238 research outputs found

    CS 631: Data Management System Design

    Get PDF

    MOCCCDTA-based Current Mode Tunable Universal Biquad Filter for Bluetooth Applications

    Get PDF
    In the last decade, there has been much effort to reduce the supply voltage of electronic circuits due to the demand for portable and battery-powered equipment. Since a low-voltage operating circuit becomes necessary, the current-mode technique is ideally suited for this purpose more than the voltage-mode one. In this paper, performance of multi output current controlled current differencing transconductance amplifier (MOCCCDTA) is evaluated using 180nm, 90nm and 45nm CMOS technology. It is found that the 45nm CMOS-basedMOCCCDTA provides highest frequency i.e. 33GHz. Further a Universal biquad filter has been designed using a single MOCCCDTA as an active element and two capacitors. Filter offers high frequency in GHz. Tunability of all the filter outputs with respect to a bias current has been analyzed. The tunability of the filter circuit for Bluetooth applications is also shown in this work. The performances of MOCCCDTA circuit and Universal biquad filter are illustrated by HSPICE. The simulation results are found to be in agreement with the theoretical predictions

    Privacy-Preserving Secret Shared Computations using MapReduce

    Full text link
    Data outsourcing allows data owners to keep their data at \emph{untrusted} clouds that do not ensure the privacy of data and/or computations. One useful framework for fault-tolerant data processing in a distributed fashion is MapReduce, which was developed for \emph{trusted} private clouds. This paper presents algorithms for data outsourcing based on Shamir's secret-sharing scheme and for executing privacy-preserving SQL queries such as count, selection including range selection, projection, and join while using MapReduce as an underlying programming model. Our proposed algorithms prevent an adversary from knowing the database or the query while also preventing output-size and access-pattern attacks. Interestingly, our algorithms do not involve the database owner, which only creates and distributes secret-shares once, in answering any query, and hence, the database owner also cannot learn the query. Logically and experimentally, we evaluate the efficiency of the algorithms on the following parameters: (\textit{i}) the number of communication rounds (between a user and a server), (\textit{ii}) the total amount of bit flow (between a user and a server), and (\textit{iii}) the computational load at the user and the server.\BComment: IEEE Transactions on Dependable and Secure Computing, Accepted 01 Aug. 201
    corecore