New Multilevel Architecture of Secured Supercomputers
نویسندگان
چکیده
منابع مشابه
New Hybrid Cascaded Multilevel Inverter
This paper proposes a single-phase five-level inverter with a modified pulse width-modulated (PWM)control scheme. The modified pulse width-modulation technique is developed to reduce switching loss.Also, the proposed multilevel inverter can reduce the requirement of power switches compared to aconventional cascaded multilevel inverter. The modes of operation, control signals, and operatingprinc...
متن کاملSecured services in a multi-tier architecture
This paper presents an innovative approach which provides, independently of the business application, a set of high-level security features. This approach is based both on existing standards at the specification level and on a new technology named VSS (Virtual Security Server) at the implementation level. This technology has been prototyped through a set of Java APIs providing independence from...
متن کاملSecured communications within a multi-processors architecture
The development of secured embedded systems is in full expansion. The more we need complex treatments, the more we need to think about the security inside a system and its several elements. We participate in an ANR project aiming to develop a USB token able to cipher or decipher ”on-the-fly” files stored on a computer. The USB token is based on a MPSoC and our work focus on the security of comm...
متن کاملComputer Architecture Development: From the BESM-6 Computer to Supercomputers
This work outlines the architecture and main features of the BESM-6 computer and data processing system AS-6. It also discusses the development of the “Electronika SS BIS-1” supercomputer system as well as the principle results of the research on multi-architecture (heterogeneous) supercomputer systems.
متن کاملNew Scheme for Secured Routing in MANET
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Current Trends in Computer Sciences & Applications
سال: 2019
ISSN: 2643-6744
DOI: 10.32474/ctcsa.2019.01.000112