The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) are currently adopted in a vast variety of domains. Due to practical energy constraints, in this field minimizing sensor energy consumption is a critical challenge. Sleep scheduling approaches give the opportunity of turning off a subset of the nodes of a network— without suspending the monitoring activities performed by the WSN—in order to save energy and increase...
Traffic offloading is an attractive solution for the operators to increase the system radio capacity in the future cellular networks. Device to Device (D2D) technology helps achieve this goal by allowing direct communication between closely located user devices. However, as D2D devices transmit on the cellular network uplink bandwidth, the communication mode selection should be properly studied in...
In the one-way quantum computation (1WQC) model, computations are done by correlated sequences of entanglement, measurement and local corrections commands. As scalable and reliable quantum computers have not been implemented yet, the only widely available tools for designing and testing quantum algorithms are quantum computation simulators. However, simulating quantum computations on a standard classical...
The cardiac conduction velocity vector (VV) at a desired point in any chamber of the heart can be estimated by processing the local intracardiac electrograms, i.e., the activation times (ATs) and the locations of the recording catheter's electrodes can be used for the VV estimation. In this paper, we modify the maximum time difference (MTD) method, which is a simple computational efficient cardiac...
In this paper, we consider the sequential detection problem in a new cognitive radio (CR) scenario when the primary user (PU) works with more than one transmit power levels. The targets of the secondary user (SU) is not only to detect the presence of PU but also to recognize PU's transmit power levels. We formulate a valid sequential detection approach via the modified Neyman Pearson (NP) criterion...
A large number of computer applications(like Computer Graphics, Control Systems, Modeling System, Simulators etc.) needed floating point arithmetic. However, most of the presently available methods are slow and inefficient because of sequential design however the recent development in the field of programmable logic devices such as FPLA and CPLD opens the new area of parallel and high speed floating...
The dedicated short-range communication (DSRC) plays important role in modern intelligent transportation system. The DSRC standards generally adopt FM0 and Manchester encoding technique to reach dc balance and enhance the signal reliability. Same properties are possessed by Miller and inverted Manchester encoding. Therefore, this two techniques can be added in existing FM0/Manchester encoding module...
Network congestion is an important problem for Internet, and active queue management (AQM) is an effective congestion control technique. However, because the system states in real networks cannot be obtained directly, the traditional congestion control methods based on the AQM cannot obtain the state-feedback control law. Based on the modeling of the system, this paper presents an optimal congestion...
In this paper, we propose an efficient exhaustive search algorithm for elementary trapping sets (ETS) of variable-regular low-density parity-check (LDPC) codes. Recently, Karimi and Banihashemi proposed a characterization of ETSs, which was based on viewing an ETS as a layered superset (LSS) of a short cycle in the code's Tanner graph. A notable advantage of LSS characterization is that it corresponds...
Different types of serious games have been used in elucidating computer science areas such as computer games, mobile games, Lego-based games, virtual worlds and webbased games. Different evaluation techniques have been conducted like questionnaires, interviews, discussions and tests. Simulation have been widely used in computer science as a motivational and interactive learning tool. This paper aims...
In multi-controller software-defined networking (SDN) environments, a flow whose path includes switches that are managed by different controllers experiences increased flow setup latency, which is critical for delay-sensitive applications. To address the issue, we propose an optimal controller assignment scheme that minimizes the average flow setup latency while limiting load imbalance between controllers...
Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paper represents the first attempt to consider risk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks...
Computer science students use data array processing in many courses. To exploit the full power of caches and obtain higher performance, they mostly use the textbook example of sequential access of data arrays. However, a lot of discrepancies occur and the expected performance is not obtained in real life program executions, mostly due to the existence of several cache levels, with various architectures...
The performance gap between the processor and the memory speeds has been increasing. Whereas processor speeds have improved by 60% annually, secondary storage speed has only improved by 10% annually. Although there have been many efficient techniques studied to minimize the speed gap, it still remains a bottleneck in various commercial implementations. Since secondary memory technologies are much...
The traditional pure software emulation mode and sandbox mode simulation systems can only analog computer interlock operation, lacking simulation of field devices, and cost a lot in installation and maintenance. To solve this problem, we introduce a new network computer interlocking simulation system, which is designed based on B/S mode, ASP.NET and Web 3D technology. Being put into practice, it proves...
As the days go by, the innovation in the technology is growing faster and smaller chips with more complexity in the design and implementation. Design of adders is prime importance in any given embedded application; hence the design of reliable and efficient adder on a VLSI based embedded application matters. In this paper we primarily deal with the construction of high speed adder circuits. Design...
To take out a variable frequency variable amplitude output voltage a new single-phase H-bridge multilevel inverter (MLI) topology is constructed through VFISCPWM modulated semi-cross switched voltage sources along with a hybrid pulse width modulation (PWM) strategy. The principle avoids a shrewd attitude to employ PWM approach only for a meticulous H bridge that serves to produce the desired level...
The size of complementary metal oxide semiconductor (CMOS) transistor keep shrinking to increase the density on chip in accordance with Moore's Law [1]. The scaling affect the device performance due to constraints like heat dissipation and power consumption [3], further scaling would hit the physical limitation [16]. Effortshave been made to come up with the new device alternative to CMOS, to continually...
The most important concern regarding a power system is the quality of its power. The main cause of most of the issues is nonlinear loads only. Shunt Active Power Filter (SAPF) has turned out to be a good solution to solve this problem because of its ability to fulfill the harmonic and reactive power components demand of the nonlinear loads. This paper presents comprehensive analysis of comparison...
In this paper, the effect of Doppler spread in Subcarrier Index Modulation-OFDM (SIM-OFDM), one of the multicarrier transmission systems, is compared to OFDM system that the most widely used multi-carrier transmission method. For this purpose, average subcarriers interval was derived from SIM-OFDM. The results showed the performance improvement by calculating Signal-to-Interference Ratio (SIR) and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.