Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Hardware Efficient Pseudo-Random Number Generator Using Chen Chaotic System on FPGA

    This paper introduces an FPGA implementation of a pseudo-random number generator (PRNG) using Chen’s chaotic system. This paper mainly focuses on the development of an efficient VLSI architecture of PRNG in terms of bit rate, area resources, latency, maximum length sequence, and randomness. First, we analyze the dynamic behavior of the chaotic trajectories of Chen’s system and set the parameter’s value to maintain low hardware design complexity. A circuit realization of the proposed PRNG is presented using hardwired shifting, additions, subtractions, and multiplexing schemes. The benefit of this architecture, all the binary multiplications (except XiYi and XiZi) operations are performed using hardwired shifting. Moreover, the generated sequences pass all the 15 statistical tests of NIST, while it generates pseudo-random numbers at a uniform clock rate with minimum hardware complexity. The proposed architecture of PRNG is realized using Verilog HDL, prototyped on the Virtex-5 FPGA (XC5VLX50T) device, and its analysis has been done using the Matlab tool. Performance analysis confirms that the proposed Chen chaotic attractor-based PRNG scheme is simple, secure, and hardware efficient, with high potential to be adopted in cryptography applications.

  • articleNo Access

    Efficient Hardware Implementation of Pseudo-Random Bit Generator Using Dual-CLCG Method

    In this work, the architecture of a dual-coupled linear congruential generator (dual-CLCG) for pseudo-random bit generation is proposed to improve the speed of the generator and minimize power dissipation with the optimum chip area. To improve its performance, a new pseudo-random bit generator (PRBG) employing two-operand modulo adder and without shifting operation-based dual-CLCG architecture is proposed. The novelty of the proposed dual-CLCG architecture is the designing of LCG based on two-operand modulo adder rather than a three-operand one and without using shifting operation as compared to the existing LCG architecture. The aim of the work is to generate pseudo-random bits at a uniform clock rate at the maximum clock frequency and achieve maximum length of the random bit sequence. The power dissipation with the optimum chip area of PRBG is also observed for the proposed architecture. The generated sequence passes all the 15 tests of the National Institute of Standards and Technology (NIST) standard. Verilog HDL code is used for the design of the proposed architecture. Its simulation is done on commercially available Spartan-3E FPGA (ISE Design Suite by Xilinx) as well as on 90-nm CMOS technology (Cadence tool).

  • articleNo Access

    LATENCY AND LIQUIDITY RISK

    Latency (i.e. time delay) in electronic markets affects the efficacy of liquidity taking strategies. During the time liquidity, takers process information and send marketable limit orders (MLOs) to the exchange, the limit order book (LOB) might undergo updates, so there is no guarantee that MLOs are filled. We develop a latency-optimal trading strategy that improves the marksmanship of liquidity takers. The interaction between the LOB and MLOs is modeled as a marked point process. Each MLO specifies a price limit so the order can receive worse prices and quantities than those the liquidity taker targets if the updates in the LOB are against the interest of the trader. In our model, the liquidity taker balances the tradeoff between the costs of missing trades and the costs of walking the book. In particular, we show how to build cost-neutral strategies, that on average, trade price improvements for fewer misses. We employ techniques of variational analysis to obtain the price limit of each MLO the agent sends. The price limit of an MLO is characterized as the solution to a class of forward–backward stochastic differential equations (FBSDEs) driven by random measures. We prove the existence and uniqueness of the solution to the FBSDE and numerically solve it to illustrate the performance of the latency-optimal strategies.

