238 research outputs found
MOCCCDTA-based Current Mode Tunable Universal Biquad Filter for Bluetooth Applications
In the last decade, there has been much effort to reduce the supply voltage of electronic circuits due to the demand for portable and battery-powered equipment. Since a low-voltage operating circuit becomes necessary, the current-mode technique is ideally suited for this purpose more than the voltage-mode one. In this paper, performance of multi output current controlled current differencing transconductance amplifier (MOCCCDTA) is evaluated using 180nm, 90nm and 45nm CMOS technology. It is found that the 45nm CMOS-basedMOCCCDTA provides highest frequency i.e. 33GHz. Further a Universal biquad filter has been designed using a single MOCCCDTA as an active element and two capacitors. Filter offers high frequency in GHz. Tunability of all the filter outputs with respect to a bias current has been analyzed. The tunability of the filter circuit for Bluetooth applications is also shown in this work. The performances of MOCCCDTA circuit and Universal biquad filter are illustrated by HSPICE. The simulation results are found to be in agreement with the theoretical predictions
Privacy-Preserving Secret Shared Computations using MapReduce
Data outsourcing allows data owners to keep their data at \emph{untrusted}
clouds that do not ensure the privacy of data and/or computations. One useful
framework for fault-tolerant data processing in a distributed fashion is
MapReduce, which was developed for \emph{trusted} private clouds. This paper
presents algorithms for data outsourcing based on Shamir's secret-sharing
scheme and for executing privacy-preserving SQL queries such as count,
selection including range selection, projection, and join while using MapReduce
as an underlying programming model. Our proposed algorithms prevent an
adversary from knowing the database or the query while also preventing
output-size and access-pattern attacks. Interestingly, our algorithms do not
involve the database owner, which only creates and distributes secret-shares
once, in answering any query, and hence, the database owner also cannot learn
the query. Logically and experimentally, we evaluate the efficiency of the
algorithms on the following parameters: (\textit{i}) the number of
communication rounds (between a user and a server), (\textit{ii}) the total
amount of bit flow (between a user and a server), and (\textit{iii}) the
computational load at the user and the server.\BComment: IEEE Transactions on Dependable and Secure Computing, Accepted 01
Aug. 201
- …