achievement of these constraint. In the recent years, these systems have grown to the new concepts with inner computing processing for improving the performance that will be known as embedded computing system. Embedded computing with VLIW (Very Long Instruction Word) based architecture has been alternative choice to implement the target application into electronics devices in many areas such as digital image processing, telecommunication, and automobile devices. Working in this architecture needs compiler which has heavy tasks especially to implement scheduling algorithm for multi-operation instructions. VLIW compiler with retargetable architecture and Instruction Level Parallelism (ILP) ability could be improvement systems performance for reducing its embedded computing design constraints. Some VLIW architecture exploitation tools have been investigated to obtain the good model before its implementation into FPGA devices, there are VEX C compiler, Code Composer Studio, and OpenIMPACT compiler. In this paper, we propose a new methodology to enable retargetable VLIW processor into FPGA. It is based on the OpenIMPACT compiler model that provides an Intermediate Representation knows as Lcode with superblock formation optimization. This compiler has been chosen because generated the best result in simulation with measuring execution time and instructions code generation number than others. We have developed a toolchain to firstly perform Lcode analysis and ILP extraction, and then, to generate VHDL model of corresponding VLIW processor before its testing and validating using the ISE simulator. We have realized some image processing applications on the FPGA Virtex 6 using the proposed approach. We could summarize that the average execution time is improved 2.43 times than the TMS320 C64x processor, and small available hardware resources of the FPGA is used for these implementations.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Embedded Computing, Lcode, Superblock Formation, TMS320C64X, FPGA, Rapid Prototyping.
IEEE
802.21 Transport Layer Mobility Using mSCTP with Dynamic Address
Reconfiguration
by
Zahra Fattaholmanan Najafabadi, Mehdi AghaSarram, Naser Movahednia
Vol. 6. n. 4, pp. 565-569
Abstract – Recently, different type of wireless networks are available for mobile devices and they easily integrate various network types such as 802.11, 802.16 and also 3G. Considering the variety among these networks, a mobile device should be able to do handover between these networks seamlessly. This is while the current standards such don’t provide the essential information to support handover in heterogeneous networks. In order to solve this problem, IEEE proposed a new standard named Media Independent Handover or IEEE 802.21. In this paper we will use this standard to improve handover performance of SCTP transport layer protocol with Dynamic Address Reconfiguration Extension. For this purpose, SCTP protocol will use event service of MIH protocol to detecting appropriate time for handover and also will apply command service of this protocol to decision making algorithm for selecting best alternative interface. Simulation results show that the method base on MIH is more efficient than SCTP protocol base on failover mechanism.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: SCTP, MIH, Handover.
Joint
Channel Estimation and Power Allocation for Cognitive WPMCM UWB System
by
H.
Hosseini, N. Fisal, S.K. Syed-Yusof
Vol. 6. n. 4, pp. 570-575
Abstract – Cognitive Radio aims adaptive and aware communication for better utilization of available communication resources. Cognitive ultra wideband (UWB) system obtains attractive features such as robustness to multipath fading, high data rate, low cost, and low power consumption. Wavelet packet based multicarrier modulation (WPMCM) for UWB is a tempting choice due to its inherent potential to fulfill cognitive radio requirements. In this article, we survey the effect of channel fading on cognitive radio sensing mechanism through the literature, and propose an efficient pilot pattern strategy combined with power allocation to compensate the impairment from interfering primary signal and improve the system performance. Wavelet packet based energy detection is applied for spectrum analysis of cognitive WPMCM UWB, then, optimal power allocation is derived by Lagrange multiplier method to minimize the bit error rate (BER) at the receiver. Simulation results compare BER of the system under UWB channel models and verify the performance of the proposed scheme.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Cognitive Radio, Energy Detection, Power Allocation, Ultra Wideband, Wavelet Packet Transform.
Design
of Robust Congestion Control for TCP Networks via Fuzzy Sliding-mode Control
by
Zhang X.Z., Shen X.N., Duan Y.
Vol. 6. n. 4, pp. 576-585
Abstract – In this paper, a fuzzy T-S model based Active Queue Management controller via H∞ technique (H_FSMC) was proposed for the TCP networks in order to solve congestion control problem. A T-S fuzzy model was firstly formed to represent the dynamics of TCP/AQM. Then, the H_FSMC controller for TCP networks with parameters and flow disturbances was designed based on this fuzzy model. Based on H∞ technique, the SMC control law and its reachability are designed, which could drive the state trajectory of system onto the sliding surface within limited time. Also, the feedback gains and the system stability were formulated and proved in terms of linear matrix inequalities (LMIs). NS-2 Simulation results show that, compared with other exist controller, it can track queue length more quickly under various network conditions, and show more robustness to dynamic network disturbances.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Active Queue Management (AQM), H∞ Control, Takagi-Sugeno (T-S) Model, Sliding Mode Control.
