An analysis of cross avoidance techniques in optical multistage interconnection networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
It is expected that users of telecommunication services such as Internet, Web browsing, and tele-education will increase dramatically. This has greatly increased the demand for high bandwidth and high capacity communication systems. Advances in electro-optic technologies have made optical communication a good networking choice for the increasing demands of high channel bandwidth and low communication latency of high-performance computing and communication applications. Optical Multistage Interconnection Networks (OMINs) are very popular in switching and communication applications and have been used in telecommunications and parallel computing systems. But there are some problems in optical multistage interconnection Networks such as the optical-loss during switching and the crosstalk problem in the optical switches. The major problem called crosstalk is caused by coupling of two signals within a switching element. A lot of work has already been done in designing various algorithms and methods so that good quality solution can be obtained. In this paper, some methods to avoid crosstalk are compared and checked.
Authors and Affiliations
Sandeep kaur , Naveen Garg , Anantdeep
Structured System Test Suite Generation Process for Multi-Agent System
In recent years, Agent-Oriented Software Engineering (AOSE) methodologies are proposed to develop complex distributed systems based upon the agent paradigm. The implementation for such systems has usually the form of Mul...
ENGLISH TO SANSKRIT MACHINE TRANSLATOR LEXICAL PARSER
Here we propose to develop a converter which converts English Sentence to Sanskrit sentence. The Proposed modules are as follows: MODULE 1: LEXICAL PARSER MODULE 2: SEMANTIC MAPPER MODULE 3: ITRANSLATOR MODULE 4: COM...
A Mid – Point based k-mean Clustering Algorithm for Data mining
In k-means clustering algorithm, the number of centroids is equal to the number of the clusters in which data has to be partitioned which in turn is taken as an input parameter. The initial centroids in original k-means...
E-Commerce Security using PKI approach
As a most popular business model, ECommerce provides a more convenient business mode and lower transaction cost. Currently Ecommerce security is still an obstacle in evelopment of e-commerce. It is the need of the hour...
A Study on Similarity Computations in Template Matching Technique for Identity Verification
This paper describes a study on the development of a human face verification system by merely using template matching (TM) as the main verification engine. In contrast to common face recognition techniques, our approach...