23 Questions 60 Answers 0 Followers
Questions related from AR Reddy
We find lot of books on Internet of Things (IoT). But I am not able to find text book to teach IoT networks at undergraduate level.
01 January 2017 3,445 1 View
What is the measured encryption speed ?
02 February 2016 1,984 0 View
What is sense-amplifier circuit for dynamic random access memory ? How many transistors are required for a sense-amplifier? Help is sought in the design of sense-amplifier circuit.
11 November 2015 8,198 1 View
The AES algorithm uses the irreducible polynomial x^8+x^4+x^3+x+1 for multiplying with MDS and inverse MDS matrix for encryption and decryption, respectively. Can we change this polynomial with...
10 October 2015 9,163 6 View
How management of individual identities, their authentication, authorization, roles and privileges are implemented in secure cloud computing ?
09 September 2015 6,819 4 View
OTP is used for authentication even in money transactions. What is the level of security is provided by OTP in cloud computing networks? What are the limitations?
09 September 2015 6,319 3 View
What is antenna modulation ?
08 August 2015 4,323 2 View
What are the physical layer encryption methods used in wireless communication ?
08 August 2015 2,634 1 View
For publishing a paper or thesis, do we have any guidelines on plagiarism ?
08 August 2015 9,331 6 View
What are the primality tests available ? Is there any code available for conducting primality test ?
08 August 2015 5,395 1 View
Can someone tell me the construction details of Involutory matrix of size 16 x 16 ?
08 August 2015 1,991 0 View
How to construct a microwave antenna feed for linear and circular polarization ? Is the design of feed different ? How to evaluate the performance of the feed ?
07 July 2015 397 3 View
Several connectors are available in microwave range: SMA, SMB, SMC, TNC, BNC, DIN, C, F and N. Which one is used for connecting transceivers and antennas ?
07 July 2015 1,581 1 View
Which computer architecture is superior ? Supercomputer architecture or Distributed computing architecture ? Which gives superior performance ?
07 July 2015 4,225 2 View
With advancements in machine learning, artificial intelligence, motion generation and control, a robot can assistant human being in executing various tasks including decision making. With such...
07 July 2015 8,632 26 View
At the end of the masters or doctoral degree, a student is required to write dissertation. The student writes chapter-wise drafts and makes several iterations before finalizing the report. What is...
07 July 2015 3,757 3 View
Will it be possible to perform multiprecision integer arithmetic of 4096 bit numbers on desktop computer ? What is the computation time ?
07 July 2015 6,174 1 View
How to design a super computer ?
07 July 2015 7,382 0 View
Digital water marks are used to protect copy right material such as audio and video files. We require software to embed and verify the digital water marks. Help is sought to identify the software.
06 June 2015 5,343 1 View
Peter Boyvalenkov, Peter Dragnev, Douglas Hardin, Edward Saff, Maya Stoyanova
06 June 2015 5,719 0 View
We have several tools for plagiarism checking. Will these tools generate same similarity index (SI) for a given report ? Can someone post the results for comparison purpose ?
06 June 2015 8,679 0 View
I have used 4x4, 8x8 and 16x16 MDS (Maximum Distance Separable) Matrix in the design of algorithms. Now I am looking for 32x32 MDS matrix. If it is available, someone can post it.
06 June 2015 3,279 0 View
We say that Data Encryption Standard (DES) algorithm and RSA 512 algorithm are broken. What is the criteria to declare a cipher is broken ?
06 June 2015 5,853 2 View