...IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 34, NO. 4, APRIL 1999 Comparative Analysis of Master–Slave Latches and Flip-Flops for High-Performance and Low-Power Systems Vladimir Stojanovic and Vojin G. Oklobdzija, Fellow, IEEE Abstract—In this paper, we propose a set of rules for consistent estimation of the real performance and power features of the flip-flop and master–slave latch structures. A new simulation and optimization approach is presented, targeting both highperformance and power budget issues. The analysis approach reveals the sources of performance and power-consumption bottlenecks in different design styles. Certain misleading parameters have been properly modified and weighted to reflect the real properties of the compared structures. Furthermore, the results of the comparison of representative master–slave latches and flipflops illustrate the advantages of our approach and the suitability of different design styles for high-performance and low-power applications. Fig. 1. The pseudorandom sequence. I. INTRODUCTION I NTERPRETATION of published results comparing various latches and flip-flops has been very difficult because of the use of different simulation methods for their generation and presentation. In this paper, we establish a set of rules with the goal of making the comparisons fair and realistic. Simulation of the latches and flip-flops obtained by using different design styles makes this analysis more difficult in trying to achieve consistent and comparable...
Words: 7815 - Pages: 32
...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...
Words: 12539 - Pages: 51
...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...
Words: 3746 - Pages: 15
...Random numbers in C++ and The Pythagorean Theorem Name Course Date Random numbers in C++ and The Pythagorean Theorem Introduction Computer programs in light of the technological advances that have been made, arguably make up for the most important concepts in such developments. A set of instructions designed to assist a computer to prefer a given task is referred to as a computer program. There are numerous languages used to create/design computer for instance Java Script, Java, C++, SQL and Sage (Laine, 2013). Computer programming is defined as a process of developing a working set of computer instructions meant to aid the computer in the performance of a given task. Computer programming starts with the formulation of a valid computer problem. This process is then followed by the development of an executable computer program, for instance Firefox Web Brower (Laine 2013). It is worth noting that there are other programs in the same realm. Computer programming is a diverse field that is of utmost importance in the modern world, especially with the continuous expansion of the internet. Perhaps the relevance of this can be underlined by the fact that computer programming has carved out as a course on itself. Computer programming is offered under several courses studied in colleges and universities (Laine, 2013). Computer programming is not only for computer students but for all who use computers on a day to day basis. This is by extension everyone since the...
Words: 9330 - Pages: 38
...Access: Full open access to this and thousands of other papers at http://www.la-press.com. Evolutionary Bioinformatics Computational Identification of MicroRNAs from the Expressed Sequence Tags of Toxic Dinoflagellate Alexandrium Tamarense Dahai Gao1, limei Qiu1, Zhanhui Hou1, Qingchun Zhang2, Jianmin Wu3, Qiang Gao1 and linsheng song1 1 Key Laboratory of Experimental Marine Biology, Institute of Oceanology, Chinese Academy of Sciences (IOCAS), Qingdao, People’s Republic of China. 2Key Laboratory of Marine Ecology and Environmental Sciences, Institute of Oceanology, Chinese Academy of Sciences (IOCAS), Qingdao, People’s Republic of China. 3Institute of Genomic Medicine, Wenzhou Medical University, Wenzhou, Zhejiang, People’s Republic of China. AbstrAct: Micro ribonucleic acids (miRNAs) represent a class of small noncoding RNAs that play important roles in multiple biological processes by degrading targeted mRNAs or by repressing mRNA translation. In the case of algal lineages, especially dinoflagellates, knowledge regarding the miRNA system is still limited and its regulatory role remains unclear. In the present study, a computational approach was employed to screen miRNAs from the expressed sequence tags (ESTs) of Alexandrium tamarense. A total of 18 potential miRNAs were identified according to a range of filtering criteria. In addition, unique evolutionary features, such as miRNA gene duplication and sequence similarity to metazoan miRNAs, implied that the miRNA system...
