computer resource
Recently Published Documents


TOTAL DOCUMENTS

67
(FIVE YEARS 4)

H-INDEX

7
(FIVE YEARS 0)

2020 ◽  
Vol 2020 (2) ◽  
pp. 22-25
Author(s):  
M.O. Redka ◽  
◽  
Yu.V. Kuts ◽  
O.E. Levchenko ◽  
O.D. Bliznyuk ◽  
...  

Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. DiffieHellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value>1), the community's public key is changed to avoid abuse.


2020 ◽  
Vol 8 (2) ◽  
pp. 113-120
Author(s):  
Aminudin Aminudin ◽  
Gadhing Putra Aditya ◽  
Sofyan Arifianto

This study aims to analyze the performance and security of the RSA algorithm in combination with the key generation method of enhanced and secured RSA key generation scheme (ESRKGS). ESRKGS is an improvement of the RSA improvisation by adding four prime numbers in the property embedded in key generation. This method was applied to instant messaging using TCP sockets. The ESRKGS+RSA algorithm was designed using standard RSA development by modified the private and public key pairs. Thus, the modification was expected to make it more challenging to factorize a large number n into prime numbers. The ESRKGS+RSA method required 10.437 ms faster than the improvised RSA that uses the same four prime numbers in conducting key generation processes at 1024-bit prime number. It also applies to the encryption and decryption process. In the security testing using Fermat Factorization on a 32-bit key, no prime number factor was found. The test was processed for 15 hours until the test computer resource runs out.


Author(s):  
I. I. Levin ◽  
V. A. Gudkov ◽  
G. A. Еvstafiev ◽  
A. I. Dordopulo ◽  
A. A. Gulenok ◽  
...  

In this paper, we thoroughly consider the technique of conversion of procedural programs in C to configuration files for field-programmable gate arrays used in the toolkit for programming of reconfigurable and hybrid computer systems. The creation of parallel program in the COLAMO (Common Oriented Language for Architecture of Multi Objects) language using the analysis results of information dependences in the initial procedural program and its further conversion to a parallel and pipeline form are the distinctive characteristics of the technique. We addressed the methods of scalar splitting and array extension by iterations, which are applied for the fulfillment of the single assignment and unique substitution rules in parallel program and the saving of information communications of the initial procedural program. The technique of conversion of automatically created parallel program to the scalable parallel and pipeline form is presented. The “Procrustes” preprocessor adapts the form for different architectures and configurations of reconfigurable and hybrid computer systems. Owing to the described methodology, it is possible to synthesize a resource-independent scalable COLAMO-application, which can adapt to available computational resource by changing of several constants in automatic mode without any considerable modification of the program source code. Then, the scalable COLAMO-applicationis translated by the COLAMO-translator into field-programmable gate arrays configuration files for the specified reconfigurable computer resource.


Author(s):  
Ming Cai Xu ◽  
Zhao Jun Song

Nonlinear finite element analysis is usually used to assess the ultimate strength of hull girder, which includes implicit analysis and explicit dynamic analysis. So far, most of researchers use the implicit analysis to assess the ultimate strength of various vessels or stiffened plates. Comparing with the implicit analysis, the explicit dynamic analysis may be more stable since this method doesn’t need to consider the convergence of solution, and can consider the transient influence of time. However, the accuracy of solution results and time in the explicit dynamic method is very important. This depends on modelling configurations, such as the loading time, geometric ranges of finite element models, element types and applying methods of loading. The purpose of the present paper is to investigate the influences of these factors, and then to figure out a reliable numerical method which meets permitted accuracy and consumes acceptable computer resource in explicit dynamic analysis.


2016 ◽  
Vol 821 ◽  
pp. 412-419
Author(s):  
Josef Žák

In our work we tried to find a simple and reliable method to determine mechanical properties of a woven fabric with the main respect to the processing of these fabrics on a weaving machine. Some interesting results emerged by that way concerning for example the design of fabrics. We were using primarily the means of classical mechanics and we tried to avoid the use of computer resource demanding tools as much as possible. Also we were concerned by the applicability of results as large as possible since our weaving machines are processing a wide spectrum of fabrics.\parIn this paper, the principles of our approach are presented with some numerical examples. Few practical experiments were carried out at this moment, so only limited comparison with the reality could be done.


2011 ◽  
Vol 331 (7) ◽  
pp. 072051
Author(s):  
J Andreeva ◽  
S Belforte ◽  
S Blyweert ◽  
K Bloom ◽  
D Evans ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document