The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In previous works, delay tolerant codes were proposed with variable length ensuring a full transmit diversity for a certain interval of delay profiles. The code performances are enhanced when the code length is incremented; however, this causes an increasing complexity at the receiver which motivates our research for low complexity decoding methods. First, it is shown that optimal decoding methods...
This paper proposes a new circuit design optimization method where Genetic Algorithm (GA) with parameterized uniform crossover (GApuc) is combined with Taguchi method. The purposed are (a) using Taguchi method to search for optimal fitness value and (b) evaluating the power and signal delay of logic blocks in circuit design to get an optimum circuit in complexity, power and signal delay. The present...
The design of packet schedulers involves a tradeoff between implementation complexity, on one hand, and delay and fairness guarantees, on the other. In this paper, we present worst-case fair bin sort queuing (WBSQ), a new scheduler that has good worst-case fairness and delay properties, yet has low complexity and is amenable to simple hardware implementation. WBSQ achieves this performance by combining...
This paper presents several novel acquisition algorithms for time-variant multipath channels. To acquire several closely-spaced multipath channel delays and multipath Doppler frequencies, our novel acquisition methods resort to low complexity high resolution subspace estimators. The low complexity high resolution subspace estimators perform a coherent estimation of the sample covariance matrix, which...
A new coding concept called credit-based variable-to-variable length (cbv2v) coding is proposed in this paper. A binary cbv2v code is constructed, and analysis of its performance shows that cbv2v coding can achieve much better trade-off among the coding delay, redundancy, and space complexity than does variable-to-variable length (v2v) coding. Specifically, let L be the total number of source words...
This paper presents an efficient RNS scaling algorithm for the balanced special moduli set {2n−1, 2n, 2n+1}. By exploiting the relationship between the scaling constant and the residues of the three-moduli set using the New Chinese Remainder Theorem I (New CRT-I), the complicated modulo reduction operations for large integer scaling in RNS can be greatly simplified. The scaling constant has been chosen...
This paper presents a temporal method for direction of arrival (DOA) estimation for wideband sources by using an antenna array. Existing DOA estimation algorithms treat the problem in frequency domain by decomposing the wide spectrum of these signals in several narrowband signals, and use a narrowband DOA estimation methods to solve the problem. These methods suffer from high computational complexity...
This paper investigates a capacitated lane reservation problem in a transportation network. The problem is to decide the task paths and select lanes to be reserved in a capacitated network to ensure that each commodity can be transported from its source to destination within a given travel time, meanwhile the lane's capacity is not violated. Its objective is to minimize the total impact of all reserved...
We propose a symbol-by-symbol (SBS) detector for Gaussian minimum shift keying (GMSK) signals in body area networks (BAN). Our detector exploits the orthogonality between adjacent GMSK-modulated symbols. By dividing the received signals into inphase-/quadrature-channels and odd-/even-streams, the strongest inter-symbol interference (ISI) from the adjacent symbols is removed. A whitened matched filter...
Spectrum sensing is the first key functionality to realize Cognitive Radios which also meet harsh performance demands under various severe conditions, e.g. the reliability and sensitivity demands under the low sensing overhead constraint. Cooperative sensing exploiting SPRT is an efficient sensing method which can significantly decrease sensing delay and sensing overhead, thereby, has been extensively...
This paper addresses the communication modelling and synthesis problem for applications implemented on networks-on-chip. Due to the communication complexity of such systems it is difficult to estimate the communication delay. On the other hand, guaranteeing the timing constraints without detailed know-how about the communication is impossible. In this work we propose a communication modelling and...
Growth Of Verification Complexity ASIC/SOC design size and complexity is growing at unprecedented rates, and this is driving more than exponential growth in the verification effort for these designs. This in turn is driving increasing investment in the HW infrastructure needed to support verification - to the point of becoming unsustainable. Even when companies can afford the cost of such expansion,...
Emerging applications of wireless sensor networks (WSNs) require real-time event detection to be provided by the network. In a typical event monitoring WSN, multiple reports are generated by several nodes when a physical event occurs, and are then forwarded through multi-hop communication to a sink that detects the event. To improve the event detection reliability, usually timely delivery of a certain...
In this paper a relation between graph energy and electrical energy or power consumption with graph nodes and edges for PPA structures is introduced. The Sklansky PPA is selected as the target PPA and its recursion steps limited. This reduced the internal nodes of the PPA. The reduction of nodes and edges and limiting the recursive stages to maximum 8 steps, resulted in proposed adder I and using...
We present a framework to facilitate the inter-domain multipath routing for carrier networks that are based on circuit switching technologies, without significant changes to the existing inter-domain protocols. We first introduce a simple mechanism, namely, Single Routing Plane Multipath (SRPM) which can be easily implemented in the existing PCE-based inter-domain architectures. The main idea behind...
Considering ISI brought by high transmission rate in short-range IR-UWB, this paper proposes innovative low-complexity equalization for high data rate on-off keying IR-UWB energy detection (ED) receiver capable of eliminating ISI. We propose second-order Volterra model equalizer to eliminate ISI, and innovative approximate improved linear equalizer which has low complexity. The simulation results...
Collaborative applications (online games, video-conferencing, distributed large-scale simulations) on overlay networks are continually growing in popularity. These applications require a multicasting sub network which has messages arriving at the destinations within a specified delay bound. They also require that all the destinations receive the message from the source at approximately the same time...
Recently, a maximum-likelihood channel parameter estimator was proposed by the authors for joint communication and positioning. The parameters of the physical channel (e.g. amplitudes and propagation delays of the propagation paths) are estimated jointly with the channel coefficients of the equivalent discrete-time channel model by exploiting a priori information about pulse shaping and receive filtering...
Cryptography plays an important role in the security of data transmission. The Advanced Encryption Standard (AES) is the newly accepted symmetric cryptography standard for transferring block of data securely. However, the faults that accidently or maliciously occur in the hardware implementation of this standard may cause erroneous encrypted/decrypted output that results in losing the original message...
In this paper, we propose a novel min cut based algorithm for multiple supply voltage assignment under timing constraints. Different with the traditional sensitivity based methods which focus on how to make full use of the slacks of non-critical gates, the proposed algorithm concentrates on critical gates. The circuit is initialized in the lowest power level, then the length of critical paths is tried...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.