On Design and Implementation of Parallel Algorithms for Solving Inverse Problems

Author(s):  
Wolf Zimmermann ◽  
Welf Löwe ◽  
Johannes Gottlieb
Author(s):  
Mohamed Nabil ◽  
Ashraf A. M. Khalaf ◽  
Sara M. Hassan

<p><span>The information security is one of the most important issues in the design of any communication network.One of the most common encryption algorithms is the Advanced Encryption Standard (AES).The main problem facing the AES algorithm is the high time consumption due to the large number of rounds used for performing the encryption operation. The more time the encryption system consumes to encrypt the data, the more chances the hackers have to break the system.This paper presents two effective algorithms that can be used to solve the mentioned problem and to achieve an effective processing time reduction using pipelined and parallel techniques to perform the encryption steps. These algorithms are based on using certain techniques to make the system able to encrypt many different states (the data will be encrypted) in the same time with no necessity to wait for the previous encryption operation to be completed. These two algorithms are very effective especially for big data size. This paper describes in detail the AES encryption system algorithm and a detailed explanation for the proposed algorithms. Moreover, the research shows the implementation of the three algorithms: the traditional, the pipelined, and the parallel algorithms, and finally a comparison between them.</span></p>


Author(s):  
Sabrina B. M. Sambatti ◽  
Haroldo F. de Campos Velho ◽  
Leonardo D. Chiwiacowsky

2015 ◽  
Vol 24 (3) ◽  
pp. 106-113 ◽  
Author(s):  
Stephen N. Calculator

Purpose To provide an overview of communication characteristics exhibited by individuals with Angelman Syndrome (AS) and special considerations associated with the design and implementation of augmentative and alternative communication (AAC) programs. Method Results of recent studies exploring individuals' uses of AAC are reviewed, with particular emphasis on factors related to individuals' acceptance and successful uses of AAC systems. Results Not applicable Conclusion Despite their inconsistent access to practices previously found to foster individuals' acceptance of AAC systems, individuals with AS demonstrate the ability to use AAC systems, including high-tech AAC devices, successfully.


Sign in / Sign up

Export Citation Format

Share Document