Fault-Tolerance and Permutation Analysis of ASEN and its Variant
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 1
Abstract
High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory modules. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required. The design of a suitable interconnection network for inter-processor communication is one of the key issues of the system performance. In this paper a new multistage interconnection network IASEN (Irregular augmented shuffle exchange) has been proposed modifying existing ASEN-2 network. ASEN-2 is a regular multipath network with limited fault tolerance. The paper also discusses the permutation possibility behavior of both the networks with and without faults. It has been observed that the proposed multistage interconnection network IASEN provides much better fault-tolerance by providing more paths between any pair of source-destination as compared to ASEN-2 at the expanse of little more cost.
Authors and Affiliations
Rinkle Rani Aggarwal , Dr. Lakhwinder Kaur
A New Fuzzy Gaussian Noise Removal Method for Gray-Scale Images
A New Fuzzy Filter that adopts Fuzzy Logic is proposed in this paper which removes Gaussian Noise from the Corrupted Gray scale Images which is also good for Impulsive and multiplicative Noise. This Method Consists of Tw...
AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
Automatic image retargeting is used for large image.That are to be fit in small size display devices. Without any loss of information.our proposed methods one is saliency based mesh parameterization method is used to re...
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
Outlier Detection for Multidimensional Medical Data
The knowledge-rich nature of the Medical Information domain has made it an ideal environment where knowledge on data mining should have to be unearthed from large data collection for dialysis’ of growing unknown diseases...
Anti-Phishing Design Using Mutual Authentication Approach
The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....