Volume 5, Issue 4, April 2014

Dependence of Memory Hierarchy Footprint of Intel’s Multicore Processors on Applications by Regression Analysis
Pages: 1-6 (6) | [Full Text] PDF (517K)
Mahmoud ASKARI
Belarusian State University of Information and Radioelectronics, Minsk, Belarus
Department of Computer, Damavand Branch, Islamic Azad University, Damavand, Iran

Abstract -
The gap between speed of processor and main memory is reduced using parallel systems and multi–core processors are becoming more popular in this direction. Analyzing system performance and the factors affecting on it helps to improve hardware base and operating system managing the calculating processes. The idea of this paper is to investigate the dependence of the miss rate at each level of the memory hierarchy on the type of application. Research has been done on three different models of the Intel architecture including: Core i5–460M Nehalem, Intel Core i5–3317U Ivy–Bridge and Intel Core 2 T5800. Method is based on Stepwise regression analysis on counted events of SPEC CINT2000 benchmarks. The results show that the miss rate in each component of the memory hierarchy is dependent on the type of application and its importance is not dependent on the local of member of memory hierarchy. In this paper, after an introduction, the related works and background of problem are discussed. The experimental methodology and statistical analysis are discussed in chapters 4 and 5. Finally, conclusions and future work are described.
 Index Terms - Memory Hierarchy, Intel Processor, SPEC CPU2000 and Regression Analysis
Data Security of Heterogeneous Devices in Ubiquitous Environment
Pages: 7-11 (5) | [Full Text] PDF (337K)
Binish Raza, Muhammad Fuzail and Muhammad Omer Mushtaq
Department of Computer Science and Engineering, UET Lahore, Pakistan

Abstract -
Today, the growing interest for mobile devices is a call for advanced researches in the emergence of ‘Ubiquitous Computing'. A Ubiquitous Computing is “a paradigm shift where a technology becomes apparently invisible in our life”. Intuitively it can be defined as making computer systems persistent in enhancing user interaction with the environment, as impeccably as possible. Its main objective is to provide computing to a user from anywhere and anytime. For this, computing systems are developed that provide services at any time and anywhere throughout the physical world. The words anywhere and anytime are attractive but more appealing for the security of this computation that can be of a precious data. So the need of security on such protocols cannot be overlooked. This paper discusses the security issues and various existing technologies on security of heterogeneous devices.
 Index Terms - Ubiquitous Environment, Security Issues, Ubiquitous Environment and Techniques
Modified Gabor Filter with Control Chart and Image Plots for Identifying Architectural Distortion of Mammogram Images
Pages: 12-19 (8) | [Full Text] PDF (824K)
Abhijith Bailur, Amit Kumar Pandey, Amit Kumar Sharma, Shona Saseendran and Abhinav
Cardea Biomedical Technologies Pvt Ltd, New Delhi, India
Indian Institute of Technology-BHU, Varanasi, India

Abstract -
Breast cancer is one of the fastest growing cancer and Architectural distortion is one of the important finding in the detection of cancer. The objective of this work is to develop a method for detecting architectural distorted area. In order to identify Architectural Distorted area this paper presents a novel method to distinguish Architectural Distortion (AD) and Non Architectural Distortion (Non AD) of Mammogram images, for the development of an efficient system. Among various breast abnormalities, architectural distortion is the most difficult type of tumour to detect. The proposed method could be applied as a solution to reduce the chances of human errors. The algorithm begins with a modified Gabor filters and orientation filter for identifying tissue patterns. Each detected tissue pattern is characterized into AD and NON AD based on mesh plot and contour plot which clearly states the variation in texture .Further the obtained result of modified gabor filter is tested with control chart to examine the effect of the algorithm. Statistical Parameter result obtained from control chart, for pre and post application of algorithm have showed a significance demarcation between AD and NON AD and also has proven the efficiency of the algorithim .28 images from MIAS database were tested, with an efficiency of 89.4 percent to distinguish between the AD and Non AD And thus results obtained are promising in comparison with the previously published work.
 Index Terms - Architectural Distortion (AD), Non Architectural Distortion (Non AD), Mammogram, Orientation, Andrew plot, Mesh Plot, Contour Plot and Control Chart
Software-Defined Radio Architecture for Broadband OFDM Transceivers
Pages: 20-24 (5) | [Full Text] PDF (481K)
Hafiz Muhammad Fahad Noman, Muhammad Fuzail and Junaid Arshad
Department of Computer Science & Engineering, University of Engineering & Technology, Lahore, Pakistan

Abstract -
This paper presents a software-defined radio (SDR) system with reconfigurable architecture for OFDM transceivers. DSP-based architecture provides interoperability and adaptability among operational modes of the OFDM system. But limitations due to memory, bus speed and data type compatibility in DSP motivates SDR architecture over USRP boards. This model is initial evaluation of the suitability of OFDM transmission over USRP for an upcoming large scale CR testbed. SDR Architecture supporting 3GPP-LTE microcomputer object (MCO) system is designed for both flexibility and extensibility. It explains new simulation models in Matlab that lead toward the concept of the virtual system sample. In this framework, we completely merge hardware, software, algorithms, into one radio link system level objected oriented model. Extensibility concepts, virtual abstraction, and acceleration hardware are important architectural features. On the other hand, OFDM is a promising technique for high-speed data transmission over multipath fading channels and has been considered to be the best candidate for 4G mobile networks.
 Index Terms - SDR, OFDM, FFT, USRP, FPGA, LTE and CR
A High-Performance Router: Using Fair-Dropping Policy
Pages: 25-31 (7) | [Full Text] PDF (725K)
Seyyed Nasser Seyyed Hashemi, Shahram Jamali and Hadi Motarez
Young Researchers Club, Ardabil branch, Islamic Azad University, Ardabil, Iran
Department of Computer Engineering, Mohaghegh Ardabili University, Ardabil, Iran
Department of Computer Engineering, Tabriz branch, Islamic Azad University, Tabriz, Iran

Abstract -
Active Queue Management (AQM) employs some types of feedbacks to disseminate congestion information to the sources. Packet dropping is the most used feedback on the Internet. This paper discusses that an unfair dropping discipline leads to performance reduction, the unfair bandwidth sharing and the instability on the Internet. Then it proposes a fair dropping AQM algorithm and shows how this fairness improves the network performance, fairness and stability. Extensive packet-level simulations done in ns-2 environment, show that the proposed algorithm, on one hand, presents a fair bandwidth allocation among competitor flows and on the other hand, this fairness is a launcher for improved performance in terms of link utilization, queue size and packet drop rate.
 Index Terms - Web Acceleration, HTTP Optimization and Wireless Network Optimization