  • articleNo Access

    Adaptive virtual MIMO-based cross-layer design for wireless sensor networks via hybrid optimization model

    In recent times, many MAC protocols were implemented for boosting and improving energy efficiency (EE) in WSNs. Moreover, the cooperative MIMO method is found to be much capable of enhancing the EE of WSNs if configured properly. This paper intends to propose cross-layer design for multihop virtual MIMO system to enhance the end-to-end (ETE) reliability, EE, and QoS of the adopted WSN. The protocol is set here to focus on the energy utilization for transmission of data packets by optimal selection of transmission constraints for each node of the network. Moreover, the protocol’s ETE latency and throughput are also modeled as the dependent variables of BER performance of every link. To discover the improved BER criteria of each link that meets the ETE QoS requirement in reduced energy utilization, this paper employs a new hybrid optimization algorithm named Lion Mutated Dragonfly Algorithm (LM–DA) that is a hybrid variant of both Lion Algorithm (LA) and Dragonfly Algorithm (DA). Finally, the performance of the adopted scheme is validated over other state-of-the-art models. The results state that the energy consumed by the adopted LM–DA approach is about 2.65%, 1.77%, and 1.77% reduced over LA, PSO, and DA schemes, respectively.

  • articleNo Access

    LOW POWER, LOW LATENCY, HIGH THROUGHPUT 16-BIT CSA ADDER USING NONCLOCKED PASS-TRANSISTOR LOGIC

    As the CMOS technology continues to scale to achieve higher performance, power dissipation and robustness to leakage and, process variations are becoming major obstacles for circuit design in the nanoscale technologies. Due to increased density of transistors in integrated circuits and higher frequencies of operation, power consumption, propagation delay, PDP, and area is reaching the lower limits. We have designed 16-bit adder circuit by Carry-Select Adder (CSA) using different pass-transistor logic. The adder cells are designed by DSCH3 CAD tools and layout are generated by Microwind 3 VLSI CAD tools. Using CSA technique, the power dissipation, PDP, area, transistor count, are calculated from the layout cell of proposed 16-bit adder for Ultra Deep Submicron feature size of 120, 90, 70, and 50 nm. The UDSM signal parameters are calculated such as signal to noise ratio (SNR), energy per instruction (EPI), Latency, and throughput using layout parameter analysis of BSIM 4. The simulated results show that the CPL is dominant in terms of power dissipation, propagation delay, PDP, and area among the other pass gate logics. Our CPL circuit dominates in terms of EPI, SNR, throughput, and latency in signal parameters analysis. The proposed CPL adder circuit is compared with reported results and found that our CPL circuit gives better performance.

  • articleNo Access

    Hardware Efficient Hybrid Pseudo-Random Bit Generator Using Coupled-LCG and Multistage LFSR with Clock Gating Network

    A new method for the generation of pseudo-random bits, based on a coupled-linear congruential generator (CLCG) and two multistage variable seeds linear feedback shift registers (LFSRs) is presented. The proposed algorithm dynamically changes the value of the seeds of each linear congruential generator (LCG) by utilizing the multistage variable seeds LFSR. The proposed approach exhibits several advantages over the pseudo-random bit generator (PRBG) methods presented in the literature. It provides low hardware complexity and high-security strength while maintaining the minimum critical path delay. Moreover, this design generates the maximum length of pseudo-random bit sequence with uniform clock latency. Furthermore, to improve the critical path delay, one more architecture of PRBG is proposed in this work. It is based on the combination of coupled modified-LCG with two variable seeds multistage LFSRs. The modified LCG block is designed by the two-operand modulo adder and XOR gate, rather than the three-operands modulo adder and shifting operation, while it maintains the same security strength. The clock gating network (CGN) is also used in this work to minimize the dynamic power dissipation of the overall PRBG architecture. The proposed architectures are implemented using Verilog HDL and further prototyped on commercially available field-programmable gate array (FPGA) devices Virtex-5 and Virtex-7. The realization of the proposed architecture in this FPGA device accomplishes an improved speed of PRBG, which consumes low power with high randomness compared to existing techniques. The generated binary sequence from the proposed algorithms has been verified for randomness tests using NIST statistical test suites.

