The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fog computing is a promising technology that enables users to perform time-sensitive IoT analytics at locations near the clients. Recent studies have shown the improved delivery performance of fog networks by comparing them with traditional cloud-based architectures. In this paper, we focus on further improving the delivery performance of a fog network. We first show that the performance of fog networks...
This paper aimed to improve MIMO detector's performance in both throughput and cost. Thus, it presents a FPGA architecture implementation for the SQRD detection in a 4 × 4 16-QAM MIMO wireless communication systems. The exploitation of fine-grained parallelism and coarse-grained parallelism strategies are responsible for bettering the performance of the implementation. Besides, this paper proposes...
This paper introduces the Cloud-based Radio Access Network (C-RAN) architecture into heterogeneous network (HetNet), in which distributed antennas are connected to a cloud-based baseband processing unit through optical fibers. Among various opportunities realized by this architecture, our focus in this paper is on the spectral efficiency (SE) advantages achieved by cooperative transmission and its...
This paper demonstrates HOPE, an efficient and effective database partitioning system that is designed for OLTP workloads. HOPE is built on top of a novel tuple-group based database partitioning model, which is able to minimize the number of distributed transactions as well as the extent of partition and workload skews during the workload execution. HOPE conducts the partitioning in an iterative manner...
To meet the evolving data rate requirements of emerging wireless communication technologies, many parallel architectures have been proposed to implement high throughput turbo decoders. However, concurrent memory reading/writing in parallel turbo decoding architectures leads to severe memory conflict problem, which has become a major bottleneck for high throughput turbo decoders. In this paper, we...
A nationwide interoperable public safety broadband network is being planned by the United States government. The network will be based on long term evolution (LTE) standards and use recently designated spectrum in the 700 MHz band. The public safety network has different objectives and traffic patterns than commercial wireless networks. In particular, the public safety network puts more emphasis on...
Parallel architecture is required for high throughput turbo decoder to meet the data rate requirements of the emerging wireless communication systems. However, due to the severe memory conflict problem caused by parallel architectures, the interleaver design has become a major challenge that limits the achievable throughput. Moreover, the high complexity of the interleaver algorithm makes the parallel...
Radio spectrum resources are becoming scarce with the increasing demand for multiple users wireless services. Hence, it is an important problem to increase the system potential capacity and coverage for wireless system in future. This paper aims at proposing a relay algorithm based on power control and SINR evaluation for two-hop OFDM cellular networks with fixed relay stations. This algorithm improves...
The NIST SHA-3 competition aims to select a new secure hash standard. Hardware implementation quality is an important factor in evaluating the SHA-3 finalists. However, a comprehensive methodology to benchmark five final round SHA-3 candidates in ASIC is challenging. Many factors need to be considered, including application scenarios, target technologies and optimization goals. This work describes...
This article describes the iSCSI out-of-band storage virtualization design and implementation process. The out-of-band virtualization storage technology in this paper is established based on the iSCSI protocol, the communication between the initiator and target devices in fully accordance with initiator and target model defined in iSCSI Specifications, but made a change on the flow to meet the storage...
In this study, to deal with mixed uni- and multicast traffic, we propose an efficient buffered crossbar switching architecture called MQ-SCPX switch. Based on a guess to the load share percentage of the mixed uni- and multicast traffic, the need of buffering resource for unicast traffic might be lower, while the multicast traffic becomes more. The MQ-SCPX switch is separated into one unicast section...
This paper presents a floating-point fused multiply-add (FMA) unit with low-cost and low power techniques. To improve the performance, two single-precision operations can be performed concurrently with one double-precision datapath, which is very useful in multimedia and even scientific applications. Moreover, to reduce the additional area costs for supporting two single-precision operations in parallel,...
Turbo codes are widely used in many radio systems due to its superior performance and Software Radio (SR) is an emerging paradigm of the wireless communication system design due to its good flexibility and adaptability. However, since turbo decoding is computationally intensive, the SR implementation of turbo decoding is always challenging. In this paper, an efficient software implementation of the...
Benefit from the novel compute unified device architecture (CUDA) introduced by NVIDIA, graphics processing unit (GPU) turns out to be a promising solution for cryptography applications. In this paper we present an efficient implementation for MD5-RC4 encryption using NVIDIA GPU with novel CUDA programming framework. The MD5-RC4 encryption algorithm was implemented on NVIDIA GeForce 9800GTX GPU. The...
In this paper, we propose a high-speed parallel GF(2128) bit multiplier for Ghash function in conjunction with its FPGA implementation. Through the use of Verilog the designs are evaluated by using Xilinx Vertax5 with 65 nm technic and 30,000 logic cells. The highest throughput of 30.764 Gpbs can be achieved on Virtex5 with the consumption of 8864 slices LUT. The proposed design of the multiplier...
SMS4 is a 128-bit block cipher used in the WAPI standard for protecting data packets in WLAN. In this paper, various S-box circuit architectures were evaluated firstly and the twisted BDD with m=4 was proved as the fastest one. A fast SMS4 cipher VLSI implementation was completed based on the twisted BDD S-box architecture, and achieved over 200 MHz and 100 MHz maximal frequency on SMIC 0.18 mum and...
Ubiquitous computing involves large number of devices which are connected via networks. This requires packet processing service to guarantee privacy, security, and high quality. We study to provide ubiquitous computing with stable and satisfied services through improving packet processing performance. Since the applications become more and more complicated, the task allocation among multi-cores for...
This paper presents a high speed Radix-8 Log-MAP turbo decoder recursion architecture: algorithmic approximation and architectural optimization are incorporated in the proposed designs to reduce the critical path. The synthesis results show that the proposed design has a high throughput of 693 Mbps in 0.18 um CMOS technology, which is nearly 3 times higher than using conventional Radix-2 architecture...
Grid over OBS/GMPLS is successfully demonstrated and a self-organized resource discovery and management scheme is proposed for consumer Grid. High-speed TCPs for Grid are experimentally compared.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.