The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Performance comparison of various Packet Scheduling (PS) algorithms such as Proportional Fair (PF), Maximum Largest Weighted Delay First (MLWDF) and Exponential/Proportional Fair (EXP/PF) has been studied in HetNets environment. The performance indicators such as throughput, Packet Loss Ratio (PLR), delay and fairness are considered to judge the performance of the scheduling algorithms. Various strategies...
In order to accelerate logic simulation, it is highly beneficial to simulate the circuit design on FPGA hardware. This is often referred to as emulation, and we use the terms simulation and emulation interchangeably in this paper. However, limited hardware on FPGAs prevents large designs from being implemented on a single FPGA. Hence there is a need to partition the design and simulate it on a multi-FPGA...
Systems with tightly interacting computational (cyber) units and physical systems are generally referred to as cyber-physical systems. They involve an interplay between embedded systems, control theory, real-time systems and software engineering. A very good example of cyber-physical systems design arises in the context of automotive architectures and software. Modern high-end cars have 50–100 processors...
Traditional G-P algorithm exist two drawbacks in solving the correlation dimension of chaotic time series. The one is the subjective existence to determine scaleless range, the other is calculation error is large when the amount of data is small. For two shortcomings, the fuzzy C-means clustering is introduced to the G-P algorithm to determine the no-scales range. Least-squares fitting method is used...
With Received Signal Strength (RSS) based indoor localization gaining popularity, recent research work has explored many different aspects of such localization systems, for instance, accuracy and deployment cost. In this paper, we study the computational cost of a ratio-based localization algorithm. Specifically, we use the algorithm's inherent distance ratio relationship to refine the physical region...
In this paper, a new recursive multibit recoding multiplication algorithm is introduced. It provides a general space-time partitioning of the multiplication problem that not only enables a drastic reduction of the number of partial products (N/r), but also eliminates the need of pre-computing odd multiples of the multiplicand in higher radix (r≥3) multiplication. Based on a mathematical proof that...
Active Queue Management (AQM) algorithm, as a typical router based congestion control strategy, has been the focus of researchers in the past few years and widely used in congestion control. There are a few drawbacks such as large queuing delay and queue jitter, which cause data retention drop and oscillation. It means that the existing AQM algorithms under high bandwidth can not meet the Quality...
Covering both theoretical and practical interest in different networks layers, multicast routing remains an important topic. In network layer, there are several multicast routing protocols using different multicast routing trees in the literature. However PIM-SM and CBT protocols remains the most used multicast routing protocols; they propose using a shared tree (ST). This kind of tree provides efficient...
In this paper, we propose the network traffic mitigation method using TCP signalling delay algorithm. By using proposed method, the TCP signalling response time is adjusted according to network traffic load status. Through the queuing analysis, we verify that the network traffic load can be mitigated.
In this paper, a waveform relaxation algorithm is presented for the efficient transient analysis of large power distribution networks. The network is modeled as an orthogonal grid of transmission lines where a delay-extraction-based macromodel is used to represent each line segment in the time domain. Novel partitioning and iterative techniques are proposed for fast convergence and improved scalability...
The key focus of our work is to analyse some jitter control algorithms. We study a jitter control algorithm proposed by Mansour et. al [1] for networks with guaranteed quality of service (QoS) from a competitive analysis point of view. The authors have analysed the proposed algorithm (on-line algorithm) and also compared its performance to the off-line algorithm. In this paper, the analysis of the...
A fuzzy signal control method for single intersection is presented in this paper. This control method selects queue length as input of the fuzzy controller, sets up the fuzzy control rule base and constructs the vehicular delay model. Simulation experiments are presented to compare the vehicular average delay of fuzzy control with traditional inductive control and timing control under various types...
The current state of high-security facilities protection problem is governed by variety of factors, including application of physical protection systems. On the other hand efficiency of such systems is often determined based on expert opinions rather than precise analysis. In this paper we present a mathematical model of physical protection system, which can be used to estimate intruders detection...
In this paper a waveform relaxation algorithm based on longitudinal partitioning is presented to efficiently model large distributed networks. The proposed methodology represents lossy transmission lines as a cascade of lumped circuit elements and lossless line segments, where the lossless line segments are modeled using the method of characteristics. This allows the transmission line to be naturally...
Tapered buffers are widely used in CMOS integrated circuits to drive large capacitive loads. During the design of a tapered buffer, there are several design objectives to consider including delay, area, and power consumption. Existing methods produce suboptimal solutions considering multiple metrics, largely because they decouple different metrics during the design phase, which restricts the solution...
Quasi-sliding mode variable structure control strategy takes its own advantages in solving discrete-time and time-delay systems' problems. This paper proposed a kind of quasi-sliding mode control algorithm based on the Smith Predictor. The simulation results showed: the proposed control method greatly compensates time-delay and the control strategy could be simply and easily realized. On the premise...
This paper proposes a novel combination of ECN and BECN based on the value of the TTL, the hops that a packet has been passed since it was sent. Since the ECN and the BECN both have merits and disadvantages, the combination would be expected to enhance the performance and effectiveness of the congestion control. The TTL, a default attribute of a data packet transferring on networks, must be checked...
EMKC is an explicit congestion control algorithm which is designed for high bandwidth delay product (BDP) networks. Although delay-independence is an appealing characteristic, the EMKC system developed in exhibits undesirable equilibrium properties and slow fairness convergence behavior. To overcome these drawbacks, we propose a new method called AEMKC (Advanced Exponential Max-Min Kelly Control)...
In this paper, we propose a novel min cut based algorithm for multiple supply voltage assignment under timing constraints. Different with the traditional sensitivity based methods which focus on how to make full use of the slacks of non-critical gates, the proposed algorithm concentrates on critical gates. The circuit is initialized in the lowest power level, then the length of critical paths is tried...
Recently many imprecise circuit design techniques have been proposed for implementation of error-tolerant applications, such as multimedia and communications. These algorithms do not mandate absolute correctness of their results, and imprecise circuit components can therefore leverage this relaxed fidelity requirement to provide performance and energy benefits. In this paper, several imprecise adder...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.