Survey
of Latest WiMAX Technologies and Techniques
by
Wail Mardini, Yaser Khamayseh, Muneer Bani Yassein, Ghadeer Obiedat
Vol. 6. n. 4, pp. 586-602
Abstract – WiMAX is an emerging wireless technology. The main goal of WiMAX is to provide broadband wireless access with higher data rate and longer transmission range. Also, it provides high-speed connection to the Internet. This paper discusses the latest technologies and techniques in WiMAX and mobile WiMAX. Several papers were discussed in different topics; scheduling and call admission control, MAC layer performance, security, power consumption control, servicesand applications, and simulation tools.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: WiMAX, Mobile WiMAX, CAC, MAC, Security, Power Consumption.
Design and Implementation of an Embedded System for Administering a UNIX System through SMS Commands (SMS-SHELL)
by
A. Sbaa, R. El Bejjet, H. Medromi
Vol. 6. n. 4, pp. 603-606
Abstract – With the ongoing development of mobile networks, systems administration tasks can be performed remotely by having only a mobile phone. This concept was implemented by the establishment of an innovative embedded system called SMS-SHELL designed for UNIX system administration using SMS commands. In the first part of this article we will discuss the state of the art of multi-agent systems and input systems embedded in the design of our targeted system. Subsequently, we will present the architecture of our targeted system by specifying the various features, and communication protocols. This article ends with a conclusion and an outlook.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Embedded System, Multi agents systems, SHELL, SMS, UNIX.
Energy Consumption of Mobile Intelligent System
by
A. Ouacha, N. Lakki, A. Habbani, J. Oubaha, M. Elkoutbi, J. El Abbadi
Vol. 6. n. 4, pp. 607-614
Abstract – In this paper, we introduce the conception of original Mobile Intelligent System (MIS) in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human being, in order to collect data by various sensors and transmits them by routing to a unit of distant process. In the sake of studying the performance, a set of experiments was carried out to evaluate how the different value of time control packet affect the energy usage in MIS.
Copyright © 2011 Praise Worthy Prize S.r.l. - All rights reserved
Keywords: Energy efficiency, Quality of Service, performance, Intelligent sensors and wireless sensor network.
Trade-off
between Area and Speed for Projective Edwards Elliptic Curves
Crypto-System over Gf (P) Using Parallel Hardware Designs and
Architectures
by
Mohammad Alkhatib, Azmi Jaafar, Zuriati Zukarnain, Mohammad Rushdan
Vol. 6. n. 4, pp. 615-625
Abstract - Elliptic
Curves Crypto-system (ECC) has been widely involved in many security
applications. ECC computations suffer the long time inversion operation
when applied using usual affine coordinates which affects the
performance of ECC. Moreover, while the majority of previous researches
focused on addressing the performance of ECC, other factors that play
crucial role in building efficient ECC design for different security
applications have not been intensively investigated, such as area,
system utilization, resources-consuming, AT, and AT2 cost factors. Our
research proposes several designs and architectures for Edwards ECC over
GF (p) using projective coordinates (X/Z2 Y/Z2). All our proposed
designs apply ECC computations with no inversion operation. To improve
the performance even further, our research utilizes the inherent
parallelism in elliptic curves computations by applying arithmetic
operations for ECC in parallel. Our results show that the performance
for the proposed 5-PM design overcomes designs using the known
projective coordinates as well as the affine coordinates, since it
achieves the shortest time delay. Furthermore, the other proposed
designs provide an attractive trade-off between mentioned factors by
varying the degree of parallelism for ECC computational schemes.
Although this trade-off compromises the performance of ECC, the other
factors were enhanced progressively. This helps to select the most
suitable ECC design for several elliptic curves applications according
to their requirements and available resources. The 2-PM design obtains
the best system utilization results and AT cost with less area in
comparison with designs using a higher degree of parallelism.
Copyright © 2011 Praise Worthy Prize S.r.l. -
All rights reserved
Keywords: Elliptic Curves Cryptography, Point Doubling Operation, Projective Coordinates, Parallel Hardware Design, System Utilization, Resources, Area.
Please send any
questions about this web site to
info@praiseworthyprize.it
Copyright © 2005-2014 Praise Worthy Prize