The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Real-time (RT) communication support is a critical requirement for many complex embedded applications which are currently targeted to Network-on-chip (NoC) platforms. In this paper, we present novel methods to efficiently calculate worst case bandwidth and latency bounds for RT traffic streams on wormhole-switched NoCs with arbitrary topology. The proposed methods apply to best-effort NoC architectures,...
Deployed high-latency anonymous communication systems conceal communication patterns using pool mixes as building blocks. These mixes are known to be vulnerable to Disclosure Attacks that uncover persistent relationships between users. In this paper we study the performance of the Least Squares Disclosure Attack (LSDA), an approach to disclosure rooted in Maximum Likelihood parameter estimation that...
Grid-shaped cellular models have gained popularity as an effective approach to understand physical systems. Despite their usefulness to describe complex behavior, many cellular models require large amounts of compute time, mainly due to its synchronous nature. Besides this, cellular models do not describe adequately most of existing physical systems whose nature is asynchronous. In this tutorial we...
This paper presents a Reconfigurable Parallel Prefix Ling Adder. The proposed design can be partitioned to perform as one 16 bit, two 8 bit and four 4 bit adders. We also propose a new architecture for Enhanced Flagged Binary Adder (EFBA) designs which reduces the delay of operation considerably. The new adders are, therefore, modifications of conventional Reconfigurable Carry Lookahead Adder (CLA)...
The problem of identifying dynamical models on the basis of measurement data is usually considered in a classical open-loop or closed-loop setting. In this paper this problem is generalized to linear dynamical systems that operate in a complex interconnection structure and the dynamical relationships between the measured variables signals need to be identified. It is shown that the classical Direct...
In this paper we discuss the rescheduling of trains on a large-scale railway network in the case of perturbations using a max-plus-linear system description. We study the structure of the system matrices and derive how this structure can be manipulated by the control variables. In addition, we show that this leads to a system matrix that is affine in the control variables and the timing parameters...
Timeout control is a simple mechanism used when direct feedback is either impossible, unreliable, or too costly, as is often the case in distributed systems. Its effectiveness is determined by a timeout threshold parameter and our goal is to quantify the effect of this parameter on the system behavior. In this paper, we extend previous results to the case where there are N transmitting nodes making...
Traditional industrial engineering techniques including mathematical models are not sufficient to examine sophisticated manufacturing systems such as semiconductor manufacturing. As such, simulation modeling is used extensively in the design and analysis of semiconductor manufacturing operations. This study explores the use of simulation modeling of single semiconductor toolsets. In the literature...
This study analyzes the transportation network of a major rail freight operator in order to obtain a model of delay propagation of trains connecting intermodal terminals. Operational management of a rail freight operator needs to take into account deviations due to unexpected events such as unplanned maintenance, strikes, railroad works, traffic congestion. The dispatcher makes train assignment decisions...
The effects of time delay in the continuous part of a pulse-modulated model of non-basal endocrine feedback regulation are investigated. Conditions for the existence and local orbital stability of periodical solutions with m impulses in the least period (m-cycles) are derived. Applied to the case of testosterone regulation in the human male, the model indicates that increasing time delays in the system...
Methods used for ordinary differential equations cannot generally be used to solve delay differential equation, which is reflected in the choice of suitable software. The paper shows possibilities of software solution of delay differential equations. The aim of the paper is to present the possibilities of current software packages and programme systems (e.g. Matlab, Maple, R). The paper further shows...
The primary objective of this study is to propose an interval type-2 controller design method for a class of nonlinear singular networked control systems encountering data-transmission delay and packet loss problems. This study assesses the stability analysis and design of the system controllers. First, the singular networked control systems are modeled as interval type-2 T-S fuzzy systems. The concept...
With the development of wireless communication technologies, future networks will most likely be heterogeneous, consist of both wired and wireless links. However, current active queue management (AQM) schemes, which are originally designed for wired networks, could cause performance degradation of Transmission Control Protocol (TCP) flows over wired-cum-wireless networks. Thus, to deal with these...
In recent years, with the progress and development of human society, the needs of extraterrestrial energy exploration and solar living space development has become more and more urgent. Deep Space Sensor Network has a unique conditions and technical advantages in deep space exploration due to its characteristics of low power, low cost, distribution and self-organization. Multicast routing protocol...
Future growth of the Internet is likely to be constrained by its own energy consumption. As shown in recent studies, by adopting burst switching technologies, energy consumption of the core network could be reduced. In this study we first analyse the relationship between burst size, arrival rate, and energy consumption of a core router port in a burst switching (BS) network. A novel mechanism is then...
Cache memory related preemption delay causes large variations of the task execution time and tools that perform WCET static code analysis usually do not consider this behavior. The additional cache delays are usually solved by cache partitioning between tasks or they are incorporated in the schedulability analysis equations. This paper estimates the cache preemption delay of a task in two steps: task...
Architectures for information-centric networks (ICNs), like CCN, propose simple on-path caching with LRU cache management for caching of data items in the network. We propose alternative strategies, based on off-path caching, which try to avoid redundant caching of data items to use cache space more efficiently. Based on a mathematical model for LRU and LFU cache management and a simulation, we analyze...
As the typical anomaly detection methods using statistics, entropy and based method has been researched and reported with their performance properties for anomaly attacks. In this research, we compare the time complexity of two our proposed detection method aiming to evaluate the performance of our system. Our previous researches have clarified that the source IP address and destination port...
Traditionally in routing approaches, each node allows a maximum load through the selected route. The existing routing approaches in cognitive radio networks (CRN) do not take into account spectrum trading as well as spectrum competition among licensed users (PUs). This paper introduces a novel routing algorithm that is based on spectrum trading and spectrum competition for cognitive radio networks...
Airborne networks often use frequency hopping to be jam resistant. Because users are highly mobile and can have large propagation delays, otherwise orthogonal frequency hopping patterns appear asynchronous, and hop-by-hop collisions will occur. We compare the achievable throughput and delay of scheduling schemes versus random access schemes in this context via modeling and simulation. Because collisions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.