The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Different approaches for implementing a complex multiplier in pipelined FFT are considered and implemented to find an efficient one in this paper. The design is implemented in VHDL and design is synthesized on FPGA to know the performance. The design is implemented with a focus of reducing the resources used. Some approaches resulted in the reduced number of DSP blocks and others resulted in reduced...
Local and global process fluctuations causes increase in threshold voltage (V,) variation in ultra-short channel devices like CMOS. Therefore, it is not possible to operate the CMOS based 6-Transistor (6T) SRAM cell bellow 600 mV. Hence, to mitigate the effect of process fluctuations a CNFET based 8T SRAM cell is proposed in this article. Different design metrics of an SRAM cell are accessed for the...
It is crucial to guarantee content integrity in Named Data Networking(NDN), where copies of the contents are distributed over the network. NDN adopts digital signatures, and contents are verified whenever they are stored in caches. However, the current scheme is not practical in practice since its operations incur too much overhead. In this paper, we suggest a simple but effective solution for content...
One of the most important technical problems in store-carry-forward routing is to reduce the number of message copies in networks without increasing the message delivery delay. In order to solve this problem, we focus on utility-based routing schemes, where for a message, utility of a node indicates its proximity to the destination node of the message. Utility-based routing schemes are promising when...
The breach of privacy in encrypted instant messenger (IM) service is a serious threat to user anonymity. Performance of previous de-anonymization strategies was limited to 65%. We perform network de-anonymization by taking advantage of the cause-effect relationship between sent and received packet streams and demonstrate this approach on a data set of Yahoo! IM service traffic traces. An investigation...
This paper presents a signal processing technique for segmenting short speech utterances into unvoiced and voiced sections and identifying points where the spectrum becomes steady. The segmentation process is part of a system for deriving musculoskeletal articulation data from disordered utterances, in order to provide training feedback. The functioning of the signal processing technique has been...
A new group delay representation, which yields value zero for periodic signals irrespective to the initial phase and the relative level of each harmonic component. This new group delay representation provides a unified basis for defining "aperiodicity" in speech sounds. For example, the periodic to noise ratio or harmonic to noise ratio is directly derived from the deviation of this group...
Business processes or workflows are often used to model enterprise applications. In the supporting platform for running enterprise applications, authorization policies, such as temporal constraints and role constraints, are often deployed. This paper presents the methods to analyze the impact of authorization policies on the execution of stochastic workflows. Further, we propose a novel authorization...
Last-Level Cache (LLC) plays an important role in Chip Multi-Processor (CMP). The objective of this work is to optimize the structure and management strategy of LLC. Based on 8-core CMP, a LLC structure based on grouped cores is proposed, where 8 cores are divided into 4 groups. All LLC resources are classified into three types, which are fixed private cache, dynamic private cache and dynamic shared...
In this paper, a new four moduli set {2n/2 ± 1, 22n+1,2n + 1} is proposed together with a two level Chinese Remainder Theorem (CRT) based reverse converter for efficient residue number system arithmetic. The CRT is simplified to obtain a converter that is cheaper and faster than the best known state of the art converters. Experimental results obtained from FPGA implementation suggest that on average,...
To upgrade the systems or fix the security issues, some physical machines (PMs) in data centers are required to undergo a maintenance process, which might disable the continuous services of the virtual machines (VMs) run on them for a few time slots. To reduce the waiting delay, one may migrate the VMs to other active PMs. However, it will incur extra migration cost, e.g., bandwidth or memory used...
Complex arithmetic operations are widely used in Digital Signal Processing (DSP) applications. Keeping the intermediate results in a redundant representation (e.g. carry-save) is a common technique to speed up chained arithmetic operations due to the elimination of the intermediate parallel additions which occupy significant area and largely increase the overall critical delay. Thus, arithmetic units...
With the acceleration of mobile applications, mobile cloud computing is envisioned to be the best fit solution to make a compromise between users' and service providers' benefits. An extension of mobile cloud computing, vehicular cloud computing, provides another viable solution, by consolidating the benefits of mobile cloud computing and vehicular communications. Among several challenges in this...
Energy consumption for Cloud providers and data centers is a major problem. Dynamic Power Management is a common solution to this problem, switching off and on idle servers as needed. However, failing to predict the impact of switching costs may adversely affect energy and/or SLA violations. This paper contributes a policy that adaptively decides when to switch servers on and off under a workload...
Communication networks are linked to and influenced by human interactions. Socially-aware systems should integrate these complex relationship patterns in the network design. This paper studies the impact of friendship and antagonistic relationships between individuals on optimal network propagation policies. We develop a network propagation model for signed networks, and determine the optimal policies...
Cloud service based on data center (DC) has become an attractive choice for abundant applications. Generally, DCs are distributed at different nodes across a given optical network, and users access DCs through predefined routes. From the perspective of service providers, it is important to offer reliable cloud service while taking service delay and service cost into consideration. In this paper, we...
Data Center Network (DCN) is the supporting platform for various applications in cloud services. As optical switch offers high bandwidth, low latency and reduced energy consumption, it becomes a promising switching solution for scalable DCN. Recently, a new DCN architecture with distributed component sets (racks and optical core switches) in a given optical network has been proposed to simplify the...
Due to the rapidly time-varying nature of wireless channels, it is not possible to obtain accurate instantaneous channel state information (CSI). However, predicting and obtaining the velocity of the moving terminals is not difficult, where the velocity (mobility) can be considered as a large scale metric. A new concept called mobility adaptation is proposed for OFDM systems under rapidly time-varying...
The packet queue management mechanism deployed on network intermediate device is an important means to prevent congestion. Existing queuing algorithms still need to be improved in control effect, response speed and stability, etc. In this paper, we present an adaptive active queue management algorithm GRPID based on classic PID controller, and incorporate the advantages of RBF neural network then...
The development of the sensor networks has enabled increasing commercial or scientific applications in which data are available as streams. And sometimes the core security requirement of streaming data in WSNs is integrity rather than confidentiality. Former stream authentication schemes based on watermarking usually suffer from the vulnerability of grouping. This paper proposed a novel integrity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.