  • articleNo Access

    Generic Method for SDN Controller Selection Using AHP and TOPSIS Methods

    The control plane plays an essential role in the implementation of Software Defined Network (SDN) architecture. Basically, the control plane is an isolated process and operates on control layer. The control layer encompasses controllers which provide a global view of the entire SDN. The Controller selection is more crucial for the network administrator to meet the specific use case. This research work mainly focuses on obtaining a better SDN controller. Initially, the SDN controllers are selected using integrated Analytic Hierarchy Process and Technique for Order Preference Similarity to Ideal Solution (AHP and TOPSIS) method. It facilitates to select minimal number of controllers based on their features in the SDN application. Finally, the performance evaluation is carried out using the CBENCH tool considering the best four ranked controllers obtained from the previous step. In addition, it is validated with the real-time internet topology such as Abilene and ERNET considering the delay factor. The result shows that the “Floodlight” controller responds better for latency and throughput. The selection of an optimum controller-Floodlight, using the real-world Internet topologies, outperforms in obtaining the path with a 28.57% decrease in delay in Abilene and 16.94% in ERNET. The proposed work can be applied in high traffic SDN applications.

  • articleNo Access

    A New Methodology for Implementing the Data Distribution Service on Top of Gigabit Ethernet for Automotive Applications

    Today’s vehicles have become increasingly complex, as consumers demand more features and better quality in their cars. Most of these new features require additional electronic control units (ECU) and software control, constantly pushing back the limits of existing architectures and design methodologies. Indeed, modern automobiles have a larger number of critical time functions distributed and running simultaneously on each ECU. Data Distribution Service (DDS) is a publish/subscribe middleware specified by the international consortium Object Management Group (OMG), which makes the information available in real time, while offering a rich range of quality of service (QoS) policies. In this paper, we propose a new methodology to integrate DDS in automotive application. We evaluate the performance of our new design by testing the fulfillment of real time QoS requirements. We also compare the performance of the vehicle application when using FlexRay and Ethernet networks. Computations prove that the use of DDS over Gigabit Ethernet (GBE) is promising in the automotive field.

  • articleNo Access

    Optimal Offloading for Streaming Applications in Mobile Edge Computing

    With the rapid development of smart mobile devices, mobile applications are becoming more and more popular. Since mobile devices usually have constrained computing capacity, computation offloading to mobile edge computing (MEC) to achieve a lower latency is a promising paradigm. In this paper, we focus on the optimal offloading problem for streaming applications in MEC. We present solutions to find offloading policies of streaming applications to achieve an optimal latency. Streaming applications are modeled with synchronous data flow graphs. Two architecture assumptions are considered — with sufficient processors on both the local device and the MEC server, and with a limited number of processors on both sides. The problem is generally NP-complete. We present an exact algorithm and a heuristic algorithm for the former architecture assumption and a heuristic method for the latter. We carry out our experiments on a practical application and thousands of synthetic graphs to comprehensively evaluate our methods. The experimental results show that our methods are effective and computationally efficient.

  • articleNo Access

    GOKA: A Network Partition and Cluster Fusion Algorithm for Controller Placement Problem in SDN

    Software Defined Networking (SDN) is a new promising network architecture, with the property of decoupling the data plane from the control plane and centralizing the network topology logically, making the network more agile than traditional networks. However, with the continuous expansion of network scales, the single-controller SDN architecture is unable to meet the performance requirements of the network. As a result, the logically centralized and physically separated SDN multi-controller architecture comes into being, and thereupon the Controller Placement Problem (CPP) is proposed. In order to minimize the propagation latency in Wide Area Network (WAN), we propose Greedy Optimized K-means Algorithm (GOKA) which combines K-means with greedy algorithm. The main thought is to divide the network into multiple clusters, merge them greedily and iteratively until the given number of controllers is satisfied, and place a controller in each cluster through the K-means algorithm. With the purpose of proving the effectiveness of GOKA, we conduct experiments to compare with Pareto Simulated Annealing (PSA), Adaptive Bacterial Foraging Optimization (ABFO), K-means and K-means++ on 6 real topologies from the Internet Topology Zoo and Internet2 OS3E. The results demonstrate that GOKA has a better and more stable solution than other four heuristic algorithms, and can decrease the propagation latency by up to 83.3%, 70.7%, 88.6% and 64.5% in contrast to PSA, ABFO, K-means and K-means++, respectively. Moreover, the error rate between GOKA and the best solution is always less than 10%, which promises the precision of our proposed algorithm.