Words: 5014 - Pages: 21
...An Iterated Dynasearch Algorithm for the Single-Machine Total Weighted Tardiness Scheduling Problem Faculty of Mathematical Studies, University of Southampton, Southampton, SO17 1BJ, UK Faculty of Mathematical Studies, University of Southampton, Southampton, SO17 1BJ, UK Department of Decision and Information Sciences, Rotterdam School of Management, Erasmus University, P.O. Box 1738, 3000 DR Rotterdam, The Netherlands Richard.Congram@paconsulting.com • C.N.Potts@maths.soton.ac.uk • S.Velde@fac.fbk.eur.nl Richard K. Congram • Chris N. Potts • Steef L. van de Velde T his paper introduces a new neighborhood search technique, called dynasearch, that uses dynamic programming to search an exponential size neighborhood in polynomial time. While traditional local search algorithms make a single move at each iteration, dynasearch allows a series of moves to be performed. The aim is for the lookahead capabilities of dynasearch to prevent the search from being attracted to poor local optima. We evaluate dynasearch by applying it to the problem of scheduling jobs on a single machine to minimize the total weighted tardiness of the jobs. Dynasearch is more effective than traditional first-improve or best-improve descent in our computational tests. Furthermore, this superiority is much greater for starting solutions close to previous local minima. Computational results also show that an iterated dynasearch algorithm in which descents are performed a few random moves away from previous...
Words: 11016 - Pages: 45
...Communicating Design Research Knowledge: A Role for Ethnographic Writing Lois Frankel Concordia University & School of Industrial Design, Carleton University, Canada lois_frankel@carleton.ca Abstract: The recent use of ethnographic field research methods in design research practice reflects the growing interest of designers in the expressive Design researchers have not, however, exploited ethnographers to report their findings, but instead and cultural im pact of the artifacts they create. the "thick description" methods used by prefer to apply the results of design-driven ethnographic research directly to the development of new product concepts. This paper proposes that ethnographic representation methods , including innovative visual representations, offer untapped potential for design research reporting, not just field of historical design. Te in term s of facilitating com munications during the mpts by designers to make sense of the broader the potential of ethnographic design process, but also as a record of ongoing atte representation methods for design. Keywords: Ethnography in design, Ethnographic writing, Ethnographic representation st projects by design students show 1. Introduction Ethnography is often viewed as a specialized area within reveal and preserve cultural knowledge, using methods such the larger activity of cultural anthropology, seeking to as interviewing or cultural submersion to discover important values. Since design is also a profession...
Words: 4965 - Pages: 20
...Presenting an Academic Paper AGUS GUNAWAN Discussion points What is a good presentation? What will the audience remember? What is the most difficult aspect of presenting? Why? Are you nervous when you have to present? What are you afraid of? What do you hope to learn from this training? What we will discuss… Designing presentation content Designing effective power point Presenting your work Designing Presentation Content Things to be considered… Creates an overall framework – intro, main body, conclusion Understand key terminology Assumes the audiences knows nothing about the subject at all Time management Keep your own voice: start & end your paragraphs Applies critical thinking Develop the presentation content Identify your audience Formulate your objectives Make a statement Expand on the statement Use clear signpost to guide the audience through your discussion Back up with evidence and examples A major stimulant to creative thinking is focused questions Three principal questions for critical thinking What Why How “What?” Identifies the key message you wish to communicate. What is the benefit of your message for the audience ? What can they do with the information ? “Why?” Addresses the next obvious question that arises in the audience. “why should I do that?” “why should I think that?” “why should that be the case?” ...
