The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates a specific NP-hard problem by comparing a depth-first search and a depth-first branch-and-bound algorithm as applied to network topology configuration in wireless ad hoc network planning. The vast amount of possible solutions in medium to large NP-hard problems makes algorithm methodology very important. State space algorithms are used to traverse through the solution space...
Multi-parallel architecture for MD5 (Message-Digest Algorithm 5) implemented on FPGA (Field-Programmable Gate Array) is presented in this paper. To accelerate the speed, a general architecture for Host Computer and FPGAs is proposed. The MD5 implementation is presented. Besides the internal parallelization of MD5 modules, FPGAs can be easily duplicated and connected to Ethernet LAN. The design was...
Unlike traditional routing schemes that route all traffic along a single path, multipath routing strategies split the traffic among several paths in order to ease congestion. It has been widely recognized that multipath routing can be fundamentally more efficient than the traditional approach of routing along single paths. aiming at the increasing network traffic and the deficity that the former Ant...
The growing problem of spectrum scarcity and the inefficient spectrum utilization in the licensed bands, are addressed by the emerging Cognitive Radio (CR) paradigm. It is seen that the choice of the spectrum bands, called as spectrum decision, must be organized carefully by considering the challenges in the spectrum availability over time, the short term fluctuations in the availability, and the...
This paper proposes a new double iterative procedure for sum-rate maximization in a Multiuser MIMO system (MU-MIMO). The proposed algorithm is based on joint precoder and decoder optimization involving two different decoding schemes. For that we considered a precoding algorithm namely the iterative SJNR (Signal to Jamming and Noise Ratio) precoder combined with two iterative receivers. The first receiver...
In this paper, we examine the effect of retransmission cutoff in slotted ALOHA systems employing the binary exponential backoff (BEB) algorithm, in terms of throughput and delay performance, system stability and packet dropping probability. For comparison, the performance of the BEB algorithm without retransmission cutoff is presented. We consider a finite population of users competing for channel...
The network throughput will decrease dramatically and collision rate increases severely when active nodes increase in WLAN. Breaking through the limitation of the Binary Exponential Backoff algorithms, we provide a new backoff algorithm which utilizes the linear contention window based on the node numbers. To attain better performance, we derive that the contention window is selected as an approximate...
In this paper we focus on the concept of IEEE 802.11 DCF error frame model. Based on the analysis of the model in detail, we point out the error of the simulation algorithm of the DCF error frame model in QualNet simulation environment. Furthermore, we modify the simulation algorithm in QualNet strictly according to the specifications of the DCF error frame model. The simulation results show that...
Providing guaranteed quality-of-service (QoS) for resource-hungry multimedia applications over wireless fading channels is challenging. Traditional layered architecture fails miserably in providing the QoS requirement of high throughput, low latency demand of these kinds of applications in wireless mobile networks. Cross-layer design approaches are critical for efficient utilization of the scarce...
High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their inefficient congestion avoidance algorithms. This paper identifies the reason for low throughput of a widely used protocol space...
In this paper, a very high-throughput and area efficient hardware decoder of the binary (23, 12, 7) Golay code is presented. The key feature of this proposed algorithm is fast determination of the error positions through the analysis on the weight of syndromes without large operations of finite fields. Comparing with the algorithm using one syndrome, the proposed algorithm is more suitable for the...
The ECHO hash function was developed for the NIST cryptographic SHA-3 hash function competition. To evaluate ECHO's performance, high-speed and low-cost ASIC architectures have been designed. The results show that the high-performance architecture can achieve a fastest throughput among AES-based hash function design reported to date among the SHA-3 candidates.
The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization...
Through tailoring individual core to best fit dedicated applications, heterogeneous multi-core architectures can maximise performance while mitigating area costs and power consumption. This paper introduces heterogeneous multi-core architectures using coarse-grained dynamically reconfigurable processors. The multi-core system has been tailored for the performance intensive WiMAX transmitter. An exploration...
Applications querying real time data streams in order to identify trends, patterns, or anomalies can often benefit from comparing the live stream data with archived historical stream data. This is especially true for applications involving live & unpredictable data like in traffic analysis & stock markets. However this data mining in DSMSs have turned out to be a costly proposition. In this...
This paper presents the design of an ultra high speed crypto-processor for next generation IT security. It addresses the next generation IT security requirements: the resistance against all attacks and high speed with low latency. The proposed processor is capable of generating cryptographically secured information at a rate of multi-ten Gbps. The performance of the processor is compared with that...
In this paper, we introduce new bounds on the system throughput and response time of closed, single-class BCMP queueing networks with load-dependent stations. Under the assumption that stations relative service rates are non-decreasing functions of their queue lengths, the bounds derive from the monotonicity of system throughput and queue-lengths and exploit the asymptotic equivalence that exists...
Recent advances in network coding research dramatically changed the underlying structure of optimal multicast routing algorithms and made them efficiently computable. While most such algorithm design assume a single file/layer being multicast, layered coding introduces new challenges into the paradigm due to its cumulative decoding nature. Layered coding is designed to handle heterogeneity in receiver...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.