D.J. Evans and S. Ghanemi
In Part I surveys of the architectural concepts involved in designing special purpose VLSI computing structures and systolic array, WARP and CHIP architectures and their…
Abstract
In Part I surveys of the architectural concepts involved in designing special purpose VLSI computing structures and systolic array, WARP and CHIP architectures and their applications were discussed. The INMOS transputer chip and the parallel language OCCAM were also introduced. In Part II the soft simulation of systolic algorithms via OCCAM programs is considered with particular reference to their constraints and classification. Finally, the systolisation of the pattern matching problem is discussed together with various soft systolic string matcher chip designs and their simulation.
Details
Keywords
S. Ghanemi and Ben Ali Y. Mohamed
Combining the parallel and neural paradigms seems, at first glance, to be a natural process, since it is a methodology derived from the part played by the biological and…
Abstract
Combining the parallel and neural paradigms seems, at first glance, to be a natural process, since it is a methodology derived from the part played by the biological and mathematical behavior of a neuron. It is proposed that any neural algorithm is inherently a parallel application. The structure of a neural algorithm and the function of a neuron suggest the choice of the systolic approach. However, interest should be restricted only to those well‐known neural models such as the Hopfield and back‐propagation neural networks. It is also shown that the systolic approach is best suited to the parallelization of the patterns training phase of the neural algorithms in terms of mapping the two structures (systolic and neural networks).
Details
Keywords
D.J. Evans and S. Ghanemi
In Part I of this article, surveys of the architectural concepts involved in designing special‐purpose VLSI computing structures are given. This leads to a discussion of systolic…
Abstract
In Part I of this article, surveys of the architectural concepts involved in designing special‐purpose VLSI computing structures are given. This leads to a discussion of systolic array, wavefront array, WARP and CHiP architectures and their applications. The INMOS transputer chip design and the parallel language OCCAM are introduced. The authors believe that together they form a modular hardware/software component of the type which is essential in the construction of highly parallel computer systems. (Part II of this article will consider the soft simulation of systolic algorithms via OCCAM and the systolisaion of the pattern matching problem).
Details
Keywords
D.J. Evans and S. Ghanemi
The string searching problem is central to many information retrieval and text editing applications. The Brute Force algorithm is inefficient in some cases and in this article…
Abstract
The string searching problem is central to many information retrieval and text editing applications. The Brute Force algorithm is inefficient in some cases and in this article four other algorithms are discussed, of which the Boyer‐Moore and the Improved Boyer‐Moore are found to be the fastest. A parallel implementation using the divide and conquer method is examined. Comparisons using the MIMD‐type parallel computer systems are presented.
Details
Keywords
Darwish Almoharby and Mark Neal
This study aims to clarify current thinking about Islamic leadership by returning to the original texts of Islam, the Qur'an and the hadith. These are analysed to identify…
Abstract
Purpose
This study aims to clarify current thinking about Islamic leadership by returning to the original texts of Islam, the Qur'an and the hadith. These are analysed to identify foundational Islamic leadership prototypes, concepts and ideas. In so doing, the article provides original analysis of the foundations of Islamic leadership, so as to inform current debates about leadership in Islamic regions and communities.
Design/methodology/approach
The study consists of content analysis of the Qur'an and the hadith, to identify key concepts within these texts, concerning the nature of leadership. The methodological aim is to develop characterisations of Islamic leadership prototypes that are recognisable to practising Muslims today. In order to ensure this, the content analyses have been presented to academic seminar groups and conferences and refined through subsequent discussions.
Findings
Islamic leadership does not rely for its legitimacy upon traditional authority, but rather on rational-legal systems based on unity of purpose, acknowledgement of the one God, and the foundational example of Prophet Muhammad, whose referent and charismatic authority lives on in discussions of the sunnah and the hadith. It is thus vital to refine external or “etic” characterisations of Islamic leadership with an appreciation of leadership prototypes in the Qur'an, the sunnah and hadith.
Research limitations/implications
The scope of this study is limited by the subject matter, the investigation of leadership prototypes in the Qur'an and the hadith. This means that the consideration of historically more recent Islamic thinking about leadership has been left to subsequent study.
Practical implications
Implications for subsequent researchers are the need for critical clarity in discussions of “Islamic” or “Muslim” leadership. Another significant implication comes with the recognition of the overwhelming importance of the Prophet Muhammad's life and sayings in laying the parameters for the subsequent Muslim discussions of leadership.
Originality/value
This is the first use of content analysis to examine the foundational leadership prototypes and concepts embedded in the Qur'an and the hadith, and thus to analyse the Prophet Muhammad as a referent and charismatic leader, whose life set the parameters for the subsequent understanding of Islamic leadership.
Details
Keywords
Abdesselem Beghriche and Azeddine Bilami
Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of…
Abstract
Purpose
Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols. Many existing works assume that mobile nodes will follow prescribed protocols without deviation. However, this is not always the case, because these networks are subjected to a variety of malicious attacks. Since there are various models of attack, trust routing scheme can guarantee security and trust of the network. The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.
Design/methodology/approach
The proposed model incorporates the concept of trust into the MANETs and applies grey relational analysis theory combined with fuzzy sets to calculate a node’s trust level based on observations from neighbour nodes’ trust level, these trust levels are then used in the routing decision-making process.
Findings
In order to prove the applicability of the proposed solution, extensive experiments were conducted to evaluate the efficiency of the proposed model, aiming at improving the network interaction quality, malicious node mitigation and enhancements of the system’s security.
Originality/value
The proposed solution in this paper is a new approach combining the fundamental basics of fuzzy sets with the grey theory, where establishment of trust relationships among participating nodes is critical in order to enable collaborative optimisation of system metrics. Experimental results indicate that the proposed method is useful for reducing the effects of malicious nodes and for the enhancements of system’s security.
Details
Keywords
Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi
Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…
Abstract
Purpose
Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network.
Design/methodology/approach
This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network.
Findings
A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms.
Originality/value
It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.