27-28, January 2018, Dubai, UAE

Accepted Papers

  • Statistical Data Analysis based on Genetic Algorithms and Prediction Methods
    Iaroslav Iaremko , Petr Hanacek Faculty of Information Technology BUT, Bozetechova 1/2, Brno, Czech republic
    ABSTRACT

    The next generation of manycore architecture with hundreds of cores will replace soon the current multicore architecture. If we double the number of cores per chip every year, we will reach a thousand in the upcoming few years. In this matter, the Network-on-Chip (NoC) is proposed as alternative pattern which is considered as an emerging technology for distributed embedded systems. A novel 3D architecture (3DPM) on two layers, the first layer is composed of different types of processors and the second layer is composed of different types of memories. The 3DPM is a good alternative to cope with the limitations of 2D manycore architecture. The main problem in 2D NoC architecture is due to the congestion when transmitting the big data packets from the shared memory to all the processors how execute different applications tasks. However, the communication delay and power consumption of global interconnections become the major bottleneck. In this work we combined with two tools GEM5 and Noxim to realize this novel architecture. We are planning to compare a few mapping algorithms in both 2D and 3DPM architectures.

  • Cipher Key Generation Using Autoregressive Model and analysis of a last event
    Faculty of Information Technology BUT, Bozetechova 1/2, Brno, Czech republic
    ABSTRACT

    This paper describes basic principles of evaluation of future events prediction, focus- ing on mathematical and statistical methods. Creating a software application enables us to determine a prediction of the future events width a very high accuracy for creating a strong cipher key using statistical databases. Creating algorithm is the combination of dierent math- ematical and statistical models. The paper explains the activities of statistical modeling and shows how can be utilize statistic of past experiences for determining the output sequence with- out any connections between their members. The output sequence generate by the analysis of event processes , by focusing on all experiences to build a correspondent Neural Network for computing deviations and comparing results width methods such as ARIMA, ANN modeling, Theory of prediction and other created statistical methods for calculating output sequence with a very high accuracy. An assessment of the created system and performance tests is enclosed as part of this paper..

  • New Concept for a Physically-Secured E-Coin
    Wael Adi and Ayoub Mars IDA; Institute of Computer and Network Engineering Technical University of Braunschweig Braunschweig, Germany
    ABSTRACT

    Electronic Cash (EC) is still suffering from being difficult to transfer value as a digital stream in an open channel. The fact that a stream of bits is known to any transaction node, makes protection against double-spending and anonymity becomes a very difficult task. In physical cash, coins and bills are exchanged physically between seller and buyer resulting with assured transport of value by the fact that an entity transfer assures no possibility for physical duplication. Block-chaining technique in Bitcoin attempts to prohibit doubling by majority observation with also a limited success in anonymity and double spending issues. We introduce a new concept for E-Coin transfer by prohibiting the knowledge of the coins to any exchanging party. The only one who knows the coins is the minting authority which is traceable as a trusted authority. The coins are made only possible to identify without being able to see by the exchanging parties, thus prohibiting doubling of coins. As something which you do not see is impossible to copy. The key idea is to store the coins in unclonable physical Electronic-Wallets UEW. The coins can be provably transferred without being seen by users. The UEWs can only be used to verify, accommodate and exchange coins only between each other under the sole control of the users. Users and manufacturers have no possibilities to clone UEW and duplicate E-coins as identification do not reveal the full identity as in the biological DNA. The concept is bio-inspired and physical cash inspired as only central banks can duplicate coins and bills. The new E-Coin concept is based on using Physically Unclonable Functions (PUFs ) in a new form as digital Secret Unknown Cipher SUC developed by the authors.