Research

Emerging Research in Computing, Information, Communication by N. R. Shetty, N.H. Prasad, N. Nalini

By N. R. Shetty, N.H. Prasad, N. Nalini

This lawsuits quantity covers the lawsuits of ERCICA 2015. ERCICA presents an interdisciplinary discussion board for researchers, expert engineers and scientists, educators, and technologists to debate, debate and advertise learn and know-how within the upcoming components of Computing, info, conversation and their purposes. The contents of this e-book disguise rising examine parts in fields of Computing, info, conversation and functions. this can turn out beneficial to either researchers and working towards engineers.

Show description

Read or Download Emerging Research in Computing, Information, Communication and Applications: ERCICA 2015, Volume 1 PDF

Similar research books

The Ashgate Research Companion to Corporate Social Responsibility (Corporate Social Responsibility Series)

Lately the time period company social accountability (CSR) has received prominence either in enterprise and within the media, now not least due to the upward push in energy of the transnational company in an more and more globalized global. it really is essentially the most debated administration concerns, but there's a loss of consensus on what the concept that capacity, what it includes, why it may be embraced and the way.

Consciousness as a Scientific Concept: A Philosophy of Science Perspective

The resource of never-ending hypothesis and public interest, our medical quest for the origins of human recognition has multiplied in addition to the technical services of technological know-how itself and is still one of many key subject matters in a position to fireplace public up to educational curiosity. but many complex matters, pointed out during this vital new e-book, stay unresolved.

New Techniques in Nutritional Research

New recommendations in dietary study includes the court cases of the 9th Annual Bristol-Myers Squibb/Mead Johnson Symposium on meals study hung on September 11-13, 1989 in Cambridge, England. The papers spotlight a few novel options which are at present utilized in dietary study, together with the doubly categorized water procedure; the categorised bicarbonate process; X-ray computed tomography; neutron activation research; magnetic resonance imaging; and the applying of reliable isotope tracers.

An invitation to social research : how it's done

With real-world examples and an emphasis on ethics all through, a call for participation TO SOCIAL study: HOW it is performed, 5th version combines balanced assurance of quantitative and qualitative equipment of social learn with a different "behind the scenes" technique. outfitted on focal learn items and excerpts from genuine learn tasks, chapters current the insights, views, and demanding situations of tangible researchers within the box.

Extra resources for Emerging Research in Computing, Information, Communication and Applications: ERCICA 2015, Volume 1

Sample text

R. Kota and K. Chaitanya Statistical carry look ahead adder (SCLA) is one of the best variable-time adders. It will initiate its operation after the start signal as the input [4]. The start signal indicates when the computation of the input has to be started. Depending upon the input given the adder will perform the addition operation and will give the completion signal which is the indication of the completion of the operation. Several addition techniques are known to design efficient variable-time adders, and one of the most promising is the statistical carry look-ahead addition technique.

The start signal indicates when the computation of the input has to be started. Depending upon the input given the adder will perform the addition operation and will give the completion signal which is the indication of the completion of the operation. Several addition techniques are known to design efficient variable-time adders, and one of the most promising is the statistical carry look-ahead addition technique. The average addition time required is less. So for the high speed application variable adder with static representation are dominating feature.

Moreover, the authenticity and integrity of the message can be verified by generating a message authentication code, also known as MAC [4]. Symmetric key cryptographic technique is extremely secure because of its 256 bit key length [5, 6]. It takes years to break the encoded data through Brute Force attack [7]. Such algorithms do not consume much computing power [8] and are freely available [9]. The Symmetric Key Cryptography method has been illustrated in the Fig. 1. The key length plays a vital role in Symmetric key cryptography technique [10].

Download PDF sample

Rated 4.85 of 5 – based on 49 votes