Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures
Over the past years, researchers drew their attention to propose optoelectronic architectures, including optical transpose interconnection system (OTIS) networks. On the other hand, there are limited attempts devoted to design parallel algorithms for ...
Interactive 3D simulation for fluid---structure interactions using dual coupled GPUs
The scope of this work involves the integration of high-speed parallel computation with interactive, 3D visualization of the lattice-Boltzmann-based immersed boundary method for fluid---structure interaction. An NVIDIA Tesla K40c is used for the ...
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
Recently, Tewari and Gupta proposed a ultra-lightweight mutual authentication protocol in IoT environments for RFID tags. Their protocol aims to provide secure communication with least cost in both storage and computation. Unfortunately, in this paper, ...
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the internet network. One part of the infrastructure of IoT is Radio Frequency Identification (RFID). One way to fortify the system and prevent it against an ...
General queuing model for optimal seamless delivery of payload processing in multi-core processors
Recent developments in unmanned aerial systems (UAS) provide new opportunities in remote sensing application. In contrast to satellite and conventional (manned) aerial tasks, UAS flights can be operated in a very short period of time. UAS can also be ...
Recommender system architecture based on Mahout and a main memory database
In this study, we propose a news recommendation system architecture using a main memory database (DB) and Mahout. The user's news preference rate is calculated automatically based on the time the user spends reading news items and their length. While ...
Resource-aware virtual machine placement algorithm for IaaS cloud
Cloud computing is an on-demand Internet-based computing service, where computing resources are shared among the users via the Internet and its usage based on the pay-for-use model. Virtualization of computing resources allows the system to use the ...
A novel buffer management scheme based on particle swarm optimization for SSD
As flash memory becomes popular, flash memory-based solid-state drive (SSD) has been the major storage device. SSD has numerous merits such as high I/O speed, low energy consumption, strong shock resistance and small form factor. Meanwhile, some ...
A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems
Recently, graphical processing units (GPUs) have found a prominent role in general-purpose applications. Specifically, in parallel processing applications where a considerable number of tasks should be processed while meeting specific design ...
A churn-aware durable data storage scheme in hybrid P2P networks
Durable P2P data storage is a research focus in recent years. It aims at providing data for requesters anytime and anywhere. Considering the fact that any peer could join and leave P2P network freely and randomly, how to improve the data availability is ...
ECCN: an extended CCN architecture to improve data access in vehicular content-centric network
Content-centric network (CCN) has been considered for VANETs, due to its scalability, flexibility and security. In this paper, an extended CCN architecture is proposed to reduce critical data access time in vehicular content centric networks by storing ...
A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets
Virtualized server systems, as a major underlying element in high-performance computing systems, require further studies on many aspects of dependability. Among the significant factors, the availability measures are crucial to deliver high-quality ...
Survey on clustering in heterogeneous and homogeneous wireless sensor networks
- Ali Shokouhi Rostami,
- Marzieh Badkoobe,
- Farahnaz Mohanna,
- Hengameh Keshavarz,
- Ali Asghar Hosseinabadi,
- Arun Kumar Sangaiah
In wireless sensor networks (WSNs), nodes have limited energy and cannot be recharged. In order to tackle this problem, clustering methods are employed to optimize energy consumption, gather data and also enhance the effective lifetime of the network. ...
A fast optimal parallel algorithm for a short addition chain
Given a natural number e, an addition chain for e is a finite sequence of numbers having the following properties: (1) the first number is one, (2) every element is the sum of two earlier elements, and (3) the given number occurs at the end of the ...
On energy consumption of switch-centric data center networks
Data center network (DCN) is the core of cloud computing and accounts for 40% energy spend when compared to cooling system, power distribution and conversion of the whole data center (DC) facility. It is essential to reduce the energy consumption of DCN ...
An adaptive task allocation technique for green cloud computing
The rapid growth of todays IT demands reflects the increased use of cloud data centers. Reducing computational power consumption in cloud data center is one of the challenging research issues in the current era. Power consumption is directly ...
Energy-efficient load balancing scheme for two-tier communication in wireless sensor networks
Wireless sensor network (WSN) has gained an enormous attention of researchers with its dynamic applications. Energy is considered as a scarce and the most vital resource in WSNs. In clustering-based approach, there is huge energy consumption while ...
Dynamic performance isolation management for cloud computing services
Unmanaged resource contention in cloud computing environments can cause problems such as performance interference, service quality degradation, and consequently service agreements violation. Performance isolation is an indispensable remedy solution for ...
GPU-based real-time super-resolution system for high-quality UHD video up-conversion
Super-resolution (SR) is a technique that reconstructs high-resolution images using the information present in low-resolution images. Due to their potentials of being used in wide range of image and video applications, various SR algorithms have been ...
Energy constrained scheduling of stochastic tasks
Energy-efficient scheduling of stochastic tasks is considered in this paper. The main characteristic of a stochastic task is that its execution time is a random variable whose actual value is not known in advance, but only its probability distribution. ...
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
In recent years, RFID (radio-frequency identification) systems are widely used in many applications. One of the most important applications for this technology is the Internet of things (IoT). Therefore, researchers have proposed several authentication ...