In this thesis, we propose a systematic code for correcting t = 1 insertion/deletion errors of the character ”0” that can occur between any two consecutive 1’s in a binary string. The code requires balanced input strings, where each word of length n contains ⌈n/2⌉ 0’s and ⌊n/2⌋ 1’s. This...
Traditional bus-based interconnects are simple and easy to implement, but the scalability is greatly limited. While router-based networks-on-chip (NoCs) offer superior scalability, they also incur significant power and area overhead due to complex router structures. In this thesis, a new class of on-chip networks, referred to as Routerless (RL) NoCs,...
Quotient rings of Gaussian and Eisenstein-Jacobi(EJ) integers can be deployed to construct interconnection networks with good topological properties. In this thesis, we propose deadlock-free deterministic and partially adaptive routing algorithms for hexagonal networks, one special class of EJ networks. Then we discuss higher dimensional Gaussian networks as an alternative to...
Many algorithms in parallel systems can be easily solved if we can generate a Hamiltonian cycle on the underly network. Finding Hamiltonian cycle is a well known NP-complete problem. For specific instances of regular graphs, such as Torus and Gaussian network, one can easily find Hamiltonian cycles. In this thesis,...
Routing from a single source node to multiple destination nodes using node disjoint paths (NDP) has many important applications in parallel systems. For example, if a source node wants to send distinct messages to distinct destination nodes, then the one-to-many NDP routing is useful.
Unlike parallel systems with shared-memory, each...
Parallel processors are classified into two classes: shared-memory multiprocessors and distributed- memory multiprocessors. In the shared-memory system, processors communicate through a common memory unit. However, in the distributed multiprocessor system, each processor has its own memory unit and the communications among the processors are performed through an interconnection network. Thus,...
A relatively new model of error control is the limited magnitude error over high radix channels. In this error model, the error magnitude does not exceed a certain limit known beforehand. In this dissertation, we study systematic error control codes for common channels under the assumption that the maximum error...
This project aims at implementing Indexing for Web 2.0 Applications. Ajax applications consist of a set of states which are generated by the user through actions such as click, focus, blur etc. events. By saving these DOM states we can index information obtained from dynamically generated web content. To prevent...
The purpose of this project is to load test, and fine tune the loan search functionality of the Broker Blueprint web application, an innovative Business-to-Business (B2B) online service aiding mortgage lenders and brokers in today's highly competitive mortgage market.
Broker Blueprint enables brokers to search for suitable mortgage loans across...
Interconnection networks play important roles in designing high performance computers. Recently two new classes of interconnection networks based on the concept of Gaussian and Eisenstein-Jacobi integers were introduced. In this research, efficient routing and broadcasting algorithms for these networks are developed. Furthermore, constructing edge disjoint Hamiltonian cycles in Gaussian networks...
Motivation for cloud computing applications are listed. A Cloud Computing framework – MapReduce – is implemented. A document indexing application is built as an example MapReduce application on this framework. Focus is given to ease of job submission and scalability of the underlying network.
In diversity combining automatic repeat request (ARQ), erroneous packets are combined together forming a single, more reliable, packet. In this thesis, we give a diversity combining scheme for the m-ary unidirectional channel. A system using the given scheme with a t-unidirectional error detecting code is able to correct up to...
An n-bit Gray code is an ordered set of all 2n binary strings of length n. The
special property of this listing is that Hamming distance between consecutive vectors
is exactly 1. If the last and first codeword also have a Hamming distance 1 then the
code is said to...
"The purpose of this project is to load test, and fine tune the loan search functionality of the Broker Blueprint web application, an innovative Business-to-Business (B2B) online service aiding mortgage lenders and brokers in today's highly competitive mortgage market.
Broker Blueprint enables brokers to search for suitable mortgage loans across...
Digital libraries are digitally accessible, organized collections of knowledge. Although under this broad definition any digitally accessible data set might be considered a digital library, the term is generally reserved for collections whose structures are carefully documented and made available in the form of so-called metadata. There is no specific...
In some practical systems, most of the errors are of 1 → 0 type and 0 → 1
errors occur very rarely. In this thesis, first, the capacity of the asymmetric
channel is derived. The capacity of the binary symmetric channel (BSC) and the
Z-channel can be derived from this...
"SAML Edit® is a PC-based tool for creation and manipulation of SAML Assertion text files (as defined by OASIS). The tool allows its user to modify the data/information contained in the underlying file. As security information between entities is exchanged using such SAML Assertion text files, the ability to manipulate...
"A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. Furthermore, the advantage of redundant number system lies in its application for...
Interconnection Networks have been used as a high performance communication fabric in parallel processor architectures. Parallel processors built using off-the-shelf components, called clusters, are becoming increasingly attractive because of their high performance to cost ratio over parallel computers.