Words: 1649 - Pages: 7
...conveyed by speech prosody. After hearing semantically neutral utterances spoken with emotional (i.e., happy, sad, fearful, or angry) prosody, or tone sequences that mimicked the utterances’ prosody, participants identified the emotion conveyed. In Experiment 1 (n 20), musically trained adults performed better than untrained 56), musically trained adults outperformed untrained adults. In Experiment 2 (n adults at identifying sadness, fear, or neutral emotion. In Experiment 3 (n 43), 6-year-olds were tested after being randomly assigned to 1 year of keyboard, vocal, drama, or no lessons. The keyboard group performed equivalently to the drama group and better than the no-lessons group at identifying anger or fear. In the past 10 years, the possibility of links between musical and nonmusical domains has generated excitement among researchers and the popular press. One line of research concerns short-term benefits in nonmusical domains that occur as a consequence of passive listening to music. In two widely cited studies (Rauscher, Shaw, & Ky, 1993, 1995), listening to music composed by Mozart led to temporary improvements in spatial abilities. As an instance of crossmodal priming, this result is remarkable because the priming stimulus (music) is seemingly unrelated to the task being primed (a spatial task). Subsequent research indicates, however, that the so-called Mozart effect has nothing to do with Mozart in particular or with music in general (Nantais & Schellenberg, 1999)...
Words: 7856 - Pages: 32
...of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly moving to new challenges...
Words: 15250 - Pages: 61
...The Effect of E-recruitment On the Recruitment Process: Evidence from Case Studies of Three Danish MNCs Anna B. Holm, Aarhus University, Denmark annah@asb.dk Abstract. The aim of this research is to determine whether the introduction of e-recruitment has an impact on the process and underlying tasks, subtasks and activities of recruitment. Three large organizations with wellestablished e-recruitment practices were included in the study. The case studies were conducted in Denmark in 2008-2009 using qualitative research methods. The findings indicate that e-recruitment had a noticeable effect on the overall recruitment process in the studied organizations. The investigation revealed changes in the sequence, divisibility and repetitiveness of a number of tasks and subtasks. The new process design supported by information and communications technologies was identified and is presented in the paper. This process allowed recruiters in the study to perform recruitment tasks more efficiently. However, practitioners should be aware of the increasing demands of the quality of online communication with applicants, and with it the electronic communication skills of recruitment professionals. Keywords: recruitment, e-recruitment, web-based recruitment, online recruitment, staffing, e-HRM 1 Introduction The first decade of the twenty-first century saw rapid growth in the use of online recruitment [25] and the transformation of electronic recruitment into one of...
Words: 8291 - Pages: 34
...To download more slides, ebooks, solution manual and test bank, visit http://downloadslide.blogspot.com Solutions Manual COST ACCOUNTING © 2012 Pearson Education, Inc. Publishing as Prentice Hall. SM Cost Accounting 14/e by Horngren © 2012 Pearson Education, Inc. Publishing as Prentice Hall. SM Cost Accounting 14/e by Horngren To download more slides, ebooks, solution manual and test bank, visit http://downloadslide.blogspot.com Solutions Manual COST ACCOUNTING Fourteenth Edition Charles T. Horngren Srikant M. Datar Madhav Rajan Upper Saddle River, NJ 07458 © 2012 Pearson Education, Inc. Publishing as Prentice Hall © 2012 Pearson Education, Inc. Publishing as Prentice Hall. SM Cost Accounting 14/e by Horngren This work is protected by United States copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from it should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials. Acquisition Editor: Stephanie Wall Editorial Project Manager: Christina Rumbaugh Editorial Assistant: Brian Reilly Project Manager, Production:...
Words: 10664 - Pages: 43
...Research Studies The science in psychology introduces the thoughts that most have about how the human mind functions and questions that some have about behavioral issues. To receive more acceptances from society theories are tested through research. To do researches a research question are obtain to gather more information, depending on the research different scientific method shows different ways on obtaining results. Different types of data are obtained through research. Typical Research Articles Each section on a research paper serves a vital part to a research project. A typical research paper has seven main parts which includes abstract page, title page, an introduction, results and discussion, method, a references page and title. The title page illustrates the main topic of the research study, including the important variables. The abstract provide the reader with a quick review of the article’s content. The introduction serves as the body of the paper. It introduces the reader to the overall issue or problem that is being tested and to provide justification for the hypotheses or hypothesis. The method purpose is to provide a detailed description of how the study was conducted. Results purpose is to describe what was found after statistically analyzing the data. The discussion section reviews, interprets, and evaluate the results of the study. The reference page is to help you find related articles for any topic you need to research....
