Quarterly Journal of Information and Communication Technology ​
Volume & Issue: Volume 4, Issue 3 - Serial Number 12, Autumn 2023 
Number of Articles: 6
An Overview of Online Fault Tolerance for FPGA Logic Blocks

An Overview of Online Fault Tolerance for FPGA Logic Blocks

Pages 1-16

Sepideh Gohari

Abstract Most adaptive computing systems use reconfigurable hardware in the form of field programmable gate arrays (FPGA). In order for these systems to be fielded in harsh environments where high availability and reliability are a requirement, the programs running on FPGAs must be hardware fault tolerant, as this is the case during the lifetime of the system. may occur In this paper, we present new fault tolerance techniques for FPGA logic blocks, which are developed as part of the Self-Standing Test Areas (STAR) approach for test and diagnosis, and online configuration (we tolerate over 100 logic faults through the actual implementation on an FPGA containing a 20 x 20 array of logic blocks). A key feature is the reuse of incomplete logic blocks to increase the number of effective spares and extend mission length. To increase fault tolerance, we not only use faulty non-faulty sections or logic blocks with minor faults, but also use faulted sections of faulty logic blocks in non-faulty modes. By using and reusing faulty resources, our multilevel approach extends the number of tolerable faults beyond the number of available spare logic resources. Unlike many row, column, and piecewise methods, our multi-level approach can tolerate faults that are evenly distributed over the logic area, while also clustering faults in the same local area. Meanwhile, system operations are not interrupted for fault detection or computational fault-transitor configurations. Our fault tolerance techniques are implemented using ORAC2 series FPGAs that specify incremental dynamic runtime configuration

A Review of Wireless Sensors for Remote Health Monitoring

A Review of Wireless Sensors for Remote Health Monitoring

Pages 17-25

Nasrollah Takhtaei, siyavash karimi

Abstract Wireless sensor networks (WSNs) are revolutionizing the healthcare industry. These networks use wireless sensors to collect and analyze health data. This innovative technology offers numerous benefits for increasing efficiency and reducing costs in healthcare. Using Wireless sensor networks, doctors and nurses can receive patient's biological profile data in real time. In this paper, we propose a smart healthcare system based on advanced Wireless sensor networks. This smart system targets the residents' lives to benefit from remote healthcare with continuous monitoring, and greatly improve the conditions of healthcare and medical care, reduce treatment costs, and help prevent diseases. We have currently investigated the objectives, benefits, status, and existing challenges in this paper.This smart system targets the residents' lives to benefit from remote healthcare with continuous monitoring, and greatly improve the conditions of healthcare and medical care, reduce treatment costs, and help prevent diseases. We have currently investigated the objectives, benefits, status, and existing challenges in this paper.

Functionality Analysis of General Routing Methods in Distribution Networks

Functionality Analysis of General Routing Methods in Distribution Networks

Pages 26-33

Ali Haddadi, Mahdi Parsa

Abstract In the 20th century, the collection, processing and distribution of information has been transformed by the use of distribution networks and related new approaches, and among other developments, we have seen the launch and development of various global distribution networks, the production and growth of the computer industry, and the launch of satellites. We have been in communication.
With technological advancements, these achievements are converging and the differences between the approaches to collecting, transmitting, storing and processing information are rapidly disappearing, and basically, with the increase in the power of collecting, processing and distributing information, the demand for more complex information processing in The environment of distributed networks increases. In order to communicate between nodes in networks, we need a backbone called routing approaches in distributed networks. These functions are basically composed of a large number of routers, they have the task of transmitting information. Algorithms should be implemented on these routers so that they can choose the best path for information transfer in this global village. In this article, we are going to review and analyze the practical views of routing in distributed networks and related general algorithms.

Security Threats, Challenges, Procedures and Policies in Information Systems

Security Threats, Challenges, Procedures and Policies in Information Systems

Pages 34-42

mohammad Azadi

Abstract Nowadays, information systems as the hub of data processing and knowledge management play a vital and extensive role in digital societies. With the increasing development of technologies and the increase in the amount of information related to users and organizations, the security of information systems has become a complex and multi-dimensional challenge. In the field of security management in our information systems, we need a comprehensive understanding of all types of threats and challenges and providing approaches, policies, procedures and resources that are used to prevent security gaps, as well as protecting the system from all types of attacks affecting data and information. to be It is necessary to adopt a coherent and coordinated method to achieve the security processes of data and systems and it is necessary to understand the complexity of this category and provide comprehensive approaches based on its basic principles. Protection of information systems against unauthorized access or change to information, including storage, processing or transmission, and against denial of service to authorized users, is among the necessary measures to identify, document and deal with security threats in this area. According to the importance of the subject in this article, we will investigate the characteristics of security services of information systems in the environment of distributed networks, their importance and existing challenges and we will express effective policies and procedures to increase security in this area.

Investigating Operational and Practical Classifications of Algorithmic Perspectives in Computer Science

Investigating Operational and Practical Classifications of Algorithmic Perspectives in Computer Science

Pages 43-50

Maryam Eslami

Abstract In today's knowledge-oriented world, there are many problems that need to be solved in a structured and systematic way. In this regard, an effective solution is to use suitable algorithmic approaches and perspectives. Algorithm includes a set of processes and instructions that can be used to solve many computer problems or real world problems in a regular and effective way. The use of algorithms in solving systematic problems saves time and money and provides new and valuable solutions. In fact, the algorithm is considered the beating heart of potentially powerful technologies such as artificial intelligence and today, instead of thinking about the future of algorithms, people consider the future to belong to algorithms. Although algorithms have relatively the same concept in different fields of implementation, but in order to achieve specific applications of the desired algorithm in different fields, we must take advantage of the approaches and perspectives of appropriate algorithms. Therefore, according to the importance of the subject, in this article, we intend to investigate the different dimensions of algorithmic perspectives and describe the common operational and practical classifications of important algorithms in computer science and related technology-oriented fields.

Data Mining, Applications, Requirements, Process and Tools

Data Mining, Applications, Requirements, Process and Tools

Pages 51-59

Payam Mohammadi

Abstract The emergence of data mining science has made data become one of the most valuable assets of organizations and with the correct use of this trump card, software systems can produce results in a different and effective way. The process of extracting and discovering patterns and correlations from a large volume of raw data from one or more databases is called data mining. Data mining is an important and fundamental part in the analysis of distributed information of today's organizations. The data obtained from data mining can be used in business intelligence and advanced analysis. Increasing capacity, finding hidden patterns, trends and correlations in data sets is one of the main advantages of data mining tools. Due to the evolution of data storage technology and the growth of big data, the use of data mining techniques has increased dramatically in the last two decades. Using the best data mining tools helps businesses to make decisions and implement knowledge-based processes more efficiently by identifying hidden relationships and patterns in the data. Despite the technology constantly evolving to handle large-scale data, leaders still face challenges around scalability and automation. According to the importance of the topic in this article, we are going to examine the applications of data mining, requirements, process and important tools in this field. In the end, we will examine the technological perspective of data mining.