NTB branch predictor: dynamic branch predictor for high-performance embedded processors
Branch prediction accuracy becomes more crucial in high-performance embedded processors. The importance of branch prediction in embedded processors continues to grow in the future. Many branch predictors have been proposed to alleviate the performance ...
Relative weight comparison between virtual key factors of cloud computing with analytic network process
Drastical increase of a variety of information devices with networks are based on a rapid development and expansion of network infrastructures and technology. Cloud computing is a main technology which makes the information devices lighter and allows ...
Hybrid app security protocol for high speed mobile communication
In this paper, security vulnerabilities that can be found in hybrid apps, by which important data are downloaded from a web server, were analyzed and HIGHT algorithm based on OTP delimiter modification and bit slicing was proposed to enhance security of ...
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks
The motion of address resolution protocol (ARP) is done without any problem in a general environment, but it is not considered from the security aspect; therefore, it risks being threatened by an attack from the network called ARP spoofing or ARP ...
Speaker diarization method of telemarketer and client for improving speech dictation performance
Financial institutions employ speech dictation systems that convert the conversation recordings between telemarketer and client into the texts. The dictation system is necessary for checking incomplete sales, in which a telemarketer fails to provide ...
Design of a high-efficient MSD adder
Carry propagation delay is a big obstacle to improve the addition efficiency in computer system. And the more data bits the operands have, the delay is more serious. As data bits of operand in optical computer can be huge this makes carry delay be very ...
Implications of shallower memory controller transaction queues in scalable memory systems
Scalable memory systems provide scalable bandwidth to the core growth demands in multicores and embedded systems processors. In these systems, as memory controllers (MCs) are scaled, memory traffic per MC is reduced, so transaction queues become ...
Simulated smart phone recordings for audio identification
This paper studies the use of simulated recordings to perform audio identification experiments. In contrast to use actual recordings in the experiments, we use the measured room impulse response to generate simulated recordings. Doing so greatly reduces ...
Anonymous paperless secure payment system using clouds
The growth of wireless networks and the increasing popularity of mobile devices present a significant opportunity to empower them as payment devices. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, ...
Distributed RDF store for efficient searching billions of triples based on Hadoop
As the development of IT and scientific technology, very large amounts of knowledge data are continuously being created and the big data era can be said to have arrived. Therefore, RDF store inserting and inquiring into knowledge bases has to be scaled ...
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM
Cases of classified information leakage have become increasingly common. To address this problem, we have proposed a function for tracing the diffusion of classified information within an operating system. However, this function suffers from the ...
Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system
Today, the power line communication (PLC) is being used for the configuration of Home-Network or factory automation. Due to the improvements in both the stability and the transmission speed resulting from recent digital PLC method, its field of ...
High performance clustering algorithm for analysis of protein family clusters
Techniques for analyzing genome sequences in high performance environments to predict the function and structure of a protein have been developing. The function of a protein is determined by its characteristics and the sequence pattern, and a protein is ...
Cloud service ranking as a multi objective optimization problem
Cloud computing is a kind of computing model on subscription basis. In cloud computing environment, there are a lot of cloud providers that present variety kind of services with different quality of services. Users have various kinds of applications ...
J2M: a Java to MapReduce translator for cloud computing
Cloud computing has gradually evolved into an infrastructural tool for a variety of scientific research and computing. It has become a trend that lots of products have been migrated from local servers to cloud by many institutions and organizations. One ...
Experimental analysis of operating system jitter caused by page reclaim
Operating system jitter is one of the causes of runtime overhead in high-performance computing applications. Many high-performance computing applications perform burst accesses to I/O, and such accesses consume a large amount of memory. When the Linux ...
A novel MPI reduction algorithm resilient to imbalances in process arrival times
Reduction algorithms are optimized only under the assumption that all processes commence the reduction simultaneously. Research on process arrival times has shown that this is rarely the case. Thus, all benchmarking methodologies that take into account ...
Combining association rule mining and network analysis for pharmacosurveillance
- Eugene Belyi,
- Philippe J. Giabbanelli,
- Indravadan Patel,
- Naga Harish Balabhadrapathruni,
- Aymen Ben Abdallah,
- Wedyan Hameed,
- Vijay K. Mago
Retailers routinely use association mining to investigate trends in the use of their products. In the medical world, association mining is mostly used to identify associations between symptoms and diseases, or between drugs and adverse events. In ...
A novel heuristic algorithm for IP block mapping onto mesh-based networks-on-chip
With advancement in the nanometer era, more and more intellectual property (IP) blocks can be integrated on a single die. Network-on-chip (NoC) has emerged as a viable alternative to unplug the communication bottleneck in system-on-chip. In the NoC ...