Time filter

Source Type

Abu Dhabi, United Arab Emirates

Al-Hosn University is an educational institution founded in 2005 and located in Abu Dhabi, the capital city of the United Arab Emirates. It is a segregated institution in which the male students have one villa building to themselves and the females a villa building to themselves. These villa buildings are residential villas that have had the interiors cleared out to accommodate classrooms. Wikipedia.

Loucif S.,ALHOSN University
Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015 | Year: 2015

This paper investigates the effects of concentration on the performance of k-ary n-cubes. Simulation results indicate that only large ratios of packet length-to-average hop-count are in favor of concentrated mesh and torus. The Cmesh takes full advantage of its high channel bandwidth to outperform Ctorus. Moreover, non-local traffic suffers more from performance bottleneck than local traffic at routers. Providing dedicated input ports, one for each IP, at routers, reduces the average packet latency compared to a configuration with a single input port shared by all IP cores of the cluster. © 2015 IEEE. Source

Loucif S.,ALHOSN University
Proceedings - International Conference on Advanced Information Networking and Applications, AINA | Year: 2015

Mesh and torus are the most popular topologies suggested to implement Network-on-Chip (NoC). Concentration has been suggested to reduce networks complexity in terms of routers and wiring requirements. Several studies have examined the performance of concentrated mesh. This paper expands on these studies to re-evaluate the benefits of concentration in mesh and torus. Three alternative router configurations are proposed to investigate bottleneck performance due to concentration. Simulation results indicate that, under uniform traffic distribution, only large ratios of packet length-to-average hop count is in favor of concentrated mesh and torus. The Cmesh profits from its high channel bandwidth to offer better performance than Ctorus. The latter is unable to overcome the high packet serialization overhead even when using separate input ports at routers, one for each IP core, to reduce packet contention. Furthermore, non-local traffic at routers suffers more from contention than local traffic. Providing dedicated input ports, one for each IP core, at routers, reduces the average packet latency by 80% compared to a configuration with a single input port shared by all IP cores of the cluster, while only 20% improvement is achieved by adding a separate input port to service local traffic. However, when high traffic load is sent locally to the IP cores belonging to the same cluster as the source, a router configuration with multiple channels servicing local traffic greatly reduces the overall packet latency. © 2015 IEEE. Source

Loucif S.,ALHOSN University
Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013 | Year: 2013

Torus is gaining a great interest in on-chip networks, and to further reduce torus diameter, hierarchical-torusnetworks have been proposed, where a cluster of IPs are connected by a single router. This paper investigates the performance merits of clustering in the torus, and compares the performance of the hierarchical-torus to that of the torus. Our simulation results show that, although hierarchical-torushas lower network diameter than the tours, the latter provides better latency performance. Hierarchical-torus suffers from the high load of traffic distributed on fewer channels, compared to the torus, resulting in high message blocking delays. Hierarchical-torus manages to outperform the torusonly under local traffic distribution or when the fraction of hot-spot traffic is very large. Also, our results show hierarchical-torus greatly improves its performance in terms of message latency under deterministic routing with a small number of virtual channels, a performance which is almost similar to that obtained when messages are adaptive routed. © 2013 IEEE. Source

Information and Communication Technology (ICT) security issues have been a major concern for decades. Today's ICT infrastructure faces sophisticated attacks using combinations of multiple vulnerabilities to penetrate networks with devastating impact. With the recent rise of cloud computing as a new utility computing paradigm, organizations have been considering it as a viable option to outsource major IT services in order to cut costs. Some organizations have opted for a private or hybrid cloud to take advantage of the emerging technologies and services. However, ICT security issues have to be appropriately mitigated. This research proposes a cloud security framework and an approach for vulnerabilities coverage and cost optimization using Cuckoo search algorithm with Lévy flights as random walks. The objective is to mitigate an identified set of vulnerabilities using a selected set of techniques when minimizing cost and maximizing coverage. The results show that Cloud Computing providers and organizations implementing cloud technology within their premises can effectively balance IT security coverage and cost using the proposed approach. © 2014 Elsevier Ltd. All rights reserved. Source

Markou G.,ALHOSN University
International Journal of Computational Methods | Year: 2015

In this paper, a numerical investigation on the limits of an automatic procedure for the generation of embedded steel reinforcement inside hexahedral finite elements (FEs) is presented. In 3D detailed reinforced concrete simulations, mapping the reinforcement grid inside the concrete hexahedral FEs is performed using the end-point coordinates of the rebar reinforcement macro-elements. This procedure is computationally demanding while in cases of large-scale models, the required computational time for the reinforcement mesh generation is excessive. This research work scopes to study and present the limitations of the embedded mesh generation method that was proposed by Markou and Papadrakakis, through the use of a 64-bit operating system. The embedded mesh generation method is integrated with a filtering algorithm in order to allocate and discard relatively short embedded rebar elements that result from the arbitrary positioning of the embedded rebar macro-elements and the nonprismatic geometry of the hexahedral mesh. The computational robustness and efficiency of the integrated embedded mesh generation method are demonstrated through the analysis of three numerical models. The first two numerical models are a full-scale 2-story and a 7-story RC structures while the third model deals with a full-scale RC bridge with a trapezoidal section and a total span of 100 m. Through the third numerical implementation, the computational capacity of the integrated embedded rebar mesh generation method is investigated. © 2015 World Scientific Publishing Company. Source

Discover hidden collaborations