Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Both ring-oscillator based clocks and bundled-data designs mitigate the ill effects of process, voltage, and temperature (PVT) variations. They both rely on delay lines which, when made post-silicon tunable, offer the opportunity to add test margin into the design in which the delay line in shipped products is set slower than that which is successfully tested. This paper mathematically analyzes the...
We consider a cloud service based on spot instances and explore bidding and pricing strategies aimed at optimizing users' utility and provider's revenue, respectively. Our focus is on jobs that are heterogeneous in both valuation and sensitivity to execution delay. Of particular interest is the impact of correlation in these two dimensions. We characterize optimal bidding and pricing strategies under...
Unnoticed collisions compromise the success of remote exploratory tasks with mobile robots. We propose a vibrotactile stimulation method to represent frontal collisions that is based on the way people perceive impacts on a bar held with both hands. We observed that to estimate the impact point in a bimanual impact localization task people relied on amplitude and duration differences of the impact...
The task of nondestructive testing and diagnostics of pipeline networks by the method of acoustic tomography is considered. For the detect weak signals in the additive mixture of noise, it is proposed to perform digital correlation analysis of signals based on binary sign-function analog-stochastic quantization. In the process of such quantization is formed limited by the level of bipolar sign signal,...
The main goal of the paper is to present an analysis of the possibility of using faster-than-nyquist signal processing method to improve performance of navigation system. First the faster-than-nyquist concept is introduced and its pros and cons are described. After that the correlation signal processing in radio-nav systems is explained and one typical examle is presented. Demonstrated is the TDOA...
We propose a hybrid architecture to integrate RF (i.e., sub-6 GHz) and millimeter wave (mmWave) interfaces for 5G cellular systems. To alleviate the challenges associated with mmWave communications, our proposed architecture integrates the RF and mmWave interfaces for beamforming and data transfer, and exploits the spatio-temporal correlations between the interfaces. Based on extensive experimentation...
In this paper, a high efficient differential chaos shift keying (DCSK) based on frequency division multiplexing (FDM) communication system, namely FDM-HEDCSK is proposed. The scheme has two branches and a serial-parallel converter to achieve four attainable bit rates and improve communication security in comparison to DCSK. In this scheme, the combination of two chaos signals is used as the reference...
Open source and closed software security has been debated for decades, vulnerabilities reported for both types of software has been under scrutiny for years. In this study, a descriptive and correlation study for two selected systems is conducted using SPSS 19. The results show that the severity score average of Linux kernel vulnerabilities is lower by %30 than the severity score average of vulnerabilities...
A pair of 32 bit Gaussian Random Numbers (GRaNs) is generated. Box Muller (BM) transformation is widely used for generation of high quality Gaussian Random Numbers in hardware. The BM transformation is a direct method to convert random numbers into a Gaussian random numbers. For the generation of uniform random number skip-ahead linear feedback shift register (SA-LFSR) is used which is given as input...
Conventional retransmission schemes for Random Access Channel (RACH) use a uniform random backoff for time of transmission (ToT). It is shown that if the mobile user equipment (UE) velocity and the carrier frequency are known, time-domain correlation statistics of the fading channel can be inferred and then utilized to adapt ToT. A joint metric that trades off between user fairness and opportunistic...
We further delay embedding framework application to multiple time series for extraction of their potential causal interactions. We introduce a novel geometric model-free causality measure that can efficiently detect linear and nonlinear causal interactions between time series with no prior information or parameter estimation. Using multivariate delay embedding, we construct a point cloud from a set...
This paper considers a network of agents generating correlated data according to a known kernel. The correlation structure might undergo a change at an unknown time instant, where the post-change kernel is not fully known. Moreover, due to the data processing and communication costs, only a subset of agents can be observed at any time instant. The objective is to detect the change-point with minimum...
When distances between microphone pairs are larger than the half-wavelength of signals, source localization methods using cross-correlation such as time-difference-of-arrival (TDOA), steered response power (SRP) are commonly used in practice. We present here a novel model that expresses microphone pairwise cross-correlations as a sum of autocorrelations of source signals shifted by the relative delays...
Accurate estimation of spike train from calcium (Ca2+) fluorescence signals is challenging owing to significant fluctuations of fluorescence level. This paper proposes a non-model-based approach for spike train inference using group delay (GD) analysis. It primarily exploits the property that change in Ca2+ fluorescence corresponding to a spike has a notable onset location followed by a decaying transient...
Hardware Trojan (HT) detection methods based on the side channel analysis deeply suffer from the process variations. In order to suppress the effect of the variations, we devise a method that smartly selects two highly correlated paths for each interconnect (edge) that is suspected to have an HT on it. First path is the shortest one passing through the suspected edge and the second one is a path that...
This paper presents time-variant channel characteristics at the 20-GHz band for line of sight (LoS) scenarios in an urban street canyon environment. A measurement campaign is conducted using a channel sounder for the 20-GHz band with a 50-MHz-bandwidth orthogonal frequency-division multiplexing signal. A uniform planar array (UPA) in a 16-by-16 matrix is used on the receiver side to measure time-variant...
There is considerable interest in determining differences between radio channel characteristics in the currently allocated mobile radio frequency bands and bands that might be allocated for this purpose in the future. This paper is therefore devoted to a determination and comparison of channel characteristics caused by multipath (time) dispersion on microcellular mobile radio channels at frequencies...
The Gaussian parallel relay network, in which two parallel relays assist a source to convey information to a destination, was introduced by Schein and Gallager. An upper bound on the capacity can be obtained by considering broadcast cut between the source and relays and multiple access cut between relays and the destination. Niesen and Diggavi derived an upper bound for Gaussian parallel N-relay network...
Eliminating timing violations using clock tree optimization (CTO) persist to be a tedious problem in ultra scaled technologies. State-of-the-art CTO techniques are based on predicting the final timing quality by specifying a set of delay adjustments in the form of delay adjustment points (DAPs). Next, the DAPs are realized to eliminate the timing violations. Unfortunately, it is difficult to realize...
Chaotic systems have been shown to have interesting properties for the generation of spreading sequences in various spread-spectrum applications. The aim of this paper is to exploit the topological features of a time-delay system with appropriate non-linearity to propose sequences having good correlation properties. A novel family of chaotic sequences is proposed as spreading sequences using the Poincare...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.