Many web servers and database servers make efficient use of clustering from...
'Search engine for a book library section' was developed for the Philosophy department. This Search Engine is a user interface application used for the purpose of searching for words or phrases as the need may be from a directory of books in a section of the Philosophy department library. The...
Due to the rapid growth of wireless technology, there has been a growing interest in the capabilities of ad hoc networks connecting mobile phones, PDAs and laptop computers. The distributed and self-configurable capabilities of ad hoc networks make them very attractive for some applications such as tactical communication for military,...
In this project we implemented WebSiteGen2, which is a software tool that automatically generates HTML pages and server-side scripts for a Web-based database application. A user of WebSiteGen2 can select the tables and columns for which HTML pages and server-side scripts are generated. The menus for this selection process are...
An important objective of tactical ad hoc networks is to deliver threat information from sensors to shooters efficiently and quickly. The information sent to a particular shooter should contain warnings about threats that are within some distance and/or within some time of the shooter's current location. In this thesis we...
In a typical method of database design, ER diagrams are used to represent the conceptual schema of the database. Use-cases are now widely used to capture requirements in designing the basic architecture of an object-oriented system. Use-cases are highly effective in designing forms required for data insertion, retrieval, update, and...
Parallel computers are classified into: Multiprocessors, and multicomputers. A multiprocessor system usually has a shared memory through which its processors can communicate. On the other hand, the processors of a multicomputer system communicate by message passing through an interconnection network. A widely used class of interconnection networks is the toroidal...
In a constant weight code, each code word contains a constant number of 1's. If this number is equal to half the length of the code word then the code is called balanced. These codes find many applications in computer and communication systems noise reduction in VLSI systems, fault masking...
Many parallel machines, both commercial and experimental, have been/are being designed with toroidal interconnection networks. For a given number of nodes, the torus has a relatively larger diameter, but better cost/performance tradeoffs, such as higher channel bandwidth, and lower node degree, when compared to the hypercube. Thus, the torus is...
The k-ary n-cube structure is presented in this paper for interconnecting a network of microcomputers in parallel and distributed environments. Machines based on the k-ary n-cube topology have been advocated as ideal parallel architectures for their powerful interconnecting features.
In this paper, we examine the k-ary n-cube from the graph...
In this project we have designed a new construction method for t error correcting constant weight codes. This method is an improvement over the existing codes in terms of information rate. The construction method is recursive as it is based on the observation that 2t error correcting code can be...
In this project we have implemented an Object-Oriented simulation model of a Digital Switching System. We analyzed various software components of a Digital Switching System. The call processing module is the principal component and the most complex of all. The features of Object-Oriented principles were investigated and found to fit...
Balanced codes, in which each codeword contains equally many 1's and 0's, are useful in such applications as in optical transmission and optical recording. When balanced codes are used, the same number of 1's and 0's pass through the channel after the transmission of every word, so the channel is...
The purpose of this project is to study the benefit at large parking lots having shuttle busses by providing a system that dynamically routes a shuttle. The shuttle route will be set by the placement of the travelers returning from the terminal. A parking space is assigned to the incoming...
The bulk of the theory on error control codes has been developed under the
fault assumption of random (symmetric) errors, where 1 → 0 and 0 → 1 errors are
equally likely. In the past few years, several applications have emerged in which the
observed errors are highly asymmetric. This...
We will describe two known strategies for static processor
allocation in an n-cube multiprocessor, namely the buddy system
strategy and the gray code strategy, and then propose a new strategy
that outperforms the first by (n-k+1) and the second by (n-k+1)/2 in
cube recognition. Furthermore, our strategy is suitable for...
An extensive theory of symmetric error control coding has been developed in the last few decades. The recently developed VLSI circuits, ROM, and RAM memories have given an impetus to the extension of error control coding to include asymmetric and unidirectional types of error control. The maximal numbers of unidirectional...
Various problems related to systematic error-detecting
and error-correcting unidirectional codes are discussed.
Systematic codes with r check bits are the main topic of
the thesis. Classes of codes are presented which work for
specific numbers of information bits and then a class of
codes is given which detects the same...
Historically, coding theory has dealt with binary
codes correcting symmetric errors, in which errors are
made in both 0 and 1 bits with equal likelihood.
Within the past ten years, some study has been made of
asymmetric codes, under the assumption that the only
errors which occur are errors in...
In this report, we describe an implementation of a prototype information resources management system for the synthesis and integration project of the forest response program using a 4GL application development system ACCELL. Our system is called Prototype Virtual Data Management System (PVDMS). ACCELL is a software package that combines a...