The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing represents a paradigm shift in provisioning on-demand computational resources underpinned by data center infrastructure, which now constitutes 1.5% of worldwide energy consumption. Such consumption is not merely limited to operating IT devices, but encompasses cooling systems representing 40% total data center energy usage. Given the substantive complexity and heterogeneity of data...
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
Multi Level Cell (MLC) Spin Transfer Torque RAM (STT-RAM) provides higher density than Single Level Cell (SLC) STT-RAM by storing two digital bits in a single cell, and is proposed as a promising candidate for on-chip cache. However, MLC STT-RAM suffers from high write energy. We observe that general encoding methods, which map the frequent data patterns to the energy-efficient resistance states,...
Resistive Random Access Memory (RRAM) technology is proposed as a promising replacement candidate for DRAM-based main memory due to its good scalability, low standby power, and non-volatility. The structure of Triple-Level Cell (TLC) can offer higher data density over Single-Level Cell (SLC). However, TLC RRAM suffers from high write energy and latency. Data compression techniques can reduce the size...
A compact dual-band spiral antenna is proposed for on-body applications in this paper, operating at 402 MHz Medical Device Radiocommunications Service (MedRadio) band and 2.45 GHz Industrial, Scientific, and Medical (ISM) band. Initially, a spiral-shaped dipole is adopted to form a miniaturized wearable antenna resonant at 402 MHz to communicate with implanted devices. In addition, four rectangular...
This paper proposed a miniaturized wideband implantable antenna operating at MedRadio band for Medical Body Area Network (MBAN) devices. The operating frequency of the proposed antenna covers from 334 to 441 MHz for the simulated result, which is robust enough to withstand the frequency shift brought by different human beings. The footprint of the designed antenna covers a planar area of only 14 mm...
A compact, low-cost, dual-band circularly polarized (CP) microstrip antenna with single-feed operating at both 1555 MHz and 2500 MHz bands is designed in this paper. The circular patch of the antenna is slotted with four complementary spiral grooves for dual-band radiation. The bandwidths of |S11|<−10dB of the antenna are 42 MHz centered at 1555 MHz and 25 MHz centered at 2500 MHz, respectively...
Flow cytometer plays an important role in cell sorting and analysis. Traditional flow cytometers adopt hydrodynamic focusing method which works well when the low flow velocity is relatively low. However, in order to have a higher analysis efficiency for clinical laboratories, a higher flow velocity is preferred, which sometimes will lead to cells siltation when using sheath flow. In this paper, an...
When a device on network communicates with copious other devices during a time window, this device is called a super point. Super points play important roles in network because they are usually servers, hosts running P2P applications, worms, DDos victims. Super points may change with the time. How to locating these super points from core network efficiently is a hard task. This paper proposed an algorithm...
This paper presents a method to determine continuous aperture sources or efficient arrays to accurately produce Laguerre-Gaussian (LG) modes traveling towards a target. The method is based on numerical filtering that solves an inverse source problem. The resulting continuous source distribution is then discretized into a minimized equivalent array by constructing a generalized Gaussian quadrature...
This paper studies the degrees of freedom (DOF) of a line-of-sight communication system employing OAM-based orthogonal multiplexing. Analytical expressions of the DOF number are obtained with or without the requirement of OAM-carrying waves. It is found that the DOF number of an OAM-based system strongly depends on the relative sizes between the transmitter and the receiver. It is also found that...
Predictive analytics and data fusion techniques are being regularly used for analysis in Quantitative Risk Management (QRM). The primary risk metric of interest, Value-at-Risk (VaR), has always been difficult to robustly estimate for different data types. The classical Monte Carlo simulation (MCS) approach (denoted henceforth as classical approach) assumes the independence of loss severity and loss...
Wireless surveillance is becoming increasingly important to protect the public security by legitimately eavesdropping suspicious wireless communications. This paper studies the wireless surveillance of a two-hop suspicious communication link by a half-duplex legitimate monitor. By exploring the suspicious link's two-hop nature, the monitor can adaptively choose among the following three eavesdropping...
With the gradual development of procurement and supply of power metering devices, competition is fierce, in considering the service foremost, how to reduce the cost of stock has become the focus of attention. In order to overcome the volatility and uncertainty of demand, Grid companies often set up safety stock to ensure the supply resulting in high security stock. Based on the research results of...
In this paper, we study the purchasing strategy problem when the suppliers' reliability is uncertain. This problem is derived from the real world situation in the power metering device industry. Besides the price and product category each supplier can provide, the purchasing strategy is also influenced by other intangible impacts, i.e. wild fluctuations of suppliers' reliability and lead time can...
The expansion of the Internet of Things (IoT) has resulted in a complex cyber-physical system of systems that is continually evolving. With ever more complex systems being developed and changed there has been an increasing reliance on simulation as a vital part of the design process. There is also a growing need for simulation integration and co-simulation in order to analyse the complex interactions...
Merging Mobile Edge Computing (MEC), which is an emerging paradigm to meet the increasing computation demands from mobile devices, with the dense deployment of Base Stations (BSs), is foreseen as a key step towards the next generation mobile networks. However, new challenges arise for designing energy efficient networks since radio access resources and computing resources of BSs have to be jointly...
Merging mobile edge computing with the dense deployment of small cell base stations promises enormous benefits such as a real proximity, ultra-low latency access to cloud functionalities. However, the envisioned integration creates many new challenges and one of the most significant is mobility management, which is becoming a key bottleneck to the overall system performance. Simply applying existing...
Integrating mobile-edge computing (MEC) and wireless power transfer (WPT) is a promising technique in the Internet of Things (IoT) era. It can provide massive low-power mobile devices with enhanced computation capability and sustainable energy supply. In this paper, we consider a wireless powered multiuser MEC system, where a multi-antenna access point (AP) (integrated with an MEC server) broadcasts...
Mobile applications have gained rising popularity due to the advantages in mobile technologies. Furthermore, the appearance of tablets and mobile devices with other forms has increased the diversity of apps. These phenomena have resulted in a growing need of app developers to understand usage behaviors of mobile apps. Previous studies in this area mostly rely on instrumented devices so that the scope...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.