The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rising complexity of embedded control systems and their increasing application to automate safety-critical or mission-critical tasks present a challenge for established development methodologies and tools. Are they able to handle the growing system complexity without compromising either system efficiency or its correctness? This challenge is addressed by the "correctness by construction"...
Traditional lighting is focused on the prevention of hardware failures. With the trend towards controlled and connected systems, other components will start playing an equal role in the reliability of it. Here reliability need to be replaced by availability and other modelling approaches are to be taken into account. System prognostics and health management is the next step to service the connected...
Wideband spectrum sensing is a significant challenge in cognitive radios (CRs) due to requiring very high-speed analog-to-digital converters (ADCs), operating at or above the Nyquist rate. Here, we propose a very low-complexity zero-block detection scheme that can detect a large fraction of spectrum holes from the sub-Nyquist samples, even when the undersampling ratio is very small. The scheme is...
The expected lifetime of any wireless sensor network is a critical issue as sensor nodes are powered by small batteries. One effective approach for energy conservation, especially in high density networks, consists on switching alternatively nodes in sleep/active modes, while ensuring at the same time continuous monitoring (i.e., coverage and connectivity). In this paper we propose a novel approach...
In this paper we apply approximate and multiscale entropy metrics to spectrum occupancy data gathered during an extensive measurement campaign. We show that the presented methods can be successfully applied to search for and quantify structures of highly varying complexities and time scales. Although structures can be found they are unfortunately relatively complex and it does not appear to be easy...
As semiconductor technology moves closer to the ultimate physical limits for scaling of devices that utilize electrons as information bearing particles, many new opportunities for research in the physical sciences are emerging. If we look beyond the limits of scaling electron devices, many more challenging research opportunities exist in the areas of physics of information carriers and physics of...
Multi-core SoC created great opportunities to increase overall system performance while keeping the power in check but also created many design challenges that designers must now overcome. The challenge of doubling performance every two years used to drive superscalar design with more functional units running concurrently or deeper pipeline racing for highest frequency at the cost of higher power...
Chang detection is one of the most important research issues in the field of video processing. This paper presents an adaptive method of objects and shadows detection in video streams based on the HSI color space. Bi-models of background is set up via the minimum, the maximum and the largest interframe absolute difference of per static pixel, which are adaptively updated by synthesizing pixel level,...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
In this paper, we propose a cognitive radio-based multi-user resource allocation framework for mobile ad hoc networks using multi-carrier DS CDMA modulation over a frequency-selective fading channel. In particular, given pre-existing communications in the spectrum where the system is operating, in addition to potential narrow-band interference, a channel sensing and estimation mechanism is provided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.