Data Security Enhancement Through Number System: A Turing-Machine Approach

Author(s):  
Himanshu Tripathi ◽  
Bramah Hazela
Author(s):  
Patrick McMakin ◽  
Jennifer Snodgrass

This chapter discusses the music theory and aural skills practiced daily by an important and influential segment of the public: the session musicians, engineers, songwriters, and producers in the recording studios and publishing houses of Nashville’s Music Row. Through interviews with leading engineers and studio musicians, the chapter reveals that particular kinds of music theoretical knowledge and aural skills are valued in these contexts. Efficiency and accuracy are prized during recording sessions, and there are high expectations for the fluid and immediate application of practical knowledge and skills to writing, recording, producing, and performing music. While some in these situations have had formal, academic training in music theory, that is not true of everyone. Some terminology from academic music theory is valuable, but there is also the need for additional terminology and systems in order to develop a common language for all participants. This chapter provides detailed information about an important aspect of this common language, the Nashville Number System, a musical shorthand developed within the studios of Music Row that now has currency among musicians around the world, bringing music theory to an ever-expanding public.


2013 ◽  
Vol 9 (2) ◽  
pp. 36-48
Author(s):  
Qutaiba Ali ◽  
Sahar Lazim

The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.


2020 ◽  
Vol 35 (4) ◽  
pp. 843-862
Author(s):  
Lie-Huang Zhu ◽  
Bao-Kun Zheng ◽  
Meng Shen ◽  
Feng Gao ◽  
Hong-Yu Li ◽  
...  

2020 ◽  
Vol 29 (11) ◽  
pp. 2030008
Author(s):  
Raj Kumar ◽  
Ritesh Kumar Jaiswal ◽  
Ram Awadh Mishra

Modulo multiplier has been attracting considerable attention as one of the essential components of residue number system (RNS)-based computational circuits. This paper contributes a comprehensive review in the design of modulo [Formula: see text] multipliers for the first time. The modulo multipliers can be implemented using ROM (look-up-table) as well as VLSI components (memoryless); however, the former is preferable for lower word-length and later for larger word-length. The modular and parallelism properties of RNS are used to improve the performance of memoryless multipliers. Moreover, a Booth-encoding algorithm is used to speed-up the multipliers. Also, an advanced modulo [Formula: see text] multiplier based on redundant RNS (RRNS) could be further chosen for very high dynamic range. These perspectives of modulo [Formula: see text] multipliers have been extensively studied for recent state-of-the-art and analyzed using Synopsis design compiler tool.


2017 ◽  
Vol 10 (9) ◽  
pp. 2895
Author(s):  
G. Manikandan ◽  
P. Rajendiran ◽  
V. Harish ◽  
Nooka Sai Kumar

Data security is a progressing provocation for designers and Hackers. To battle different attacks by hackers, there is a need for increasingly solid security advancements. In this proposed system, a low complexity circular queue data structure security algorithm can be created. Numerous complicating variable components are used to enhance the quality of this algorithm and make recuperation of original message for hackers, becomes progressively troublesome. These tunable components are the size of the circular queue, the start of the picked keyword letter and the various portrayals of a number are in the Fibonacci manner. All letters ought to be changed over into ASCII binary configuration so as to be utilized by security algorithm in the sensible and shift operations. The outcomes demonstrate that our proposed security algorithm has half low complexity than analyzed multiple circular queues algorithm (MCQA). Fibonacci manner and variable number of difficult factors in this algorithm give adaptability in changing the security of the algorithm as per the conditions. Circular queue is an data structure can be utilized in the data security to make figured message progressively hard to disentangle. For example, a calculation that utilizes the moving and supplanting tasks of bi-section bi-push for round line to expand security. An irregular number was utilized in this algorithm to control the moving between the line and section, in the end this lead to expand the unpredictability of plaintext decrypting


2017 ◽  
Vol 161 (2) ◽  
pp. 27-31 ◽  
Author(s):  
Subasish Mohapatra ◽  
Subhadarshini Mohanty ◽  
Arunima Hota ◽  
Shradha Pattanayak

Sign in / Sign up

Export Citation Format

Share Document