The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSN) is considered an effective technique to collect oil and gas transmission pipeline information. The studies that use conventional technologies (such as GPRS, microwave, radio modem and cables etc.) to collect these pipelines state information have the disadvantages of high cost of system maintenance and long data packet delay. The usage of WSN in oil and gas pipeline...
This paper presents a novel multiplexer-based carry-skip algorithm for hybrid adder design based on the parallel-prefix computation technique. The hybrid adder combines both carry-lookahead and multiplexer-based carry-skip architectures to speed up the performance. The driving capability of the critical path is enhanced to boost the speed, while optimizing both area and power in the non-critical paths...
NS(Simulator Network) is an object-oriented visual simulator based on large-scale discrete event. It simulates not only the transmission of network data and topology architecture, but also all kinds of IP network circumstance. This paper describes the architecture and characteristics of NS, and also gives the technique and the general process based on NS. The instance of a streaming media applications-based...
The high dynamic of mobile peer-to-peer network makes the topology of network changing frequently, inconsistent of overlay network and bottom physical network topology, which can make worse network capability, higher failure rate of super-peer, longer query delay, lower effect of data transmission, as well as lower success rate of resource searching and system instability. This paper proposes a resource...
The 3N encoding process can simply add the input data N to its 1-bit left-shifted value 2N using the combinational digital circuits, such as ripple carry adder (RCA) or carry look-ahead adder (CLA). This paper presents an efficient algorithm and its hardware implementation. Results show that the proposed RCA-like 16-bit encoder achieves 25% less in hardware cost and 50% faster in speed performance...
Partitioning network, especially some DTN, can use Message Ferry(MF) scheme to restore network connection. Message TTL describes the maximum delay tolerance of transmission and messages with out-of-date TTL should be dropped. In this paper, we will study the problem of how to design the ferry's moving route dynamically to get high message delivery ratio under the constraint of message TTL, which we...
Systems with tightly interacting computational (cyber) units and physical systems are generally referred to as cyber-physical systems. They involve an interplay between embedded systems, control theory, real-time systems and software engineering. A very good example of cyber-physical systems design arises in the context of automotive architectures and software. Modern high-end cars have 50–100 processors...
A latency-hiding algorithm for the parallelization of large scale agent-based model simulations (ABMS) on parallel/distributed computing platform is proposed. The key idea of this algorithm is using redundant computations to hide communication latencies. An analytical model for this algorithm is presented to tell how to select R value to reach the best speedup. Compared to B+2R algorithm [1], theoretical...
Aimed to reduce the overheads using the Time Management (TM) in HLA based distributed simulations, the TM based on publish-subscribe topology information is investigated. The condition under which the message may be received before its causal predecessor is firstly analyzed. And then, the TM algorithms using vector clock are put forward, in which the condition is judged before the clock is comparing...
Delay is an important parameter that needs to be considered in the reversible logic designs, but not much work on delay in reversible network has been done at present. This paper presents an algorithm to calculate delay of reversible network. In the process of calculating delay, we not only take the complexity of different logic gates into consideration, but also the relationship between the output...
Limited resources in Wireless Sensor Networks (WSNs) are the key concern that needs to be given a careful consideration when studying virtually any aspect of a sensor network. Therefore, energy demands and radio bandwidth utilization should be addressed, especially in one-to-many communication. To define the problem, this article presents and categorizes the most common WSN multicast procedures depending...
Cognitive Radio is an enabling technology that is expected to address the problem of scarcity of spectrum by intelligent access, mobility and management of spectrum and pave way for efficient usage of the same. Increasingly, it is seen that most research is directed towards building theoretic models for spectrum access and management. Though some of these are backed by simulations, certainty of any...
In Orthogonal Frequency Division Multiplexing and Discrete Multitone transceivers, a guard interval called Cyclic Prefix (CP) is inserted to avoid inter-symbol interference. The length of the CP is usually greater than the impulse response of the channel resulting in a loss of useful data carriers. In order to avoid long CP, a time domain equalizer is used to shorten the channel. In this paper, we...
We address the problem of finding the least cost disjoint path pair with delay constraints, where working and protection paths require different delay constraints. A heuristic algorithm is proposed and compared with optimal ILP results.
Swarm intelligence inspired by the social behavior of ants boasts a number of attractive features, including adaptation, robustness, decentralized and self-organizing nature, which are well suited for routing in modern communication networks. This paper describes a new adaptive dynamic routing algorithm for packet-switched communications networks based on simple biological “ants” that explore the...
Traditional G-P algorithm exist two drawbacks in solving the correlation dimension of chaotic time series. The one is the subjective existence to determine scaleless range, the other is calculation error is large when the amount of data is small. For two shortcomings, the fuzzy C-means clustering is introduced to the G-P algorithm to determine the no-scales range. Least-squares fitting method is used...
Skyline queries have played an increasingly important role in many applications such as web mining, multi-preference analysis and decision making. Most existing studies mainly focus on centralized systems, and skyline query processing in distributed environments is still an emerging and challenging topic. In this paper we propose SkyStorm, a delay-bounded skyline computing approach by exploiting the...
With Received Signal Strength (RSS) based indoor localization gaining popularity, recent research work has explored many different aspects of such localization systems, for instance, accuracy and deployment cost. In this paper, we study the computational cost of a ratio-based localization algorithm. Specifically, we use the algorithm's inherent distance ratio relationship to refine the physical region...
The emergence of translucency in WDM networks as a trade-off between the low cost of full transparency and high signal quality provided by full opacity has led to immense interest in translucent network design by the research community in recent years. Efficient translucent network design necessitates the judicious choice of regeneration sites and number of regenerators in order to maintain a predefined...
In Wireless Sensor Network (WSN) researches, WSN routing algorithm is one of the hot issues. This article focuses on GPSR (Greedy Perimeter Stateless Routing) and uses the NS2 (Network Simulator-2) to simulate both GPSR and the improved algorithm GPSRI (GPSR-Improved). Consequently, we have compared GPSRI with GPSR in terms of important parameters, such as data transmit delay and data relay hops....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.