A Novel Implementation of Chiral Structure in Computer Honeycomb Diamond Networks Topology
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: This project deals with the efficiency of the Chiral structure in Honeycomb Diamond network. Honeycomb and diamond networks have been proposed as alternatives to mesh and torus architectures for parallel processing. When wraparound links are included in honeycomb and diamond networks, the resultingstructures can be viewed as having been derived via a systematic pruning scheme. Honeycomb networks are more efficient than mesh connected systems in terms of degree, diameter, and cost and bisection bandwidth. By embedding Chiral structure in Honeycomb Diamond network we are enhancing the efficiency of Network andcompare this efficiency with other networks. Comparing the resultant structure’s efficiency in high traffic situations and to find best suitable area where this can be useful.
Authors and Affiliations
Mr. Susheel George Joseph M. C. A, M. Tech, M. Phil (Cs)
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures
Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but s...
A framework for an Operating System-based Mobile Agent Interoperability
Mobile agent technology has grown in acceptance over the years for distributed applications, but it is yet to be adopted as ubiquitous solution technique. This is due to its complexity and lack of interoperabilit...
Matching Facial Composite Sketches to Police Mug-Shot Images Based on Geometric Features.
Abstract: Composite sketches are frequently used to help track down suspects in a crime in which there is no photographic evidence. Automatic retrieval of photos of suspects from police mug-shot databases can help...
Propose Data Mining AR-GA Model to Advance Crime analysis
Historically solving crimes has been the privilege of the criminal justice and law enforcement specialists. With the increasing use of the computerized systems to track crimes, computer data analysts have sta...
Privacy Security of Multiuser on Multilevel System using XOR
Abstract: Privacy security of multiuser on multilevel system is considered in this work. On communication there is a chance for the eavesdropper’s to secretly listen to the conversation. In order to confuse the eavesdrop...