The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern manufacturing processes have allowed construction of 3D integrated circuits (IC) with embedded cooling. This technology has been proven to be the most effective solution for dissipating the high heat fluxes of up to 100 W/cm2 generated during the operation of 3D IC chips. Recent published works indicate that it is possible to maintain the maximum surface temperature below the allowable limits...
Popularity of online transaction in the half past decade leads to leak of user information. Security of transaction process can be hacked more easily due to advanced technologies. Biometric verification is considered as a key to enhance security problem. In this paper, the new process with face matching verification is proposed to improve security of online payment system. The simulation of the online...
Device-to-Device (D2D) communication was initially proposed in cellular networks as a new paradigm to enhance network performance. The main focus is on the capacity of the proposed system with multiple idle UEs serving as relays. This paper investigates the tight integration of D2D communication into an LTE-A network and the performance of D2D multi-hop communication. Further, we present numerical...
Currently available electronic design automation tools for design space exploration of solid state drives (SSDs) are not able to assess: 1) the device architecture inefficiencies; 2) architecture overdesign for a target performance; and 3) performance degradation caused by the disk usage. These tools feature either an overly high abstraction modeling strategy or lack the required flexibility to perform...
As the network is being evolved towards the content-centric network and the content itself is more focused rather than the host, a new paradigm called content-centric networking (CCN) is being considered for the Future Internet. Because the traffic in the Internet and wireless network has been increasing rapidly due to the continued proliferation of mobile devices, it is important to minimize the...
This paper presents drive performance evaluations of a linear switched reluctance motor (LSRM) driven by a current source inverter (CSI). First, we describe a new drive circuit with CSI for the LSRM drive. For deliberations of drive performance evaluations, a simulation model is built by a circuit simulator. The drive performances of the LSRM with the proposed drive circuit are compared with a traditional...
An important consideration in the design and reliability of circuits is the role of defects, impurities, and parameter fluctuations in affecting the transistor characteristics. Here, the impact of vacancies on CNTFET characteristics is studied by means of a multi-scale modeling and simulation framework. Very recently, defect densities of 0:02% up to 0:2% have been reported for different CNT samples...
Simulation is often used to evaluate the behaviour and measure the performance of computing systems. Specifically, in high-performance interconnection networks, the simulation has been extensively considered to verify the behaviour of the network itself and to evaluate its performance. In this context, network simulation must be fed with network traffic, also referred to as network workload, whose...
Distributed clouds have been regarded as the key enabling technology to provide new trends of services. The contribution of this paper is twofold. First, we discuss current distributed clouds architecture and highlight the issues involved, specifically scalability. Second, we investigate the benefits of the use of the Recursive InterNetwork Architecture (RINA) as a networking solution for the distributed...
This paper proposes a novel analog circuit verification approach using causal reasoning. To verify analog circuits, the flow begins with mining the causal reasoning steps (design plan) that produced the circuit, including starting ideas, design step sequence, and their justification [1]. Then, topological structures corresponding to the starting ideas and design step sequences are verified individually...
This paper focuses on performance evaluation of such robotic swarms in which only a few members are aware of the swarm goal. In many robotic applications more than one robot is needed to complete a given task. In this case a swarm of robots can be applied to solve complex missions. It is not always necessary for every swarm member to be familiar with the goal of the team. We investigated some new...
In this work, the Radiation Hardened by Design (RHBD) of an inverter cell is proposed. The design considers the use of standard CMOS processes with commercial PDK, focusing on fully incorporating the design into CAD tools allowing the automatic place & route. Corners and Monte Carlo simulations were performed in order to analyze and compare the performances between the standard cells and proposed...
In this paper, we present an optimal charging algorithm for multiple devices in the perspective of user satisfaction fairness. The proposed algorithm can maximize the total sum of the increment of user satisfaction levels in a finite charging scheduling period. In order to develop the algorithm, we define an objective function that includes the characteristics of charging capacity behaviors for the...
Mobile ad-hoc sensor networks (MASNETs) have promised a wide variety of applications such as military sensor networks to detect and gain as much as possible about enemy movements and explosions. Most of these applications can be deployed either in static or mobile environment. In static WSNs, the change of sensor nodes topology is normally caused by node failure which is due to energy depletion. However,...
Rapid developments and emergence of diverse wireless systems call for radio frontends with agile and multistandard properties. Within this publication the performance of a direct RF digitizing ΣΔ-modulator based analog-to-digital converter (ADC) is evaluated based on orthogonal frequency division multiplex (OFDM) system simulation on the bitstream layer. The necessary transmit and receive building...
EPA (Ethernet for Plant Automation) resolves the nondeterministic problem of Ethernet through sub-segment topology and deterministic scheduling mechanism. In this paper, the EPA scheduling mechanism is implemented by simulation tool. And the influence of EPA scheduling mechanism on network performance is shown in the simulation result. According to the study, the real-time performance of EPA periodic...
IEEE 802.15.7 is a physical and MAC layer standard for visible light communication (VLC). A slotted CSMA/CA MAC procedure is defined in the standard to coordinate optical channel access for multiple wireless devices. This CSMA/CA process does not provide any hidden node avoidance mechanisms, thus potentially leading to severe performance degradation in the presence of hidden nodes due to collisions...
Hybrid perovskite solar cells (HPSC) emerged recently as a possible alternative to Si based devices because of their high power conversion efficiency (PCE) and their potential low cost. However, in this work, we analyze numerically a potential inorganic hole conducting material (HCM) to replace expensive organic Spiro-OMETAD. HPSCs with various types of HCMs are computed using a solar cell performance...
In this paper, we present the performance evaluation of seven spectrum sensing techniques including four single-stage spectrum sensing and three two-stage spectrum sensing for cognitive radio (CR) systems. We focus on the performance evaluation of these techniques under two types of operative schemes including non-cooperative and cooperative of CR systems when the received signal experiences shadowing...
A novel hybrid model selection method between Half-Duplex (HD) and Full-Duplex (FD), is proposed in this paper. The aim of X-Duplex is to maximize the instantaneous system capacity. The system can be configured as either HD or FD mode, by adaptively configuring the antenna as either transmit or receive antenna. HD halves the symbol rate for avoiding the self interference while FD achieves the full...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.