The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a proof-of-concept for an hydro acoustic fish-tag position estimation and tracking system. In our field-tested concept, a formation of Unmanned Surface Vehicles (USV) creates a mobile array of low-cost hydro acoustic fish-tag receivers. The array of receivers is able to estimate fish-tag locations and follow the fish on open waters, significantly increasing capabilities as...
With Network Function Virtualization (NFV) generating significant interest in the network operator community, many network functions, including the LTE EPC, are being built as virtualized software appliances running on commodity hardware, as opposed to custom hardware. To provide fault tolerance and scalable performance, the virtualized network functions are typically built in a clustered architecture,...
Recently, applying the multimedia wireless sensor networks and computer vision techniques in the outdoor agriculture field can be observed. Since the performance of such techniques is limited by the low data rate of the wireless sensor network, the transmission using the wider bandwidth is one of the possible solutions. This paper proposes the technique to develop the wide-band channel sounder for...
Structured lighting is a computer vision technique that projects illumination patterns onto the scene to facilitate feature extraction from the captured images. The use of lowcost cameras is avoided not only due to their low image quality but mostly due to the lack of a synchronization mechanism for the illuminators. In this paper we propose a method to synchronize low-cost cameras and illuminators...
Current handhelds incorporate a variety of acceler-ators/IPs for improving their performance and energy efficiency. While these IPs are extremely useful for accelerating parts of a computation, the CPU still expends a significant amount of time and energy in the overall execution. Coarse grain customized hardware of Android APIs and methods, though widely useful, is also not an option due to the high...
Some approaches and techniques that allow conducting of complex physiological research using closed-architecture measurement systems of different manufacturers are discussed. The experience in developing a system with flexible configuration and in solving arising problems by virtue of integration of equipment using an external synchronizing device, is described. Parallels are drawn with the modern...
Emerging protocols for low-power wireless networks increasingly exploit constructive interference and the capture effect. The basic idea is that the synchronous transmission of identical packets by neighboring nodes leads to constructive interference - or at least do not cause destructive interference. This requires that the temporal displacement of packets at receiving nodes is lower than 0.5 μs...
While in waterfall-like processes changes are expected to happen mostly after the main development has finished, agile approaches have incorporated response to changes into the main development itself, which raises the importance of the ability to respond to changes effectively to a sine qua non. Changes are specified from the perspective of how users actually use systems, i.e., usage scenarios, which...
Due to the rapidly increasing use of big data, machines are stressed to provide more computing power at higher energy efficiency while maintaining simpler and more scalable computing paradigms. Transactional Memory (TM) is one such technique that can be used for synchronization instead of conventional locks used in critical sections since it has simpler paradigms, is scalable and has better energy...
This paper proposes a novel hybrid transactional memory scheme based on both abort prediction and an adaptive retry policy. First, the proposed scheme can predict not only conflicts between transactions running concurrently, but also the capacity and other aborts of transactions by collecting the information of previously executed transactions. Second, the proposed scheme can provide an adaptive retry...
Problem of telemetry and telecontrol data transmission systems noise immunity at endpoints implementing in the Internet of Things technology is considered. A method of improving streaming data encryption in open communication channels was proposed. The dynamic change of crypto key using non-linear feedback in shift register data and quasi-periodic reconfigure of the encoder / decoder device in data...
Time synchronization, aiming to provide a common timescale among distributed sensor nodes, is a key enabling technology for many applications, such as collaborative condition monitoring and localization detection. Due to the complexity of time synchronization in wireless sensor networks, the Discrete Event Simulator is recommended to adopt resulting from the feature that the behavior of a complex...
In this paper, we confirmed the effectiveness of three or more PCs in high speed sensor network system using PTP. The purpose is to verify whether data can be acquired simultaneously using each lacal synchronized the time of different by PTP. The accuracy of time synchronization was expected to be worse than directly connected PC, but the error fell within the tolerance.
In the open source community such as GitHub, developers usually need to find projects similar to their work, with the aim to reuse their functions and explore ideas of features that could be possibly added into their project at hand. Traditional text search engine can help detect similar resources. However, it is difficult for developers to use in open source community because a few query words cannot...
A central processing unit (CPU) and peripheral devices are discussed for which all data processing and data transfer is uniquely time tagged using a timestamp generated by the embedded processing system master clock. The Time Aware Processor (TAP) introduces time into the processor computing language to relate data to temporal events, including the processors own internal functions.
Precision time synchronization is critical for distributed sensing, and coordinated actuation in various low-range wireless applications in Internet of Things and Robotics. The state-of-the-art time synchronization protocol however, known as Precision Time Protocol (PTP) is designed for wired networks. In this work, we make an effort to enable PTP for Low Range Wireless Personal Area Networks (LR-WPAN)...
This work in progress extends the new mechanical philosophy from science to engineering. Engineering is the practice of organising the design and construction of artifices that satisfy needs in real-world contexts. This work shows how artifices can be described in terms of their mechanisms and composed through their observable phenomena. Typically, the engineering of real system requires descriptions...
Based on a workshop developed at INICTEL-UNI, this paper presents the methodology and considerations taken to improve the experiences in communication laboratory sessions in Peruvian universities with Software Defined Radio platforms, using a HackRF-One for transmission and a RTL-SDR for reception together with GNUradio Companion, an open source software. The use of these tools allows real communications...
Transactional Memory (TM) promises both to provide a scalable mechanism for synchronization in concurrent programs, and to offer ease-of-use benefits to programmers. The most straightforward use of TM in real-world programs is in the form of Transactional Lock Elision (TLE). In TLE, critical sections are attempted as transactions, with a fall-back to a lock if conflicts manifest. Thus TLE expects...
The first release of hardware transactional memory (HTM) as commodity processor posed the question of how to efficiently handle its best-effort nature. In this paper we present Part-HTM, a hybrid transactional memory protocol that solves the problem of transactions aborted due to the resource limitations (space/time) of current best-effort HTM. The basic idea of Part-HTM is to partition those transactions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.