The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
Automation of modern industrial plants require real-time tracking of object locations and sensing of local and ambient parameters for variety of applications such as counting and tracking of objects in assembly line, detection and positioning of failures of machines etc. Mostly, discrete Real Time Location System (RTLS) performs object tracking in existing industrial automation without its integration...
Electromagnetic Wireless Nano Sensor Networks (EM-WNSNs) with molecule-level sensing capacity benefit a wide range of applications that demand high resolution. To accommodate the potentially high data volume, small antenna size, and limited energy capacity, the high-speed TeraHertz (THz) pulses sparsely distributed over time are adopted for communications among nano devices. For EM-WNSNs connected...
The fifth generation (5G) ultra dense network (UDN) is envisioned as a very dense deployment of low power base stations where heterogeneous radio access technologies are used to satisfy the data rate demand of users employing both licensed and unlicensed spectrum. In UDN scenario, conditions of the channels operating in licensed band may exhibit intermittent characteristics due to the varying level...
This paper presents a time-delay system which originally has chaotic behavior, yet lost that dynamic due to finite quantization levels of state variable representation. One method to overcome this destructive effect of digitalization is engaging a time-varying delay amount which is studied in this paper. Based on this system, random number generator (RNG) topologies are demonstrated with better throughput...
A deep learning processor with 8 gated recurrent neural network (RNN) accelerators is proposed in this paper. It features on-chip incremental learning by numerical and local gradient computation enhancement. Extra precision of training is obtained without extending the bit-width. Tri-mode weight access (DMA/FIFO/RAM) improves the throughput during incremental learning. The number multipliers and activation...
The paper presents a method of monitoring the basic parameters of cognitive mobile ad hoc network (MANET) with opportunistic access to the spectrum. The collected parameters are based on metrics from different communications layers, combined into single utility function, being a global indicator of the network health. The proposed method was tested and validated using a real time cognitive radio network...
This paper reviews existing reset schemes for the Muller C-element, one of the main primitives in asynchronous paradigms. Using a mathematical-based method and with the help of pass-transistor logic, an efficient implementation is developed that yields better performance. Simulations with a standard IBM 130-nm CMOS process, confirm that the proposed design achieves substantial improvement over existing...
In this paper, cognitive machine to machine (CM2M) gateway in e-healthcare systems are presented by accessing several channels via periodic sensing and spectrum handoff. An optimal energy efficient spectrum management mechanism with multiple thresholds is proposed. The developed mechanism aims to reduce energy consumption in the system by optimizing the spectrum sensing and channel switching, while...
Multimedia streaming is a significant source of Internet traffic, with Netflix and YouTube accounting for more than 50% of North American fixed network peak download traffic in 2016. Dynamic Adaptive Streaming over HTTP (DASH) is a recent standard for live and on-demand video streaming services, where clients adapt the video quality on-the-fly to match the network capacity by requesting multi-rate...
Datacenters should provide bandwidth guarantees to tenants for performance predictability. Ideally, this process should attain three important characteristics: work conservation, fairness, and simplicity. The first one indicates that tenants can utilize unused bandwidths effectively without harming the bandwidth guarantee. The second one means that tenants share the unused bandwidth following a certain...
Wi-Fi and Cellular are the leading technologies in IoT revolution and Machine Type Communication is going to increase by 2020 due to revolution of technology and smart connected world. Most of the IoT application will not require high throughput, hence dual band wireless stations and softAP solutions are more suitable for IoT platforms.
This paper develops a control scheme for the multi-gated perimeter traffic flow control problem of urban road networks. The proposed scheme determines optimally distributed input flows (or feasible entrance link green times) for a number of gates located at the periphery of a protected network area. A macroscopic model is employed to describe the traffic dynamics of the protected network. To describe...
Many scientific applications rely on evaluation of elementary functions. Nowadays, high-level programming languages provide their own elementary function libraries in software by using lookup table and/or polynomial approximation. However, one downside is slow since lookup tables could keep cache thrashing and polynomial approximations require a number of iterations to converge. Thus, elementary functions...
Advances in mobile Internet technology have enabled the clients of Web services to be able to adjust to context changes, which need to rely on monitoring to QoS of Web services. Most contemporary QoS prediction methods exploit the QoS characteristics for one specific dimension, e.g., time or location, and do not exploit the complicated relations among multi-dimension of context. This paper proposes...
This paper develops a control framework for a network of energy harvesting nodes connected to a Base Station (BS) over a multiple access channel. Due to fluctuations in energy availability and, possibly, energy outages, the number of nodes attempting channel access is random and varies over time. Thus, each node must carefully adapt its access probability to the network state to optimize network performance...
This paper presents an ultra-high-speed/area-efficient Polar encoder design with very high system throughput for emerging next-generation 5G applications. In a demonstrated design example, the proposed hardware architecture is mainly based on 16-parallel radix-2 processing engines. An 8192-point Polar encoder is designed and synthesized with TSMC 40-nm CMOS technology, operating at clock frequency...
Although there are models and prototype implementations for controlling resource use in Actor systems, they are difficult to implement for production implementations of Actors such as Akka. This is because the messaging and scheduling infrastructures of runtime systems are increasingly complex and significantly different from one system to another. This paper presents our efforts in implementing resource...
Text analytics has become increasingly important in the past few years because of the substantial growth in the amount of research, business, and government needs. An efficient text analytics system is likely to require high-powered regular expression matching (REGEX), as REGEX operations dominate the whole execution time. Some approaches have exploited the parallelism of graphic processing units...
CBC mode of 3DES encryption has a wider application and higher security than ECB mode. However, there is a bottleneck of 3DES with CBC mode due to an inherent feedback loop from output to input. In this paper, we propose a method to move XOR gates out of the critical path where two XORs in the junction between two adjacent rounds can be merged into a new XOR gate which then can be absorbed into the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.