slugReliability Prediction of FaultTolerant Multicomputer Interconnection Networks
Journal Title: International Journal of Management, IT and Engineering - Year 2011, Vol 1, Issue 4
Abstract
This paper proposes a new method to identify all the maximal incomplete sub cubes present in a faulty cube taking maximum fault tolerance level i.e. number of faulty nodes is equal to the system dimension. The procedure is a distributed one, as every healthy node next to a failed one performs the same procedure independently and concurrently. Then the reliability expression for the maximal incomplete sub cube is derived. This method is well supported by an efficient algorithm which runs polynomially. The proposed method is found to be simple, general and efficient and thus is applicable to all the cube based topologies. The reliability of some important cube based topologies are evaluated and compared under the same condition.
Authors and Affiliations
N. K. Barpanda, R. K. Dash and C. R. Tripathy
Encryption and Decryption
The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel....
A CONCEPTUAL FRAMEWORK FOR MULTIPURPOSE BILL PAYMENT SYSTEMAPPRAISING MEMBER CUSTOMERS’ NEED
Paying bill is no more a nightmare for the people in recent days with the advent of technology. Epayment system has introduced multiple facilities of paying bills to the members. Now the members can pay their bills onli...
DESIGN AND SIMULATION OF A SOFT SWITCHED INTERLEAVED FLYBACK CONVERTER FOR FUEL CELLS
This paper presents a soft switched interleaved fly back converter for fuel cell systems. The proposed topology consists of a three stage fly back converter with three transformers. Because of interleaved operation of...
slugHIGHER ORDER MUTATION TESTING (RESULT- EQUIVALENT MUTANTS)
Whenever we make a single change to the original program we get First Order Mutant (FOM). When we apply another single change to FOM we get Second Order Mutant (SOM).On applying another single change to SOM we get Thir...
slugThe design of a Trusted Authentication scheme for Wimax Network
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into...