The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart space is created by deploying a Semantic Information Broker (SIB) in a given Internet of Things (IoT) environment. The deployed SIB enables information sharing for many digital devices participating in the IoT environment. In this study, we consider CuteSIB — a new SIB implementation for the Smart-M3 platform, where the class of SIB host devices covers various embedded and mobile devices, in...
Simulation represents the major research method in all knowledge domains and a scientifically valid method of estimating the characteristics of complex systems used for decision making in different areas of engineering. The existing and projected systems can be explored effectively using mathematical models (analytical and simulation) implemented on high-performance computers, which act in this case...
Software-Defined Networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the chances of consulting the SDN controller, which is a slow process. The rules are usually cached in the forwarding plane with a Ternary Content Addressable...
Due to the fast boom of security threats in wireless sensor networks (WSNs) sensitive applications, we propose a game-theoretic protection approach for sensor nodes in a clustered WSN based on a repeated game. The proposed game model is developed for detecting malicious sensor nodes that drop the high priority packets (HPPs) aiming at maximizing the high priority data trustworthiness (HPT). Simulation...
Previous work on the Carnegie Mellon Logic Characterization Vehicle (CM-LCV) has emphasized the diagnosability properties of a specific class of regular circuits called functional unit block arrays (FUB arrays). This paper describes a multiple-defect, two-level diagnosis procedure that leverages these unique properties of the FUB array to significantly improve diagnosis. This custom diagnosis procedure...
In this paper, a cooperative device to device (D2D) communication system is studied while two transmitting devices communicate with one destination device in the presence of a passive eavesdropper. The second transmitting device cooperates with the first transmitting device and hence the transmission takes place is two phases. In the first phase, the first device transmits its signal to the second...
This paper presents a 24 GHz CMOS Colpitts-Clapp Digitally Controlled Oscillator (CC-DCO) with an automatic amplitude stabilization to improves the Phase Noise (PN) performance. Amplitude stability is favorable to suppress the amplitude-to-phase conversion. The DCO is implemented in 65 nm TSMC CMOS process. The Tuning Rang (TR) is from 22 GHz to 29 GHz that is required for a 24 GHz Short Range Radar...
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation...
Exploring the design space of the memory hierarchy requires the use of effective methodologies, tools, and models to evaluate different parameter values. Reuse distance is of one of the locality models used in the design exploration and permits analytical cache miss estimation, program characterization, and synthetic trace generation. Unfortunately, the reuse distance is limited to a single locality...
Air Data Computer (ADC) is an electronics device computes air data flight parameters. The objective of this paper is to analyze, simulate, and propose hardware implementation module for the Air Data Computer. Simulation of ADC model has been faced by two problems. The first one was to choose true values of dynamic temperature because it depends on flight altitude and airspeed. The second problem is...
The article describes the development of a system for wireless control of mechatronic objects and anthropomorphic robots. The main attention is paid to the man-machine interface on the basis of MEMS sensors. Given the structure of the developed system with a description of the main blocks. It describes the communication interfaces used. Substantiates the benefits of the proposed technical solutions.
Linear Discriminant Analysis (LDA) is a popular technique in pattern recognition. This paper presents a linear discriminant analysis for classification. Firstly, linear discriminant Analysis is introduced. The optimum design procedure is demonstrated in order to calculate the error minimization. Next, linear classifier based on desired outputs is derived to get the desired classification. Also, the...
We present an implementation in graphical processing units of a numerical algorithm for the simulation of the nonlinear propagation of pulses in optical fibers. The implementation uses NVidia's cuFFT library to perform the large number of FFTs calculations required and parallelizes all vector sums and products. We show up to 50 × speedups as compared to a single-core implementation on a PC.
The full duplex communication is a spotlighted technology as a most promising solution that can solve channel capacity problem in wireless network. In the future, the device to device(D2D) communication can be considered to reduce the load of network. Furthermore, the centralized network have advantages in collision ratio. For these reasons, we propose a novel centralized full duplex MAC protocol...
The ABET engineering criteria was first formulated and introduced to the American education system in the middle 1990s. The ABET accreditation system defines an engineering graduate according to Blooms Taxonomy. As a part of the continuing curriculum improvement at Bucknell University, a new junior-level design course has been recently introduced into the curriculum. The course title is ECEG 301:...
The Internet of Things has created an influx of data-generating devices. Applications that use these devices require the generated data to be transmitted in a timely manner. In this paper, we consider a Pull model, where remote clients will send requests to retrieve the information generated by multiple sources from the same random process. We assume that the update processes and response times of...
We present FDTD (Finite Difference Time Domain) method use for cavity microwave spherical resonator with some features that allows one to speed up the calculation and use computer memory more effective. Results of such simulation are in good agreement with theoretical prediction for the spherical resonator eigen-frequency spectrum.
Wireless sensor networks (WSNs) are currently adopted in a vast variety of domains. Due to practical energy constraints, in this field minimizing sensor energy consumption is a critical challenge. Sleep scheduling approaches give the opportunity of turning off a subset of the nodes of a network— without suspending the monitoring activities performed by the WSN—in order to save energy and increase...
Traffic offloading is an attractive solution for the operators to increase the system radio capacity in the future cellular networks. Device to Device (D2D) technology helps achieve this goal by allowing direct communication between closely located user devices. However, as D2D devices transmit on the cellular network uplink bandwidth, the communication mode selection should be properly studied in...
In the one-way quantum computation (1WQC) model, computations are done by correlated sequences of entanglement, measurement and local corrections commands. As scalable and reliable quantum computers have not been implemented yet, the only widely available tools for designing and testing quantum algorithms are quantum computation simulators. However, simulating quantum computations on a standard classical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.