Words: 1063 - Pages: 5
...understand-even simply recognize-the deepest assumptions we make as a culture we must turn to philosophy and to those thinkers whose ideas have shaped our assumptions. We will approach the study of philosophy as a conversation among the greatest thinkers of all the time, Plato, Aristotle, Descartes, Locke, Hume, Kant, Hegel, Marx, Nietzsche, Heidegger and Sartre. Our focus will be on each philosopher’s ideas and their impact on Western Civilization. We will also delve briefly into the cultural and historical context of each philosopher, evaluate weather their ideas are still relevant and some of their argument remain compelling. Course outline. The approach of this class is hybrid. The first part following an historical and chronological sequence, the second part follows a topical approach. Part I (a), Ancient philosophy, with our main focus on Plato and Aristotle. Part 1 (b) Late Renaissance and to Kant. Part II Empiricism and Positivism and part II (b) Existentialism. We will wrap the class pointing to some recent issues in philosophy: Postmodernism, Feminism and Philosophy of Mind. Required Textbooks: Lawhead, William F. The Voyage of Discovery: A Historical Introduction to Philosophy ISBN-13:978049512796. Vaughn, Lewis. Writing Philosophy, Oxford University Press, New York, Oxford, 2006. ISBN 13-9780-19-517956-9 Course Requirements: Class participation: Students are expected to contribute to the class...
Words: 1207 - Pages: 5
...Peer-Reviewed Journal Tracking and Analyzing Disease Trends pages 557–740 EDITOR-IN-CHIEF D. Peter Drotman Associate Editors Paul Arguin, Atlanta, Georgia, USA Charles Ben Beard, Ft. Collins, Colorado, USA Ermias Belay, Atlanta, Georgia, USA David Bell, Atlanta, Georgia, USA Sharon Bloom, Atlanta, GA, USA Mary Brandt, Atlanta, Georgia, USA Corrie Brown, Athens, Georgia, USA Charles H. Calisher, Ft. Collins, Colorado, USA Michel Drancourt, Marseille, France Paul V. Effler, Perth, Australia David Freedman, Birmingham, Alabama, USA Peter Gerner-Smidt, Atlanta, Georgia, USA Stephen Hadler, Atlanta, Georgia, USA Nina Marano, Nairobi, Kenya Martin I. Meltzer, Atlanta, Georgia, USA David Morens, Bethesda, Maryland, USA J. Glenn Morris, Gainesville, Florida, USA Patrice Nordmann, Fribourg, Switzerland Didier Raoult, Marseille, France Pierre Rollin, Atlanta, Georgia, USA Ronald M. Rosenberg, Fort Collins, Colorado, USA Frank Sorvillo, Los Angeles, California, USA David Walker, Galveston, Texas, USA Senior Associate Editor, Emeritus Brian W.J. Mahy, Bury St. Edmunds, Suffolk, UK Managing Editor Byron Breedlove, Atlanta, Georgia, USA Copy Editors Claudia Chesley, Laurie Dietrich, Karen Foster, Thomas Gryczan, Jean Michaels Jones, Shannon O’Connor, P. Lynne Stockton Production William Hale, Barbara Segal, Reginald Tucker Editorial Assistant Jared Friedberg Communications/Social Media Sarah Logan Gregory Founding Editor Joseph E. McDade, Rome, Georgia, USA Emerging Infectious Diseases...
Words: 18561 - Pages: 75