The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Timeout control is a simple mechanism used when direct feedback is either impossible, unreliable, or too costly, as is often the case in distributed systems. Its effectiveness is determined by a timeout threshold parameter and our goal is to quantify the effect of this parameter on the system behavior. In this paper, we extend previous results to the case where there are N transmitting nodes making...
The effects of time delay in the continuous part of a pulse-modulated model of non-basal endocrine feedback regulation are investigated. Conditions for the existence and local orbital stability of periodical solutions with m impulses in the least period (m-cycles) are derived. Applied to the case of testosterone regulation in the human male, the model indicates that increasing time delays in the system...
Future growth of the Internet is likely to be constrained by its own energy consumption. As shown in recent studies, by adopting burst switching technologies, energy consumption of the core network could be reduced. In this study we first analyse the relationship between burst size, arrival rate, and energy consumption of a core router port in a burst switching (BS) network. A novel mechanism is then...
As the typical anomaly detection methods using statistics, entropy and based method has been researched and reported with their performance properties for anomaly attacks. In this research, we compare the time complexity of two our proposed detection method aiming to evaluate the performance of our system. Our previous researches have clarified that the source IP address and destination port...
Traditionally in routing approaches, each node allows a maximum load through the selected route. The existing routing approaches in cognitive radio networks (CRN) do not take into account spectrum trading as well as spectrum competition among licensed users (PUs). This paper introduces a novel routing algorithm that is based on spectrum trading and spectrum competition for cognitive radio networks...
This paper proposes a closed-loop frequency-based method for parametric identification of Wiener type plants with a transport delay in the linear part using a relay feedback. The method is a generalization of Ziegler Nichols' (ZN) experiment, with relay added in the control loop. It provides a simultaneous estimation of the linear plant dynamic, value of the time delay and approximate model of the...
This paper proposes a mechanism on reducing power consumption by using threshold and timer in home gateway. Traffic consists of real time and non-real time traffic. Proposed mechanism uses sleep mode, which can be extracted from the traffic with a protocol features and also takes advantage of buffer threshold mechanism and timer constraint for extending sleep mode. The extended sleep mode can save...
Demands for avionics Wavelength Division Multiplexing (WDM) network have been increasing dramatically in multicasting applications such as the in-flight multimedia in recent years. The topic of multicasting routing problem has been investigated with enthusiasm, because a proper design of routing can not only make full use of the resource, but also improve the performance of networks. However, different...
This article deals with the radiation of sound from ultrasonic transducers located on a flat surface and bounding a shear flow. The aim of the experiments is to measure time delays between flushed transducers in order to characterize flow velocity. Considering that the sound has an infinitely small wavelength, comparison between numerical (simulated using Matlab) and experimental results shows that...
The ongoing substitution of conventional power plants by renewable energy resources (RES) in Europe leads to new challenges for the operation of future power systems. Grid auxiliary services like frequency control which are traditionally provided by a few dedicated large power plants may in the future be realized by smaller generation units or loads. This paper discusses the applicability of small...
Recently, it has been studied how to reduce the probability of interception and to increase the efficient security in the wireless digital communication systems. Among the possible approaches for the information security, the chaotic signal can be used to encode information very efficiently in many ways due to the inherent characteristic of irregularity. In this paper, in noise and interference environment,...
Due to the coexistence of different generations of mobile radio technologies, more and more mobile network operators are keen on deploying multiple radio technologies on a single cell site and carry their traffic over a common transport network. This paper studies such a collocated multiradio system: collocated LTE and HSDPA. Firstly, we investigate the potential gain by using a shared transport network...
Time Reversal (TR) technique is applied to localize an UWB source inside a building or buried under rubble produced by disasters. The reversed field is calculated by the FDTD-TR method applying as boundary conditions the field measured, but reversed in time, at some observation points located on the boundary. A refinement of the estimated position of the UWB emitter is carried out by a novel method...
Cloud infrastructure providers (CIPs) usually build a large number of geo-distributed data centers to cater to the recent proliferation of Cloud Computing. The CIPs commonly use multiple internet service providers (ISPs) to interconnect their geo-distributed data centers. Diurnal patterns and leftover bandwidth were effectively exploited by past studies to improve bandwidth utilization and minimize...
The configuration of WLAN MAC by means of Super Frame (SF) and Contention Free Period (CFP) variation is one of the effective schemes to provide QoS to interactive multimedia (IMM) traffic. In this paper we investigate the usefulness of an auto-generated dynamic parameter set of CFP and SF combinations as the logical look-up table for the WLAN medium access control scheme. A modified analytical model...
In this paper, we present an arithmetic Sum-of-Product (SOP) based approach to implement an efficient Discrete Fourier Transform (DFT) as well as an FIR filter circuit. Our SOP based DFT engine uses an improved column compression algorithm, and also handles the sign of the input efficiently. The partial products of the computation are compressed down to 2 operands, which are then added using a single...
In Underwater sensor networks (UWSN), Nodes are powered by battery. So saving energy is an important factor to estimate routing protocol. In this paper, we briefly introduced the vector-Based Forwarding and proposed an energy balance method to improve the lifetime of originate VBF. We sensor the energy information of neighbor nodes and decide whether participate in transport packets according the...
In Vehicular Grid Sensor Network (VGSN), because the operation of individual vehicles and mobile speed and direction, contact between them fragile and unstable. It has multicast links suddenly fail to overcome the problems, so that the message flows to each node, and increase the volume of traffic control. In this paper, we propose a fuzzy-based target tracking scheme that will re-route the link path...
Input/Output Buffer Information Specification (IBIS) behavioral models are widely used for circuit-level signal integrity (SI) analysis due to its fast simulation speed and good accuracy. This work presents a tool to generate models of circuits specified by IBIS models. The model generation tool estimates poles, rise time and fall time of a circuit specified by IBIS models. The method consists of...
The hardware implementations of decimal arithmetic operations, which are commonly used in financial, scientific, and internet-based applications requiring accuracy and speed, become prominent. In this paper we first analyze the column sum boundaries of n-digit parallel decimal array multipliers (PDAM). A general form of the problem is formed and a heuristic solution is found with Genetic Algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.