The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper the problems of transmitting trustworthy monitoring and control signals through the communication channels of sophisticated telemechanics systems using the IEC 60870-5-101 (104) are debated (104). Mathematically justified discrepancy between concepts of "information veracity" and "information protection from noise in communication channel" is shown. Principles of...
Future generation of wireless networks, i.e. 5G, is envisioned to support several new use-cases demanding transmission reliability and latency that cannot be achieved by the current cellular networks such as long-term evolution (LTE). This paper looks at different design aspects of the control channel(s) to support ultra-reliable low-latency communication considering factory automation as an example...
The electroencephalography is a technique used in brain mapping with applications in research and clinical practice. The current work aims to assess the reliability of quantitative electroencephalography and coherence measurements. Two electroencephalography sessions, obtained 4 to 6 weeks apart during resting state and memory condition, were recorded in 15 young healthy subject. For each subject...
Conformal prediction (CP) has received a signif-icant attention in the last decade due to its capability of pro-viding confidences for class predictions. However, the literature lacks of a computationally efficient implementation of CP for multi-class reduction techniques such as one-versus-all, ECOC etc. To address this issue we propose two implementations of CP for multi-class reduction: Conformal...
The evaluation of error correction code (ECC) for NAND flash memory is increasingly complicated by the increasing bit error rate in memory. The concept of error-free information capacity is proposed to evaluate the performance ECC of NAND flash memory. The new method simultaneously considers the capacity and reliability of NAND flash memory. Low-density parity-check (LDPC) codes with a medium code...
Exascale computing requires storage systems to provide both reliability and performance, which are in the relationship of trade-off. This paper presents a method to build a zero-overhead network storage system (Cluster-wide RAID), which consists of active storage nodes. Active storage nodes themselves have an ability to process data blocks and our proposed method utilizes them to generate parity blocks...
The concept of creating of the embody reliability in design of cyber-physical systems, using novel techniques based on the combinatorial configurations, including two- and multidimensional Ideal Ring Bundles (IRB)s is developed. These design techniques make it possible to configure cyberphysical systems with fewer elements than at present, while maintaining or improving on resolving ability, structural...
This paper proposes an efficient mechanism that mitigates crosstalk faults in Network-on-Chips (NoCs). This is done by using a Packet Manipulating mechanism called PAM for reliable data transfer of NoCs. PAM investigates the transitions of a packet to minimize the forbidden transition patterns appearing during the flit traversal in NoCs. To do this, the content of a packet is manipulated using three...
We derive an exponentially decaying upper-bound on the unnormalized amount of information leaked to the wire-tapper in Wyner's wire-tap channel setting. We characterize the exponent of the bound as a function of the randomness used by the encoder. This exponent matches that of the recent work of Hayashi [12] which is, to the best of our knowledge, the best exponent that exists in the literature. Our...
In single-level cell flash memory, the most popular error correction code used for protection of the stored data is Bose-Chaudhuri-Hocquenghem (BCH) codes. However, BCH codes are not adequate to meet the error requirements of multi-level cell flash memory. Serial concatenation of codes increases the error correcting capability of the resulting system. Hence, a favorable concatenated coding scheme...
Resistive random access memory (RRAM) has been recognized as one of the most promising candidates for next generation non-volatile memory due to its simple structure and excellent scalability. However, poor reliability is a serious issue for RRAM memory applications. To improve the reliability and endurance, many researchers changed the cell material, process and structure. Here, in this paper, we...
We propose a new real-time framework which efficiently reconstructs large-scale scenery by accumulating anisotropic point representations in combination with memory efficient representation of point attributes. The reduced memory footprint allows to store additional point properties that represent the accumulated anisotropic noise of the input range data in the reconstructed scene. We propose an efficient...
With the reliability requirements increasingly important, erasure codes have been widely used in today's cloud storage systems because they achieve both high reliability and low storage overhead. However, the performance for most existing erasure codes can be further improved on both normal reads to user's data without device failures and degraded reads under device failures, which are crucial in...
With the rapid growth of data storage, the demand for high reliability becomes critical in large data centers where RAID-5 is widely used. However, the disk failure rate increases sharply after some usage, and thus concurrent disk failures are not rare, therefore RAID-5 is insufficient to provide high reliability. A solution is to convert an existing RAID-5 to a RAID-6 (a type of "RAID level...
In this paper we proposed correcting codes-based on modular arithmetic — to improve the data transmission robustness in wireless sensor networks. We developed a new method and algorithm for the detection and correction of multiple errors. The codes are characterized by high correction characteristics as well as the simplified coding procedure1.
High reliability, low space cost, and efficient read/write performance are all desirable properties for cloud storage systems. Due to the inherent conflicts, however, simultaneously achieving optimality on these properties is unrealistic. Since reliable storage is indispensable prerequisite for services with high availability, tradeoff should therefore be made between space and read/write efficiency...
As hard disk failure rates are rarely improved and the reconstruction time for TB-level disks typically amounts to days, multiple concurrent disk/storage node failures in datacenter storage systems become common and frequent. As a result, the erasure coding schemes used in datacenters must meet the critical requirements of high fault tolerance, high storage efficiency, and fast fault recovery. In...
In large storage systems, erasure codes is a primary technique to provide high reliability with low monetary cost. Among various erasure codes, a major category called XORbased codes uses purely XOR operations to generate redundant data and offer low computational complexity. These codes are conventionally implemented via matrix based method or several specialized non-matrix based methods. However,...
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures, message authentication codes (MACs), and many other applications. In fact, hash functions are mainly dedicated to detect tampering and prove of message authenticity. Thus, if the hash digest does not match the sent digest, this indicates modification in the data or in the hash...
Memory is an important part of any digital circuit in which data is stored and retrieved. Technology scaling, lower operating voltages and high integration densities leads for failures in the reliability of memories. The main problem is Single Event Upsets (SEUs) that alters the memories from its normal way of functioning. This paper presents design and implementation of Majority Logic (ML) detecting/decoding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.