EMPIRICAL COMPARISON & ANALYSIS OF SHUFFLE EXCHANGE NETWORK AND ITS VARIANTS
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 2
Abstract
Shuffle-exchange networks (SENs) have been widely considered as practical interconnection systems due to their size of its switching elements (SEs) and uncomplicated configuration. SEN is a network among a large class of topologically equivalent multistage interconnection networks (MINs) that includes omega, indirect binary n-cube, baseline, and generalized cube. In this paper, SEN with additional stages that provide more redundant paths are analyzed. A common network topology with a 2×2 basic building block in a SEN and its variants in terms of extra-stages is investigated. Finally terminal reliability of SEN, SEN+, SEN+2 are analyzed.
Authors and Affiliations
Sonia Chaudhary, Divya Madaan, Susheel Kumar
IMPACT OF SOFT-ERROR IN ROBUST CONFIGURABLE SYSTEM DESIGN USING REAL TIME OPERATING SYSTEM
This paper investigates the sensitivity of real-time systems running applications under operating systems that are subject to soft-errors. A procedure for characterizing the soft error susceptibility of nodes in a logic...
ANALYSIS OF EFFICIENCY OF BANKS IN A DEVELOPING ECONOMY: A CASE OF INDIA
The efficiency of banking system is very important for the growth of the overall economy of a country. This is because of the reason that sound banking system serves as an important medium for accomplishing economic grow...
Performance Evaluation of Clustering in Web-Log Analysis Based on Agent
Web mining is the use of data mining Technique to automatically discover & extract information from web documents. When user searches for goods the management agent receives order from graphical user interface .Manag...
ON-LINE ANALYTICAL PROCESSING (OLAP) ON NETWORKS
We propose a framework for efficient OLAP on networks with a focus on the most interesting kind, the topological OLAP (called “T- OLAP”), which incurs topological changes in the underlying networks. Topological OLAP oper...
BLUETOOTH SECURITY–SECURE DATA TRANSFER OVER BLUETOOTH
This paper describes the mechanism of Bluetooth authentication. In Bluetooth When two units want to communicate they need to be paired to each other. In the pairing process units are exchanging keys and authenticate each...