In cryptography, the Triple DES (3DES, TDES or officially TDEA) is a symmetric-key block cipher which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Electronic payment syst...In cryptography, the Triple DES (3DES, TDES or officially TDEA) is a symmetric-key block cipher which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Electronic payment systems are known to use the TDES scheme for the encryption/decryption of data, and hence faster implementations are of great significance. Field Programmable Gate Arrays (FPGAs) offer a new solution for optimizing the performance of applications meanwhile the Triple Data Encryption Standard (TDES) offers a mean to secure information. In this paper we present a pipelined implementation in VHDL, in Electronic Code Book (EBC) mode, of this commonly used cryptography scheme with aim to improve performance. We achieve a 48-stage pipeline depth by implementing a TDES key buffer and right rotations in the DES decryption key scheduler. Using the Altera Cyclone II FPGA as our platform, we design and verify the implementation with the EDA tools provided by Altera. We gather cost and throughput information from the synthesis and timing results and compare the performance of our design to common implementations presented in other literatures. Our design achieves a throughput of 3.2 Gbps with a 50 MHz clock;a performance increase of up to 16 times.展开更多
With increasing complexity of today’s electromagnetic problems, the need and opportunity to reduce domain sizes, memory requirement, computational time and possibility of errors abound for symmetric domains. With sev...With increasing complexity of today’s electromagnetic problems, the need and opportunity to reduce domain sizes, memory requirement, computational time and possibility of errors abound for symmetric domains. With several competing computational methods in recent times, methods with little or no iterations are generally preferred as they tend to consume less computer memory resources and time. This paper presents the application of simple and efficient Markov Chain Monte Carlo (MCMC) method to the Laplace’s equation in axisymmetric homogeneous domains. Two cases of axisymmetric homogeneous problems are considered. Simulation results for analytical, finite difference and MCMC solutions are reported. The results obtained from the MCMC method agree with analytical and finite difference solutions. However, the MCMC method has the advantage that its implementation is simple and fast.展开更多
Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) att...Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the US and South Korean governments’ websites is indicative of the fact that the security systems may not have been adequately deployed to counteract such attacks. IPS is a vital security device which is commonly used as a front line defense mechanism to defend against such DoS attacks. Before deploying a firewall or an IPS device for network protection, in many deployments, the performance of firewalls is seldom evaluated for their effectiveness. Many times, these IPS’s can become bottleneck to the network performance and they may not be effective in stopping DoS attacks. In this paper, we intend to drive the point that deploying IPS may not always be effective in stopping harmful effects of DoS attacks. It is important to evaluate the capability of IPS before they are deployed to protect a network or a server against DoS attacks. In this paper, we evaluate performance of a commercial grade IPS Cisco ASA-5510 IPS to measure its effectiveness in stopping a DoS attacks namely TCP-SYN, UDP Flood, Ping Flood and ICMP Land Attacks. This IPS comes with features to counteract and provide security against these attacks. Performance of the IPS is measured under these attacks protection and compared with its performance when these protection features were not available (i.e. disabled). It was found that the IPS was unable to provide satisfactory protection despite the availability of the protection features against these flooding attacks. It is important for the network managers to measure the actual capabilities of an IPS system before its deployment to protect critical information infrastructure.展开更多
Nowadays many devices that make up a computer network are being equipped with security hardware and software features to prevent cyber security attacks. The idea is to distribute security features to intermediate syst...Nowadays many devices that make up a computer network are being equipped with security hardware and software features to prevent cyber security attacks. The idea is to distribute security features to intermediate systems in the network to mitigate the overall adverse effect of cyber attacks. In this paper, we will be focusing on the Juniper J4350 router with the Junos Software Enhanced, and it has security-attack protections in the router. We are going to evaluate how the Juniper router with built-in security protections affected the overall server performance under a cyber security attack.展开更多
In recent years,the study of body movement performance in disease assessment has attracted significant attention.Duchenne Muscular Dystrophy(DMD)is a disease that significantly affects mobility.It is crucial to assess...In recent years,the study of body movement performance in disease assessment has attracted significant attention.Duchenne Muscular Dystrophy(DMD)is a disease that significantly affects mobility.It is crucial to assess the movement of both the upper and lower limbs to diagnose this condition effectively.This research categorizes DMD assessment methods into two types:human-based assessments(based on questionnaires)and Machine-based assessments(using motion tracking and computer algorithms).The validity of human-based assessments,which often focus on daily activities and muscle strength,may be called into question.This issue underscores the necessity of utilizing qualitative and observational methods to achieve more accurate assessments.In contrast,Machine-based assessment have benefited from recent technological advancements that enable innovative techniques for disease evaluation,thereby improving the accuracy and validity of DMD diagnosis.The integration of motion tracking systems with artificial intelligence algorithms mitigates the limitations of visual and subjective assessments,providing more precise and objective results.These advancements aim to enhance the accuracy,reliability,and validity of DMD diagnosis while offering a more comprehensive approach to assessing individuals with the condition.In this study,the existing assessment methods in both categories are introduced and compared,analyzing their advantages and limitations to provide an accurate evaluation of their performance in diagnosing DMD.The aim of this review is to identify the best methods for diagnosing and monitoring DMD based on accuracy,reliability,and efficiency.展开更多
With the deregulation of the electric power industry, electricity price forecasting plays an increasingly important role in electricity markets, especially for retailors and investment decision making. Month ahead ave...With the deregulation of the electric power industry, electricity price forecasting plays an increasingly important role in electricity markets, especially for retailors and investment decision making. Month ahead average daily electricity price profile forecasting is proposed for the first time in this paper. A hybrid nonlinear regression and support vector machine(SVM) model is proposed. Offpeak hours, peak hours in peak months and peak hours in off-peak months are distinguished and different methods are designed to improve the forecast accuracy. A nonlinear regression model with deviation compensation is proposed to forecast the prices of off-peak hours and peak hours in off-peak months. SVM is adopted to forecast the prices of peak hours in peak months. Case studies based on data from ERCOT validate the effectiveness of the proposed hybrid method.展开更多
文摘In cryptography, the Triple DES (3DES, TDES or officially TDEA) is a symmetric-key block cipher which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Electronic payment systems are known to use the TDES scheme for the encryption/decryption of data, and hence faster implementations are of great significance. Field Programmable Gate Arrays (FPGAs) offer a new solution for optimizing the performance of applications meanwhile the Triple Data Encryption Standard (TDES) offers a mean to secure information. In this paper we present a pipelined implementation in VHDL, in Electronic Code Book (EBC) mode, of this commonly used cryptography scheme with aim to improve performance. We achieve a 48-stage pipeline depth by implementing a TDES key buffer and right rotations in the DES decryption key scheduler. Using the Altera Cyclone II FPGA as our platform, we design and verify the implementation with the EDA tools provided by Altera. We gather cost and throughput information from the synthesis and timing results and compare the performance of our design to common implementations presented in other literatures. Our design achieves a throughput of 3.2 Gbps with a 50 MHz clock;a performance increase of up to 16 times.
