The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the structure and main components of the digital radio receiving center in terms of reliability of hardware and software for digital signal processing. We talk about the methods of development, improvement and empowerment of testing tools and diagnostics hardware and software of the radio receiver center. The article presents the basic methods of testing and diagnostics...
Several streaming applications in the field of high performance computing are obtaining significant speedups in execution time by leveraging the raw compute power offered by modern GPGPUs. This raw compute power, coupled with the high network throughput offered by high performance interconnects such as InfiniBand (IB) are allowing streaming applications to scale to rapidly. A frequently used operation...
In wired data transfer network, Transmission Control Protocol (TCP) is widely used to ensure the reliability of transmission. But the protocol requires much CPU resource and has a low transmission efficiency [1]. TCP uses retransmission when time out and data acknowledge mechanism to achieve the ability of reliable transmission [2]. Data receiver must acknowledge data frames with acknowledgement (ACK)...
The Costas loop is the most common carrier synchronization structure in receiver using BPSK modulation. Reliable detection of carrier lock condition is important to the BPSK receiver. In this paper, an improved lock detection algorithm for Costas loop is proposed. First, the mathematical model and the hardware structure of the algorithm are proposed, and then theoretical derivation is given. Through...
In this paper, we propose an approach for detecting primary user emulation attacks in cognitive radio networks. Cognitive radios (CRs) have been proposed as a promising solution for improving spectrum utilization via opportunistic spectrum sharing. In a CR network environment, primary (licensed) users have priority over secondary (unlicensed) users when accessing the wireless channel. Thus, if a malicious...
Wireless sensor networks that are energy-constrained must transmit and receive data as efficiently as possible. If the transmission is delay tolerant, transferring blocks of accumulated data can be more efficient than transferring each sensed measurement as soon as it is available. This paper proposes a Block Transfer Protocol (BTP) designed for efficient and reliable transmission in wireless sensor...
TWI (Two-wire Serial Interface) bus is simple but powerful and flexible. It supports master and slave operation. The system is based on TWI, with a couple of ATmega32 as masters and a LPC2478 chip as a slave to achieve communication among nine different MCU, which greatly increase the efficiency of LPC2478 and the whole system. The communication nodes in the system can be dynamically added or removed...
Clusters featuring the InfiniBand interconnect are continuing to scale. As an example, the ??Ranger?? system at the Texas Advanced Computing Center (TACC) includes over 60,000 cores with nearly 4,000 InfiniBand ports. The latest Top500 list shows 30% of systems and over 50% of the top 100 are now using InfiniBand as the compute node interconnect. As these systems continue to scale, the Mean-Time-Between-Failure...
The current Virtual Machine (VM) live migration research mainly focuses on transferring run-time memory state of VMs, but neglects the network state. This paper designs an Efficient and Reliable VIrtual Network (ERVIN) system, which applies several techniques: Central Information management Distributed Data transmission (CIDD), layer-two network virtualization, store and replay. It guarantees that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.