The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stochastic gradient descent (SGD) is one of the most popular numerical algorithms used in machine learning and other domains. Since this is likely to continue for the foreseeable future, it is important to study techniques that can make it run fast on parallel hardware. In this paper, we provide the first analysis of a technique called BUCKWILD! that uses both asynchronous execution and low-precision...
The Asynchronous Contention Resolution Diversity Aloha with Decollision Algorithm (ACRDA-DA) medium access control (MAC) protocol for satellite uplink access is proposed in this paper. The same two or multiple replica packets from a user are transmitted in two or multiple random non-overlapping virtual slots in a virtual frame. A decollision algorithm is used to decollide up to a maximum number of...
Multilayer Clustered Designing Algorithm is exploited to present MCDA - Hot Spot algorithm; a technique to increase the network throughput by alleviating the impact of hotspot issue on network lifetime. The network nodes in the hot spot region are in a flat layer form in contrast to rest of the network nodes that are grouped into clusters. This design substantially helps in achieving goal above. This...
In this paper, we propose two different hardware structure of SHA-3 hash algorithm for different width of circuit interface. They both support the four functions SHA3-224/256/384/512 of SHA-3 algorithm. The padding unit of our design is also implemented by hardware instead of software. Besides, a 3-round-in-1 structure is proposed to speed up the throughput of our circuit. We conduct an implementation...
Interactive video streaming requires very low latency and high throughput. Traditional latency based congestion control algorithm performs poorly in fairness. This results in very poor video quality to adaptive video streaming. Software defined networks (SDN) enables us to solve the problem by designing a network controller in the routers. This paper presents a SDN-centric TCP where sending rate of...
Taking advantage of both edge cache (EC) and coordinated processing, cache-enabled cloud radio access networks (C-RANs) have shown good potential to become a solution for future wireless networks. With the demand that the network needs to be fast, green and affordable, it has become an issue both practical and challenging to design a resource allocation strategy that leads to a proper balance among...
Current networks are changing very fast. Network administrators need more flexible and powerful tools to be able to support new protocols or services very fast. The P4 language provides new level of abstraction for flexible packet processing. Therefore, we have designed new architecture for memory efficient mapping of P4 match/action tables to FPGA. The architecture is based on DCFL algorithm and...
In a cloud data center, it is common for a storage system to be shared by front-end, user-interacting applications and back-end, data-intensive applications running on different virtual machines (VMs). Although it is necessary to meet the latency requirements of I/O streams generated by the VMs that execute the front-end applications, this can be difficult because: (1) often their latency requirements...
Negotiating service level agreements (SLAs) between cloud consumers and service providers is a key aspect of highly automated cloud systems. However, this process needs to be optimized to reduce the time of negotiation and the quality of solutions. In this paper, a parallel implementation of the particle swarm optimization (PSO) technique is proposed to improve the SLA negotiation in cloud computing...
Low-level design parameters such as router micro-architecture (RMA), flow controls (resource allocation), routing techniques and traffic patterns have a major significance on cost and performance of Network on Chip (NOC) design. This work proposes an efficient virtual channel (VC) buffer management structure and a dynamic VC allocation mechanism for the router to minimize latency, and area (buffer...
Hash functions represent a fundamental building block of many network security protocols. The SHA-3 hashing algorithm is the most recently developed hash function, and the most secure. Implementation of the SHA-3 hashing algorithm in Hardware Description Language (HDL) is time demanding and tedious to debug. On the other hand, High-Level Synthesis (HLS) tools offer potential solutions to the hardware...
In the ultra dense network (UDN), user-centric virtual cell (VC) has been proposed to weaken the traditional concept of base station centric cell, where each user is served by several transmit points (TPs). The overlapped VCs in UDN will result in severe inter-VC interference and degrade the system throughput. Merging overlapped VCs can transform the serious inter-VC interference into intra-VC interference,...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
It will cause the loss of information in the distributed satellite networks, if the network node is failure. For this problem, a method for distributed satellite networks based on standby nodes is presented in this paper. Firstly, it can establish a main path and confirm main nodes according to max-throughput principle in this method. Secondly, it can establish standby nodes set for the main path...
We propose an optimal Physical Layer Convergence Procedure Protocol Data Unit (PPDU) duration algorithm that divides a long data stream into two portions among consecutive groups based on the average PPDU duration of the Very High Throughput (VHT) group. The proposed solution considers all Wireless Local Area Network (WLAN) parameters and satisfies requirements of the VHT Multi-User Multiple Input...
Using a new input restructuring sequence and an appropriate reordering of the elements involved, a new VLSI algorithm that uses short length pseudo-cycle convolution structures for the VLSI implementation of discrete sine transform is presented. It uses a new parallel decomposition of discrete sine transform (DST) that leads to a high throughput VLSI implementation with a low hardware cost. The proposed...
Due to the lack of criterion on the efficiency of UHF RFID systems in dense environment, this paper shows a novel test method for UHF EPC C1 G2 RFID readers in a dense environment. A new parameter based on identification rate that describes the performance of readers working in dense environment is demonstrated and a new test method to generate this parameter is given. Experiment show that this test...
QoS provisioning for Audio-Video traffic in WLANs respecting different priorities was one of the reasons for introduction of the intra-AC prioritization service in the IEEE 802.11aa amendment. However, observations show that as the service is realized by each node independently, with worsening of transmission conditions both types of Video traffic are corrupted. To overcome this issue, basing on two...
In the big data era, the distributed file system is getting more and more significant due to the characteristics of its scale-out capability, high availability, and high performance. Different distributed file systems may have different design goals. For example, some of them are designed to have good performance for small file operations, such as GlusterFS, while some of them are designed for large...
This paper proposes the implementation of the Advance Encryption Standard (AES) algorithm on Apple iPhone7. We extend the standard AES-128 algorithm to support the block size of 512 bits (AES-512). There are 4 steps in the encryption process: SubBytes, ShiftRows, MixColumns and Add-round key. The comparison between original AES-128 and the new AES-512 using 128, 192, 256, 512, 102 4 bits key size...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.