Articles
Recent Submissions
-
Geospatial cyberinfrastructure for regional economic growth
(IEEE, 2020-08-04)Cyberinfrastructure (CI) has potential to assist economic activities that involve real-time data analytics. Important challenges include the integration of essential geospatial principles (such as spatial constraints in ... -
A promising security protocol for protecting near field communication devices from networking attacks
(Inderscience Enterprises Ltd., 2017)Near field communication (NFC) is vulnerable to numerous networking attacks such as tag manipulation. In this work, a security protocol for the NFC chip is introduced to protect the NFC devices and associated data from ... -
An energy-efficient directory based multicore architecture with wireless routers to minimize the communication latency
(IEEE Computer Society, 2016-05-20)Multicore architectures suffer from high core-to-core communication latency primarily due to the cache's dynamic behavior. Studies suggest that a directory-approach can be helpful to reduce communication latency by storing ... -
Cache modeling and optimization for portable devices running MPEG-4 video decoder
(Springer, 2006-01)There are increasing demands on portable communication devices to run multimedia applications. ISO (an International Organization for Standardization) standard MPEG-4 is an important and demanding multimedia application. ... -
GPU computing to improve game engine performance
(ITB Journal Publisher, 2014-05)Although the graphics processing unit (GPU) was originally designed to accelerate the image creation for output to display, today's general purpose GPU (GPGPU) computing offers unprecedented performance by offloading ... -
An eye blinking password based liveness monitoring system to improve the detection of video spoofing
(IJMEC, 2015-10)Contemporary protocols in the TCP/IP suite may be very vulnerable to spoofing attacks when extra precautions are not taken to verify the identity. There are several ways to spoof the facial recognition such as using ... -
Study of hydrophilic electrospun nanofiber membranes for filtration of micro and nanosize suspended particles
(MDPI, 2013-11-14)Polymeric nanofiber membranes of polyvinyl chloride (PVC) blended with polyvinylpyrrolidone (PVP) were fabricated using an electrospinning process at different conditions and used for the filtration of three different ... -
Improving cache locking performance of modern embedded systems via the addition of a miss table at the L2 cache level
(Elsevier, 2010-04)To confer the robustness and high quality of service, modern computing architectures running real-time applications should provide high system performance and high timing predictability. Cache memory is used to improve ... -
A way cache locking scheme supported by knowledge based smart preload effective for low-power multicore electronics
(American Scientific Publishers, 2012-12-01)Adopting multicore architecture in consumer and bio-inspired electronics is promising to fulfill the growing need of high-performance. However, multi-level caches in multicore architecture require significant amount of ... -
Impact of level-2 cache sharing on the performance and power requirements of homogeneous multicore embedded systems
(Elsevier, 2009-08)In order to satisfy the needs for increasing computer processing power, there are significant changes in the design process of modern computing systems. Major chip-vendors are deploying multicore or manycore processors to ... -
Evaluation of memory latency in cluster-based cache-coherent multiprocessor systems with different interconnection topologies
(Elsevier, 2000-04-03)This research investigates memory latency of cluster-based cache-coherent multiprocessor systems with different interconnection topologies. Each node in a cluster includes a small number of processors and a portion of the ...