The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reverse proxies are key performance elements of a content distribution network (CDN) and operate as intermediaries between client and upstream (or origin) server traffic. A typical reverse proxy server aims to distribute user workload, more or less equally, among multiple upstream servers. To keep the pace with the growing demand for content, CDNs regularly expand their capacity by adding extra upstream...
For the most existing MAODV protocol is only improved by a single performance, there is a problem that the comprehensive performance of the protocol cannot be improved as well. By uses of the routing selection mechanism with the constraints of bandwidth, delay and packet loss rate of the original protocol, a new multi-objective routing protocol RCQ-MAODV of mobile ad hoc network is put forward. Simulations...
Traditionally, common processor augmentation solutions have involved the addition of coprocessors or the datapath integration of custom instructions within extensible processors as Instruction Set Extensions (ISE). Rarely is the hybrid option of using both techniques explored. Much research already exists concerning the identification and selection of custom hardware blocks from hardware/software...
Low Earth Orbit (LEO) satellite networks are expected to provide a variety of multimedia applications. In order to satisfy different QoS requirements and optimize utilization of network resources, a novel traffic classification routing algorithm (TCR) is proposed. The key technique of TCR is investigating the traffic classification link-cost metrics (TCM) for different traffic classes, which selects...
The DRAM latency modeling is complex because most chips contain row-buffers and multiple banks to exploit patterns of DRAM accesses. As a result, the latency of DRAM access not only depends on the circuit timing parameters but also memory access patterns. This study derives an analytical model that predicts the DRAM access performance using DRAM timing and memory access pattern parameters. As a performance...
Optimization techniques for improving the average-case execution time of an application, for which predictability with respect to time is not required, have been investigated for a long time in many different contexts. However, this has traditionally been done without paying attention to the worst-case execution time. For predictable real-time applications, on the other hand, the focus has been solely...
The delay and bandwidth are the two most fundamental factors in the network. In the delay and bandwidth constrained circumstances, we present a problem of maximizing the number of nodes and then prove the problem is NP-complete. Next, we propose a comprehensive evaluation of delay and bandwidth heuristic algorithm. According to the heuristic algorithm, distributed application layer multicast algorithms...
A framework for the joint design of wireless network and controllers is proposed. Multiple control systems are considered where the sensor measurements are transmitted to the controller over the IEEE 802.15.4 protocol. The essential issues of wireless networked control systems (NCSs) are investigated to provide an abstraction of the wireless network for a co-design approach. We first present an analytical...
Interconnects are becoming a major bottleneck in the design of modern Systems-on-Chip. Power consumption, propagation delay, statistical variability, and reliability are some of the key challenges that must be addressed to fully optimize the interconnect architecture. This work provides a thorough review and analysis of the advantages and possibilities of coding for addressing the aforementioned challenges...
Wind blowing over the sea surface generates many dramatic effects. One of the most important effects is bubbles generated by breaking waves, which can have a major effect on high frequency acoustic propagation, sound speed profile and ambient noise due to the sound scattering and absorption properties of a thin layer of bubbles. In this paper, on one hand, we analyze several important properties of...
In order to optimize pedestrian signal cycle, queuing theory and probability theory were used to build delay model of pedestrian-vehicle system, and then put forward the calculation method of conversion coefficient of pedestrian crowd and vehicles. The delays of pedestrian and vehicle were calculated by equilibrium phase delay formula. The critical volume curves of pedestrian signal for pedestrian...
In contrast, there exist bullwhip effect in the supply chain of perishable product more easily. We establish a system dynamics model of the supply chain of perishable product, analyzing the causes of the bullwhip effects. Analysis shows that the changes of consumer demand, the differences of retailer's order cycle, wholesaler's order cycle, production cycle, the delivery delay of wholesaler and delivery...
IEEE 802.15.4 is a global standard designed for emerging applications in low-rate wireless personal area networks (LR-WPANs). The standard provides nice features such as a beacon-enabled mode and guaranteed time slots for real-time data delivery. However, how to optimally operate those features is still an open issue. For the optimal operation of the features, this paper proposes a holistic optimization...
The steadily growing deployment of resilience-critical Internet services is leading to an increasing number of Multi-Homed network sites. Asymmetric Digital Subscriber Lines (ADSL) are an inexpensive way to add a secondary Internet access connection. With the development of Multi-Path Transport Layer protocols - like Multipath TCP (MPTCP) and the Stream Control Transmission Protocol (SCTP) furnished...
In order to successfully resolve the network infrastructure's problems the network provider has to improve the service quality. However in traditional ways, maintaining and improving of the service quality are generally determined in terms of quality of service criteria, not in terms of satisfaction and perception to the end-user. The latter is represented by Quality of Experience (QoE) that becomes...
Current communication schemes rely on instantaneous adaptation, which increases the system complexity and is memoryless. We propose a scheme for adapting system parameters based on a priori knowledge of the channel statistics to reduce feedback requirements. As a vital parameter in OFDM system, cyclic prefix (CP) length depends mainly on two channel characteristics: the channel gains and the root...
Cellular networks provide a range of communication services and are the principal wireless technology for domestic and business users. However, in cellular networks, an accident or a storm or a malicious action may cause a base station to fail and so be unable to provide radio coverage to sections of users. Such base station failures also might result in user congestion to nearby operational base...
The EDA design flows must be retooled to cope with the rapid increase in the number of operational modes and process corners for a VLSI circuit, which in turn results in different and sometimes conflicting design goals and requirements. Single-objective solutions to various design optimization problems, ranging from sizing and fanout optimization to technology mapping and cell placement, must hence...
BitTorrent is a peer-to-peer (P2P) file sharing protocol, which overcomes the bottleneck of server bandwidth by allowing peers to share the downloaded data directly. However, the greedy and non-cooperative behavior (such as leeching) of individual peer can degrade the performance of P2P significantly. In this paper, we optimize the non-cooperative P2P network from the game theory point of view. Specifically,...
In switching power converters, the turn on/off process of switches is crucial for the reliability and efficiency of the converter. In general, optimum switching is challenging, and it is particularly difficult for hard switching. The MOSFET synchronous buck converter having wide applications due to high switching speed and low loss, however, operates in hard switching and needs a good timing control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.