文摘With increasing complexity of today’s electromagnetic problems, the need and opportunity to reduce domain sizes, memory requirement, computational time and possibility of errors abound for symmetric domains. With several competing computational methods in recent times, methods with little or no iterations are generally preferred as they tend to consume less computer memory resources and time. This paper presents the application of simple and efficient Markov Chain Monte Carlo (MCMC) method to the Laplace’s equation in axisymmetric homogeneous domains. Two cases of axisymmetric homogeneous problems are considered. Simulation results for analytical, finite difference and MCMC solutions are reported. The results obtained from the MCMC method agree with analytical and finite difference solutions. However, the MCMC method has the advantage that its implementation is simple and fast.
文摘Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the US and South Korean governments’ websites is indicative of the fact that the security systems may not have been adequately deployed to counteract such attacks. IPS is a vital security device which is commonly used as a front line defense mechanism to defend against such DoS attacks. Before deploying a firewall or an IPS device for network protection, in many deployments, the performance of firewalls is seldom evaluated for their effectiveness. Many times, these IPS’s can become bottleneck to the network performance and they may not be effective in stopping DoS attacks. In this paper, we intend to drive the point that deploying IPS may not always be effective in stopping harmful effects of DoS attacks. It is important to evaluate the capability of IPS before they are deployed to protect a network or a server against DoS attacks. In this paper, we evaluate performance of a commercial grade IPS Cisco ASA-5510 IPS to measure its effectiveness in stopping a DoS attacks namely TCP-SYN, UDP Flood, Ping Flood and ICMP Land Attacks. This IPS comes with features to counteract and provide security against these attacks. Performance of the IPS is measured under these attacks protection and compared with its performance when these protection features were not available (i.e. disabled). It was found that the IPS was unable to provide satisfactory protection despite the availability of the protection features against these flooding attacks. It is important for the network managers to measure the actual capabilities of an IPS system before its deployment to protect critical information infrastructure.
文摘Nowadays many devices that make up a computer network are being equipped with security hardware and software features to prevent cyber security attacks. The idea is to distribute security features to intermediate systems in the network to mitigate the overall adverse effect of cyber attacks. In this paper, we will be focusing on the Juniper J4350 router with the Junos Software Enhanced, and it has security-attack protections in the router. We are going to evaluate how the Juniper router with built-in security protections affected the overall server performance under a cyber security attack.
文摘In recent years,the study of body movement performance in disease assessment has attracted significant attention.Duchenne Muscular Dystrophy(DMD)is a disease that significantly affects mobility.It is crucial to assess the movement of both the upper and lower limbs to diagnose this condition effectively.This research categorizes DMD assessment methods into two types:human-based assessments(based on questionnaires)and Machine-based assessments(using motion tracking and computer algorithms).The validity of human-based assessments,which often focus on daily activities and muscle strength,may be called into question.This issue underscores the necessity of utilizing qualitative and observational methods to achieve more accurate assessments.In contrast,Machine-based assessment have benefited from recent technological advancements that enable innovative techniques for disease evaluation,thereby improving the accuracy and validity of DMD diagnosis.The integration of motion tracking systems with artificial intelligence algorithms mitigates the limitations of visual and subjective assessments,providing more precise and objective results.These advancements aim to enhance the accuracy,reliability,and validity of DMD diagnosis while offering a more comprehensive approach to assessing individuals with the condition.In this study,the existing assessment methods in both categories are introduced and compared,analyzing their advantages and limitations to provide an accurate evaluation of their performance in diagnosing DMD.The aim of this review is to identify the best methods for diagnosing and monitoring DMD based on accuracy,reliability,and efficiency.
基金supported by National Natural Science Foundation of China(No.51537005)State Grid Corporation of China ‘‘Research on the model and application of power supply and demand technology under the market trading environment’’
文摘With the deregulation of the electric power industry, electricity price forecasting plays an increasingly important role in electricity markets, especially for retailors and investment decision making. Month ahead average daily electricity price profile forecasting is proposed for the first time in this paper. A hybrid nonlinear regression and support vector machine(SVM) model is proposed. Offpeak hours, peak hours in peak months and peak hours in off-peak months are distinguished and different methods are designed to improve the forecast accuracy. A nonlinear regression model with deviation compensation is proposed to forecast the prices of off-peak hours and peak hours in off-peak months. SVM is adopted to forecast the prices of peak hours in peak months. Case studies based on data from ERCOT validate the effectiveness of the proposed hybrid method.