457 research outputs found

    Energy-efficient pipelined bloom filters for network intrusion detection

    Get PDF
    This document is made available in accordance with publisher policies. Please cite only the published version using the reference above. Full terms of use are available

    Increasing the power efficiency of Bloom filters for network string matching

    Get PDF
    Although software based techniques are widely accepted in computer security systems, there is a growing interest to utilize hardware opportunities in order to compensate for the network bandwidth increases. Recently, hardware based virus protection systems have started to emerge. These type of hardware systems work by identifying the malicious content and removing it from the network streams. In principle, they make use of string matching. Bit by bit, they compare the virus signatures with the bit strings in the network. The Bloom filters are ideal data structures for string matching. Nonetheless, they consume large power when many of them used in parallel to match different virus signatures. In this paper, we propose a new type of Bloom filter architecture which exploits well-known pipelining technique. Ā© 2006 IEEE

    Low-power bloom filter architecture for deep packet inspection

    Get PDF
    Bloom filters are frequently used to identify malicious content like viruses in high speed networks. However, architectures proposed to implement Bloom filters are not power efficient. In this letter, we propose a new Bloom filter architecture that exploits the well-known pipelining technique. Through power analysis we show that pipelining can reduce the power consumption of Bloom filters up to 90%, which leads to the energy-efficient implementation of intrusion detection systems. Ā© 2006 IEEE

    Zonal Jets as Transport Barriers in Planetary Atmospheres

    Get PDF
    The connection between transport barriers and potential vorticity (PV) barriers in PV-conserving flows is investigated with a focus on zonal jets in planetary atmospheres. A perturbed PV-staircase model is used to illustrate important concepts. This flow consists of a sequence of narrow eastward and broad westward zonal jets with a staircase PV structure; the PV-steps are at the latitudes of the cores of the eastward jets. Numerically simulated solutions to the quasigeostrophic PV conservation equation in a perturbed PV-staircase flow are presented. These simulations reveal that both eastward and westward zonal jets serve as robust meridional transport barriers. The surprise is that westward jets, across which the background PV gradient vanishes, serve as robust transport barriers. A theoretical explanation of the underlying barrier mechanism is provided. It is argued that transport barriers near the cores of westward zonal jets, across which the background PV gradient is small, are found in Jupiter's midlatitude weather layer and in the Earth's summer hemisphere subtropical stratosphere.Comment: Accepted for publication in JA

    Mapping of non-central potentials under point canonical transformations

    Full text link
    Motivated by the observation that all known exactly solvable shape invariant central potentials are inter-related via point canonical transformations, we develop an algebraic framework to show that a similar mapping procedure is also exist between a class of non-central potentials. As an illustrative example, we discuss the inter-relation between the generalized Coulomb and oscillator systems.Comment: 11 pages article in LaTEX (uses standard article.sty). Please check http://www1.gantep.edu.tr/~gonul for other studies of Nuclear Physics Group at University of Gaziante

    Simulation of LYSO Crystal for the TAC-PF Electromagnetic Calorimeter

    Get PDF
    In addition to PWO and CsI(Tl) crystals, cerium doped LYSO crystal is considered for the electromagnetic calorimeter part of the Turkish Accelerator Center Particle Factory (TAC-PF) detector, because of its high light yield, fast decay time and good radiation hardness. In this work, LYSO crystals arranged in 3Ɨ3 and 5Ɨ5 matrices have been simulated against photons in the energy range between 50 MeV and 2 GeV, using Geant4 simulation code. Energy resolutions have been estimated considering the contribution of photoelectron statistics coming from the avalanche and PIN photodiodes

    A low power lookup technique for multi-hashing network applications

    Get PDF
    Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail to identify so many signatures through comparisons at very high network speeds. Bloom filters are one of the main multi-hashing schemes utilized in hardware to support this level of security. Nevertheless Bloom filters consume significant power to store, retrieve and lookup virus signatures owing to many hash function computations required to index to the memory. We present a novel lookup technique and architecture to decrease the power consumption of multi-hashing schemes, predominantly Bloom filters, in hardware. The theoretical analysis has shown that power gain achieved through new lookup technique can go up to 90%. Simulation results with three different classes of the hash functions embedded into the Bloom filter have indicated that power consumption of the Bloom filters can be considerably decreased by employing the low power lookup technique. Ā© 2006 IEEE

    Any ll-state solutions of the Hulth\'en potential by the asymptotic iteration method

    Full text link
    In this article, we present the analytical solution of the radial Schr\"{o}dinger equation for the Hulth\'{e}n potential within the framework of the asymptotic iteration method by using an approximation to the centrifugal potential for any ll states. We obtain the energy eigenvalues and the corresponding eigenfunctions for different screening parameters. The wave functions are physical and energy eigenvalues are in good agreement with the results obtained by other methods for different Ī“\delta values. In order to demonstrate this, the results of the asymptotic iteration method are compared with the results of the supersymmetry, the numerical integration, the variational and the shifted 1/N expansion methods.Comment: 14 pages and 1 figur

    Disruption of HDX gene in premature ovarian failure

    Get PDF
    We present a case of a 19-year-old phenotypically normal girl with premature ovarian failure. Cytogenetic analysis using G banding and fluorescence in situ hybridization (FISH) from cultured peripheral blood lymphocytes of the patient and the family revealed a de novo X;15 translocation and the imbalance to be 46,X,t(X;15)(Xpter ā†’ Xq21::15q11 ā†’ 15qter;15pter ā†’ 15q11::Xq21 ā†’ Xqter). ish (CEPX+, wep15+, ISNRPN+, PML+, D15S10+, wcp15-, SNRRN-, PML-)[20]. The X chromosome inactivation (XCI) assay revealed a completely skewed XCI pattern in which selective pressure favors an active maternal allele. The Affymetrix 2.7 M cytogenetics whole-Genome array confirmed the chromosomal imbalance and identified disruption of the HDX gene at Xq21, the translocation breakpoint. Ā© 2013 Informa Healthcare USA, Inc

    Primary cardiac osteosarcoma in a 42-year-old woman

    Get PDF
    We describe here a 42-year-old woman who was admitted to hospital with a pedunculated mass in her left atrium. She was diagnosed with a primary cardiac osteosarcoma with special immunohistochemical characteristics. Echocardiography and computed tomography can be used to differentiate cardiac osteosarcomas from routine intracardiac tumors. The patient was treated by surgical removal of the mass. Two years later, she has shown no evidence of disease recurrence. We discuss primary osteosarcomas in the cardiac cavity and their management
    • ā€¦
    corecore