The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper discusses the problem of location a mobile cellular terminal within an urban, multipath-rich environment, using available geographical information such as terrain and building maps. The method suggested in the paper is the use of ray tracing in order to characterize the propagation environment. The paper focuses on single antenna location, namely a trilateration — based algorithm and suggests...
We consider Quality-of-Information (QoI) aware transmission policies in the presence of time-varying links in a mobile ad hoc network. QoI, tailored for military tactical networks, is defined by a set of attributes relevant to the application. Time-varying nature of links in practical networks leads to uncertainty in evaluating QoI utility to be delivered to end users. This delivered-QoI utility is...
This paper presents a single-channel programmable muscle stimulator. The charge balance of the proposed stimulator is achieved using the concept of the dual-slope analog-to-digital converter (ADC). This approach negates the need for precise current matching between cathodic and anodic current, which is usually required in order to achieve good charge balance. In the dual-slope concept, the charge...
We present a versatile method that enumerates all or a user-specified number of longest sensitisable paths in the whole circuit or through specific components. The path information can be used for design and test of circuits affected by statistical process variations. The algorithm encodes all aspects of the path search as an instance of the Boolean Satisfiability Problem (SAT), which allows the method...
This paper formulates an approximate linear programming (LP) approach to the minimax design of odd-order finite-impulse-response (FIR) variable fractional-delay (VFD) digital filters. The basic idea is to constrain the complex-valued frequency response errors of an odd-order VFD filter inside a hexadecagon. This converts non-linear constraints into linear ones and thus nearly-optimal minimax design...
To carry out the maintenance and analysis of communication networks, the network maintenance personnel must achieve real-time, accurate collection of signaling data of communication network. But the delay in the actual link signaling data transmission process is inevitable. If not take the delay correction will seriously affect the accuracy of the follow-up signaling message handling. This paper presents...
As the generalized cross-correlation method has high real-time in the delay Algorithm, when the experiment environment is the a priori knowable, Generalized cross-correlation algorithm is usually used. The pre-filtering of the generalized cross-correlation method has a greater impact on the accuracy of time delay estimation, for the problem that how to effectively use the generalized cross-correlation...
Time synchronization is the necessary technique to implement automation system in smart substations. It provides the accuracy time stamp mark used for data acquisition and used to analyze and deal with the power system fault. As a type of clock synchronization used in network with high precision, IEEE1588 is widespread applied recently in smart substations. This paper analyzes the reason of clock...
In the nanometer era, there is a critical need for low power design. In this paper we employ voltage scaling in a new sophisticated manner to reduce the power consumption of a particular circuit targeted for noise-tolerant applications. We show that we can save up to 40 times in power consumption in the case of applications that can tolerate long delays. On the other hand, we investigate how far we...
Wireless Sensor Networks (WSNs) have proliferated significantly in recent years. Nowadays they are used in many fields, such as military, environmental and industrial. Reliability and low latency are desirable characteristics of many WSN applications. In particular, time-critical WSN applications must be able to act according to the observed changes in the environment as quickly as possible, assuring...
We consider the problem of failure management in wireless sensor networks (WSN). In such networks, nodes can be subject to frequent failures due to energy depletion and the hostile deployment environment. Our work focuses on local crash process detection in WSN considering intermittent failures due to lossy radio links. As a part of this problem, we introduce a new type of Adaptive Neighborhood Failure...
With the advance of the process technologies into deep sub-micrometer domain, crosstalk between adjacent wires of global interconnects has become more severe. The delay caused by the crosstalk becomes a bottleneck to system performance, especially those with global interconnects. To alleviate crosstalk delays, accurate delay models are needed. In particular, analytical models are more desirable for...
Proximity sensors are increasingly used in distributed monitoring applications, e.g. for surveillance purposes. However, most of existing solutions have two different, usually contrasting requirements, i.e. either they have strong directional features, or they just cover very short distances. In order to tackle such issues, in this paper a new, almost omnidirectional proximity detection technique...
Different from the traditional military network model, this paper proposes a new Operation System of Systems (OSoS) model—FINC-E Model (Force, Intelligence, Networking, and C2, Extended Model) which provides the formulization framework for nodes and edges of the OSoS. Secondly, a new index—edge key potential is proposed, which acts as the measurement of the edge's importance, meanwhile the performance...
A number of studies show that most of current probing tools, for available bandwidth, exhibit low accuracy, and slow convergence in Home Networks. Some reasons of this behavior include the high queuing variability of probing flows, which is induced by multiple-access mechanisms, time-variant capacity links of hybrid paths, and the instability of beta probing tools. Considering these constrains of...
The research deals with the synchronization of the signals to trigger Measurement Instruments (MIs) cooperating in the distributed measurement system. Due to the hardware and software architecture of the Trigger Generator (TrG) common available (es. PC), the signal is received by MIs with random delay. Solution based on Embedded Synchronizing Hardware (ESH) was proposed to ensure synchronization accuracy...
Indirect-branch prediction is becoming more important for modern processors as more programs are written in object-oriented languages. Previous hardware-based indirect-branch predictors generally require significant hardware storage or use aggressive algorithms which make the processor front-end more complex. In this paper, we propose a fast and cost-efficient indirect-branch prediction strategy,...
Several microphone arrays, such as planar four-element array, symmetric three-dimensional square array, planar five-element cross array are common single arrays, which to be used in passive acoustic location with a relatively high frequency. In different articles, an array may be placed in a different way, for example, turned the array at an angle along the z-axis (e.g.90¡ã). The relationship between...
By analyzing the periodicity of autocorrelation functions (ACF) and average magnitude difference functions (AMDF), we present a pitch tracking method based on correlations of mixing ACF & AMDF algorithms. First, we calculate the normalized autocorrelation functions and normalized average magnitude difference functions, and then select a reasonable interpolation parameter from the experiments,...
Many algorithms have been proposed in the last decade to detect traffic anomalies in enterprise networks. However, most of these algorithms cannot detect anomalies that occur beyond enterprise boundaries. Anomaly monitoring and detection on end-to-end Internet paths, although important for network operations, is challenging due to lack of access and control over intermediate network devices. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.