  • articleNo Access

    Multi-Objective Controller Failure Aware Capacitated Controller Placement in Software-Defined Networks

    Software-Defined Networking disassociates the control plane from data plane. The problem of deciding upon the number and locations of controllers and assigning switches to them has attracted the attention of researchers. Foreseeing the possibility of failure of a controller, a backup controller has to be maintained for each switch so that the switches assigned to the failed controller can immediately be connected to their backup controllers. Hence, the switches cannot experience disconnections in case of failure of their controller. In this paper, two mathematical models are proposed. The first model focuses on minimizing the average of latencies from all switches to their backup controllers while considering the failure of the controllers. The second model aims at minimizing both the average and worst-case of latencies from all switches to the corresponding backup controllers. Both of our models are evaluated on three networks and are compared (in terms of two metrics, viz., average and worst-case latencies) with an existing model that focuses on minimizing only worst-case latency. The first model gives better average latency compared to the reference model. The second model also gives better average latency and almost equal worst-case latency compared to the reference model.

  • articleOpen Access

    Parallel Implementation of RC4 Data Encryption Method for Cloud Computing

    Computing Open01 Jan 2023

    Cloud computing is an on-demand availability of computing resources. The current cloud computing environment uses different algorithms for its security; RC4 is one of them. However, due to the serial implementation of RC4 over cloud computing, the process of encryption and data transmission is badly affected by the factors of poor latency. This research is proposed to cover this factor by implementing a parallel RC4 algorithm in a cloud computing environment. The parallel RC4 model has been developed in web-based architecture relevant to the cloud computing environment. The method processed data simultaneously in four parallel pipelines encrypted through the RC4 algorithm. The proposed method used RC4 algorithms’ parallel implementation to encrypt and decrypt the data. The proposed method increases the efficiency of data encryption and decryption and transmission over a cloud environment using four pipelines at once. These four pipelines receive data and encrypt them using a key and then merge those four streams into a single cipher. These four pipelines enhance the speed of communication over cloud and solve the latency issue majorly. Data sending from node devices to cloud servers is divided into four equal streams and then encrypted using RC4 distinctly but parallel. Then after the roaming, the data are again first combined and then decrypted using the RC4 algorithm. The sample data sets are evaluated on the criteria of the starting time and ending time of the encryption and decryption of data. Results show that the proposed method is able to enhance the speed of the whole process up to average 3.7% due to the implementation of parallel technique and had reduced the time notably. The future work on this research involves enhancement of security process of RC4 algorithm since it can be breached easily.

  • chapterNo Access

    Chapter 7: VANETs: Introduction, Communication Protocols, and Challenges

    The management of increased demand for the utilization of available road infrastructure thanks to urbanization that has attracted the interest of researchers in the domain of Intelligent Transportation System (ITS). This helps the commuter to travel in congestion-free, accident-free, and efficient road scenarios. Vehicular ad hoc networks (VANETs) form a vital element of the ITS. VANET is defined as a subcategory of mobile ad hoc networks (MANETs) with some predefined distinct properties. Unlike MANET, VANET has no constraint on the node’s battery life, but there is a bandwidth constraint in this scenario. VANET supports two types of communication: either among vehicles or among vehicles and infrastructure. The key objectives of VANETs are to modify public safety and transportation efficiency in the highly dynamic and mobile scenario. This chapter provides detailed information regarding the VANETs and their characteristics, network layer-wise communication protocols, shortcomings, features, and applications, and finally the challenges and future scope.