840 resultados para McKinnon Dash and Hardware Company
Resumo:
This paper focuses on an efficient user-level method for the deployment of application-specific extensions, using commodity operating systems and hardware. A sandboxing technique is described that supports multiple extensions within a shared virtual address space. Applications can register sandboxed code with the system, so that it may be executed in the context of any process. Such code may be used to implement generic routines and handlers for a class of applications, or system service extensions that complement the functionality of the core kernel. Using our approach, application-specific extensions can be written like conventional user-level code, utilizing libraries and system calls, with the advantage that they may be executed without the traditional costs of scheduling and context-switching between process-level protection domains. No special hardware support such as segmentation or tagged translation look-aside buffers (TLBs) is required. Instead, our ``user-level sandboxing'' mechanism requires only paged-based virtual memory support, given that sandboxed extensions are either written by a trusted source or are guaranteed to be memory-safe (e.g., using type-safe languages). Using a fast method of upcalls, we show how our mechanism provides significant performance improvements over traditional methods of invoking user-level services. As an application of our approach, we have implemented a user-level network subsystem that avoids data copying via the kernel and, in many cases, yields far greater network throughput than kernel-level approaches.
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.
Resumo:
This paper is part of a major project about the Northern Cape Land Reform and Advocacy (NCLRA) programme being implemented by FARM-Africa* in South Africa. The NCLRA programme had initiated a financial mechanism to help poor communities to get access to finance and training in order to enable them to make better use of their newly-acquired land. One prominent aspect of the programme is the implementation of Livestock Banks, or the use of animals as financial products. The paper provides an analytical framework with which to evaluate the effectiveness of Livestock Banks in the poor communities of the Northern Cape in South Africa. It focuses on the design, implementation and future of Livestock Banks. The paper argues that Livestock Banks need to be reformed and enhanced if they are to continue to play a key role in the goal of creating financial and economic value in Africa, particularly when the primary objective is simultaneously to help reduce poverty. [Note]*FARM-Africa (Food & Agricultural Research Management) is a registered UK charity organisation and a company limited by guarantee in England and Wales no. 01926828.
Resumo:
As the UK's national marine data centre, a key responsibility of the British Oceanographic Data Centre (BODC) is to provide data management support for the scientific activities of complex multi-disciplinary long-term research programmes. Since the initial cruise in 1995, the NERC funded Atlantic Meridional Transect (AMT) project has undertaken 18 north–south transects of the Atlantic Ocean. As the project has evolved there has been a steady growth in the number of participants, the volume of data, its complexity and the demand for data. BODC became involved in AMT in 2002 at the beginning of phase II of this programme and since then has provided continuous support to the AMT and the wider scientific community through the rescue, quality control, processing and access to the data. The data management is carried out by a team of specialists using a sophisticated infrastructure and hardware to manage, integrate and serve physical, biological and chemical data. Here, we discuss the approach adopted, techniques applied and some guiding principles for management of large multi-disciplinary programmes.
Resumo:
A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.
Resumo:
This paper investigates if benchmark African equity indices exhibit the stylized facts reported for financial time-series returns. The returns distributions of the Africa All-Share, Large, Medium and Small Company Indices were found to be leptokurtotic, had fat-tails, over time experienced volatility clustering and exhibited long memory in volatility. Both the All-Share and Large Company Indices were found to exhibit leverage effects. In contrast, positive shocks had a greater impact on future volatility for the Small Company Index which implies a reverse leverage effect. This finding could reflect a bull/bubble market for small capitalisation stocks in Africa.
Resumo:
In this paper, we present a methodology for implementing a complete Digital Signal Processing (DSP) system onto a heterogeneous network including Field Programmable Gate Arrays (FPGAs) automatically. The methodology aims to allow design refinement and real time verification at the system level. The DSP application is constructed in the form of a Data Flow Graph (DFG) which provides an entry point to the methodology. The netlist for parts that are mapped onto the FPGA(s) together with the corresponding software and hardware Application Protocol Interface (API) are also generated. Using a set of case studies, we demonstrate that the design and development time can be significantly reduced using the methodology developed.
Resumo:
A novel cost-effective and low-latency wormhole router for packet-switched NoC designs, tailored for FPGA, is presented. This has been designed to be scalable at system level to fully exploit the characteristics and constraints of FPGA based systems, rather than custom ASIC technology. A key feature is that it achieves a low packet propagation latency of only two cycles per hop including both router pipeline delay and link traversal delay - a significant enhancement over existing FPGA designs - whilst being very competitive in terms of performance and hardware complexity. It can also be configured in various network topologies including 1-D, 2-D, and 3-D. Detailed design-space exploration has been carried for a range of scaling parameters, with the results of various design trade-offs being presented and discussed. By taking advantage of abundant buildin reconfigurable logic and routing resources, we have been able to create a new scalable on-chip FPGA based router that exhibits high dimensionality and connectivity. The architecture proposed can be easily migrated across many FPGA families to provide flexible, robust and cost-effective NoC solutions suitable for the implementation of high-performance FPGA computing systems. © 2011 IEEE.
