The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quadratic invariance is a condition which has been shown to allow for optimal decentralized control problems to be cast as convex optimization problems. The condition relates the constraints that the decentralization imposes on the controller to the structure of the plant. In this paper, we consider the problem of finding the closest subset and superset of the decentralization constraint which are...
In this paper, we analyze the verification of K-step opacity in discrete event systems that are modeled as (possibly non-deterministic) finite automata with partial observation on their transitions. A system is K-step opaque if the entrance of the system state within the last K observations to a set of secret states remains opaque to an intruder who has complete knowledge of the system model and observes...
In this paper, the exponential synchronization problem of a class of chaotic delayed neural networks (DNNs) via impulsive control method is studied. Based on the theory of impulsive functional differential equations (FDEs), some new synchronization criteria expressed in the form of linear matrix inequalities (LMIs) are derived. The designed impulsive controller not only can globally exponentially...
We study a disturbance rejection problem in a pulsed light source with the aim of yielding improved performance over existing control techniques. The disturbances of interest include an offset with reset properties and sinusoids which appear aliased in the measured data. The light source is pulsed at varying pulse rates yet actuators move in continuous-time, yielding a system which blends aspects...
In the forthcoming decade the capacity of railway passenger transport on the major Dutch corridors has to accommodate a 50% growth. ProRail, The Netherlands' railway manager aims to enable a high-frequency schedule by the year 2012. To safeguard the quality and manageability of traffic, a new steering and control concept has been worked out. The current paper reports on a pre-field test of the concept...
This work considers the problem of quickest detection of signals in a coupled system of N sensors, which receive continuous sequential observations from the environment. It is assumed that the signals, which are modeled a general Ito?? processes, are coupled across sensors, but that their onset times may differ from sensor to sensor. The objective is the optimal detection of the first time at which...
Supporting high-performance computing pipelines in wide-area networks is crucial to enabling large-scale distributed scientific applications that require minimizing end-to-end delay for fast user interaction or maximizing frame rate for smooth data flow. We formulate and categorize the linear pipeline configuration problems into six classes with two mapping objectives, i.e. minimum end-to-end delay...
This paper proposes a method aiding in low clock skew applicable to the mainstream industry clock tree synthesis (CTS) design flow. The original clock root is partitioned into several pseudo clock sources at the gate level. The automatic place and route (APR) tool may synthesize the clock tree with better performance in clock skew because each pseudo clock source drives smaller number of fan out....
Serpentine lines have been widely used in digital circuits to provide the required timing delays. Based on a full-wave simulation tool, some critical parameters that affect the delay characteristic of a serpentine line are carefully studied and analyzed. With the comprehensive study and analysis, a set of practical and useful design guides are concluded for designing a serpentine line to meet the...
Due to the rapidly changing topology of vehicular ad hoc network (VANET), it requires the routing protocol can be able to find out comparatively more stable routes. But the routing protocols in existence are not taking the distinguishing features of vehicles and roadway into consideration, and this brought about challenges to these routing protocols' applicability in VANET. In this paper, we take...
A floating-point accumulator for FPGA-based high performance computing applications is proposed and evaluated. Compared to previous work, our accumulator uses a fixed size circuit, and can reduce an arbitrary number of input sets of varying sizes without requiring prior knowledge of the bounds of summands. In this paper, we describe how the adder accumulator operator can be heavily pipelined to achieve...
Good point set scanning-based self-learning worms can reach a stupendous propagation speed in virtue of the non-uniform vulnerable-host distribution than that of traditional worms. In order to combat self-learning worms, this paper proposes an interaction model. Using the interaction model, we obtain the basic reproduction number. The impact of different parameters of predators is studied. Simulation...
The existing opportunistic protocols of delay tolerant network (DTN) occupy much storage and the prediction-based protocols need to calculate and spread much predication information and the scheduling protocols cannot accommodate to huge complex network. This paper analyses and summarizes the existing DTN protocols and proposes a new DTN routing protocol called CRHC which is based on hierarchical...
Bluetooth is emerging as an important standard for short range, low-power low cost wireless communication radio technology. Recently, the specification operating in an unlicensed frequency band of 2.4 GHz that describes how mobile phones, computers and personal digital assistants (PDA) can be easily and fast interconnected using a short range wireless connection. The devices discovery and connection...
This paper describes an automated technique for protecting portable executable files used in Windows NT Platform. The proposed technique mainly works on Portable Executable format for 32-bit applications. The paper describes the PE format illustrating its main structures followed by an overview on existing protection techniques, and then it illustrates the proposed technique used in packing the PE...
IEEE 802.11 is a popular wireless LAN standard and because of its low cost and good bandwidth, it is widely used now a days. Due to the small cell size frequent handoffs may occur while roaming in an area covered by several access points and a high handoff latency may cause disruptions in ongoing communications. To support voice and multimedia applications, handoff latency needs to be within 50 ms...
Failure detectors are one of the key components of fault tolerant distributed systems as it is very important to determine the suspected/crashed object and take recovery steps to keep the system going. The main objective of the fault monitoring activity is to quickly and correctly identify the faults. A fault monitoring system which is quick to declare faults increases the chances of false alarms,...
The sensors in sensor networks have limited energy and thus energy preserving techniques are important but in many cases like war zone the time for complete a task is more important than energy and in large-scale sensor networks, redundant communication between sensor nodes is necessary to propagate data in a large monitoring region. The main objective of this paper is to efficiently disseminate information...
In this paper deal with the problem of asymptotic stability for a class of uncertain stochastic neural networks with discrete-time and unbounded distributed delays. The sufficient conditions to guarantee the robust global asymptotic stability in mean square of an equilibrium solution are given. One example is also given to demonstrate our results.
Datapath merging is an efficient high level synthesis method to merge data flow graphs (DFGs), corresponding to two or more computational intensive loops. This process creates a general purpose datapaths (merged datapaths) instead of multiple datapaths that results in shorter bit-stream length and therefore reduces the configuration time in reconfigurable systems. The merged datapath, however has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.