The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud infrastructure providers (CIPs) usually build a large number of geo-distributed data centers to cater to the recent proliferation of Cloud Computing. The CIPs commonly use multiple internet service providers (ISPs) to interconnect their geo-distributed data centers. Diurnal patterns and leftover bandwidth were effectively exploited by past studies to improve bandwidth utilization and minimize...
The configuration of WLAN MAC by means of Super Frame (SF) and Contention Free Period (CFP) variation is one of the effective schemes to provide QoS to interactive multimedia (IMM) traffic. In this paper we investigate the usefulness of an auto-generated dynamic parameter set of CFP and SF combinations as the logical look-up table for the WLAN medium access control scheme. A modified analytical model...
Several reliable packet routing approaches have been studied to achieve a high reliable VANET by using the Car-to-car communications and Inter-Vehicle Communications. VANET suffers from high mobility, diverse road topologies, and wireless interference, and thus significantly degrades the connectivity of packet transmissions and network performance. The mathematical analysis can help the approach efficiency,...
We extend the mean-field (a.k.a. fluid-analysis) approach for massively-parallel continuous-time Markov chains (CTMCs) to models with both Markovian and deterministically-timed transitions. We introduce a new low-level formalism for specifying massively-parallel models with generally-timed transitions, the population generalised semi-Markov process (PGSMP). We then show how systems of coupled delay...
In this paper, we present an arithmetic Sum-of-Product (SOP) based approach to implement an efficient Discrete Fourier Transform (DFT) as well as an FIR filter circuit. Our SOP based DFT engine uses an improved column compression algorithm, and also handles the sign of the input efficiently. The partial products of the computation are compressed down to 2 operands, which are then added using a single...
During the last decade there has been a great interest in applying game theory to several problems of wireless networking. The main focus of the existing research so far has been to ensure and prove that the game shall eventually reach a Nash equilibrium solution. In this paper our aim is to question whether a Nash equilibrium must be used as an allpurpose treatment without taking into consideration...
This work presents a synthesis framework that generates a formally verifiable RTL from a high level language. We develop an estimation model for area, delay and power metrics of arithmetic components for Xilinx Spartan 3 FPGA family. Our estimation model works 300 times faster than Xilinx's toolchain with an average error of 6.57\% for delay and 3.76\% for area estimations. Our framework extracts...
In order to accelerate logic simulation, it is highly beneficial to simulate the circuit design on FPGA hardware. This is often referred to as emulation, and we use the terms simulation and emulation interchangeably in this paper. However, limited hardware on FPGAs prevents large designs from being implemented on a single FPGA. Hence there is a need to partition the design and simulate it on a multi-FPGA...
Detecting change-points and anomalies on sequential data is common in various domains such as fraud detection for credit cards, intrusion detection for cyber-security or military surveillance [1]. This study is motivated by the predictive maintenance of pneumatic doors in transit buses. For this purpose, buses are instrumented and data are collected through embedded sensors. Inspired by the CUSUM...
To analyze and compare buffer size requirements of different cache coherence policies will provide beneficial guidelines for NoC design. However, it is not an easy task, because 1)packet flows generated by cache coherence events do not conform to the Poisson process, traditional queue theorem can't be applied to the performance analyzing for the NoCs that support cache coherence, 2) broadcast or multicast...
Cognitive Radio Networks (CRN) have enabled us to efficiently reuse the underutilized radio spectrum. The MAC protocol in CRN defines the spectrum usage by sharing the channels efficiently among users. In this paper we propose a novel TDMA based MAC protocol with dynamically allocated slots. Most of the MAC protocols proposed in the literature employ Common Control Channel (CCC) to manage the resources...
In spite of recent advances in Intelligent Transport, vehicular traffic dynamics are still hard to represent and analyze. Most of the previous work on traffic regards highways or single lanes where vehicles interact in one dimension. Models for multi-dimensional vehicle-to-vehicle interactions and models for urban intersections are quite complicated and hardly applicable on a large scale. Nonetheless,...
Traffic is composed of different vehicle classes, each characterized by the vehicle length, the value of time (VOT) and other class-specific properties. Multi-class traffic flow models aim to capture these class-specific differences. In this paper, a multi-class model is appended with a monetary cost framework accounting for the value of time of each vehicle class, thereby enabling the computation...
Under emergency situations, citizens are often forced to evacuate an inhabited area for their own safety. During this process, drivers' behavior becomes a very important factor determining vehicle movements in the affected area. In this research, the impact of driver aggressiveness on traffic flow properties related to evacuation, such as travel time to the safe zones, is modeled through microscopic...
A filtering technique of neutron flux during the nuclear reactor restarting is presented in this paper. The nuclear reactor model is described by equation of inverse kinetics. The ionization chambers are used for neutron flux measure. To minimize the undesired noise of measurement the extended Kalman filter (EKF) method is used. The filter EKF is designed using the nuclear reactor model.
Congestion is a problem in real networks. Users do not want to lose information and data should be delivered as fast and reliably as possible. This is really difficult to achieve. Moreover, networks work in changing environments: number of users, type of traffic, delays in transmission, etc. So this paper presents how to design PID controllers that take network changes into account. Non-linear simulations...
We compare population models in terms of Continuous Time Markov Chains with embedded deterministic delays (delayed CTMC), in which an exponential timed transition can only update the state of the system after a deterministicdelay, and delay differential equations (DDE). We prove a fluid approximation theorem, showing that, when the size of the population goes to infinity, the delayed CTMC converges...
The introduction of communication systems to power system controllers have brought in another layer of complexity in their design and operation. In this paper a Plug-in Hybrid Electric Vehicle (PHEV) charging facility is studied. A linearized model of the facility is built including both the dc/dc and dc/ac converters of the Distributed Energy Resources (DER). In addition, a control strategy that...
In networked control systems, the network uncertainties can degrade the control performance and even result in instability, especially for the Internet-based control system with wireless communication in which the transmission delay could be many times of the sampling period of control systems. NPC (Networked Predictive Control) is an active method to compensate for the effects of network uncertainty...
In Underwater sensor networks (UWSN), Nodes are powered by battery. So saving energy is an important factor to estimate routing protocol. In this paper, we briefly introduced the vector-Based Forwarding and proposed an energy balance method to improve the lifetime of originate VBF. We sensor the energy information of neighbor nodes and decide whether participate in transport packets according the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.