Resumo:
This paper examines the efficiency of the 1998 irrigation management reform in the Guanzhong Plain, Shaanxi, China, at farm and canal level. Stochastic frontier analysis is applied to estimate irrigation water use efficiency, based on panel data for 800 farmers, spread over 80 irrigation canals, for the period 1999–2005. Analysis of determinants of water use efficiency shows that at farm level, water price and disclosure are important factors. Compared to the base case of unreformed, management reform has a positive impact with water user association having the largest effect, followed by joint-stock co-operative and private company. The canal model is in line with the farm level model, although estimates are less significant.
Resumo:
A system of software and hardware that combines signal processing and contact microphones using normally inaudible body sounds, including heartbeat/pulse, respiration and internal sounds from the vocal tract that can be heard internally by the performer but not externally by others, to drive resonant filters. Performance at SARC Sonic Lab, Belfast, 19 Feb 2015 in collaboration with Birgit Ulher.
Resumo:
Homomorphic encryption offers potential for secure cloud computing. However due to the complexity of homomorphic encryption schemes, performance of implemented schemes to date have been unpractical. This work investigates the use of hardware, specifically Field Programmable Gate Array (FPGA) technology, for implementing the building blocks involved in somewhat and fully homomorphic encryption schemes in order to assess the practicality of such schemes. We concentrate on the selection of a suitable multiplication algorithm and hardware architecture for large integer multiplication, one of the main bottlenecks in many homomorphic encryption schemes. We focus on the encryption step of an integer-based fully homomorphic encryption (FHE) scheme. We target the DSP48E1 slices available on Xilinx Virtex 7 FPGAs to ascertain whether the large integer multiplier within the encryption step of a FHE scheme could fit on a single FPGA device. We find that, for toy size parameters for the FHE encryption step, the large integer multiplier fits comfortably within the DSP48E1 slices, greatly improving the practicality of the encryption step compared to a software implementation. As multiplication is an important operation in other FHE schemes, a hardware implementation using this multiplier could also be used to improve performance of these schemes.
Resumo:
Virtual Reality techniques are relatively new, having experienced significant development only during the last few years, in accordance with the progress achieved by computer science and hardware and software technologies. The study of such advanced design systems has led to the realization of an immersive environment in which new procedures for the evaluation of product prototypes, ergonomics and manufacturing operations have been simulated. The application of the environment realized to robotics, ergonomics, plant simulations and maintainability verifications has allowed us to highlight the advantages offered by a design methodology: the possibility of working on the industrial product in the first phase of conception; of placing the designer in front of the virtual reproduction of the product in a realistic way; and of interacting with the same concept. The aim of this book is to present an updated vision of VM through different aspects. We will describe the trends and results achieved in the automotive, aerospace and railway fields, in terms of the Digital Product Creation Process to design the product and the manufacturing process.
Resumo:
A presente investigação pretende examinar se existe uma convergência entre as diferentes percepções dos actores organizacionais, no que respeita à criação e uso/partilha de conhecimento durante o processo de inovação e mudança organizacional. Iremos igualmente tentar compreender se o conhecimento individual – técnico e organizacional – tem impacto na inovação organizacional e no processo de mudança e, consequentemente, no rumo da organização. Iremos conceptualizar o conhecimento individual como conhecimento tácito e assumir que poderá impulsionar a inovação organizacional e, consequentemente, o desenvolvimento da organização. Contudo, iremos assumir que a partilha do conhecimento explícito não poderá ser separada do processo de compreensão, sendo necessário o conhecimento tácito individual para completar a partilha. O conhecimento explícito e o conhecimento tácito serão ambos estudados como dois elementos inseparáveis porque consideramos que o conhecimento explícito necessita de uma compreensão tácita da linguagem que estrutura o conhecimento explícito. Neste contexto, este estudo apresenta as conclusões acerca dos métodos e formas de interacção e partilha de conhecimento entre os actores organizacionais no que toca à inovação organizacional e aos processos de mudança. A informação será recolhida por via de entrevistas e a técnica Group Recall usando a metodologia de investigação-acção. Este estudo contribui, de várias formas, para o desenvolvimento de um quadro teórico e empírico sobre o conhecimento e a partilha de conhecimento tácito em contextos de inovação organizacional e de processos de mudança. Em primeiro lugar, identifica e analisa as diferentes percepções dos actores organizacionais sobre a partilha e o uso do conhecimento individual durante os processos de inovação organizacional. Em segundo lugar, apresenta o impacto do uso do conhecimento individual partilhado e/ou criado durante os projectos de inovação organizacional nos processoe e práticas da organização. Em terceiro lugar, propõe um conjunto de perfis de conhecimento que podem potenciar a criação e partilha de conhecimento entre os actores organizacionais. Em quarto lugar, sugere um modelo facilitador da partilha de conhecimento que pode servir de referência para investigadores e para profissionais das organizações em processos de inovação organizacional e de mudança. Finalmente, este estudo propõe algumas direcções para futuras investigações e sugere algumas questões de estudo que emergiram desta investigação e que poderão ser exploradas.
Resumo:
Relatório de estágio de mestrado, Ciências da Educação (Formação de Adultos), Universidade de Lisboa, Instituto de Educação, 2013
Resumo:
Dissertação apresentada à Escola Superior de Comunicação Social como parte dos requisitos para obtenção de grau de mestre em Audiovisual e Multimédia.