Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We describe an emerging application of data mining in the context of computer networks. This application concerns the problem of predicting the size of a flow and detecting elephant flows (very large flows). Flow size is a very important statistic that can be used to improve routing, load balancing and scheduling in computer networks. Flow size prediction is particularly challenging since flow patterns...
Through network function virtualization (NFV), telecom providers aim to flexibly re-use generic-purpose hardware to provide services on-demand and in an agile way. Service function chaining is becoming the preferred model to describe the characteristics of the packet-processing network functions which, together, form these services. NFV allows for network function embedding freedom, creating new dynamics...
An improved clock data recovery (CDR) operating at 40 Gb/s is implemented in 65 nm CMOS technology. Passive low-pass filters (LPFs) with adaptively adjusted bandwidth are introduced into the data-sampling path to automatically balance jitter tracking and jitter suppression for data decisions. Additionally, a time-averaging based compensating phase interpolator (PI) is proposed to not only improve...
A reference-free stochastic ADC is proposed by utilizing both spatial averaging and oversampling noise-shaping schemes. By implementing multiple VCO-based quantizers in parallel, stochastic spatial averaging for quantization errors is inherently obtained. In addition, 1st-order noise shaping of a VCO-based quantizer is achieved in an open-loop oversampling configuration. By resolving a faster conversion...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
An important aspect in providing Internet access is the cost for both fronthaul as well as backhaul connectivity, ultimately providing the access to the wider Internet content and services to the local community. The proliferation of media-rich content has led to a dramatic increase of backhaul costs, while creating pinching points in the often also limited fronthaul network that faces the end users...
This paper introduces a simple and effective model order reduction approach based on singular value decomposition (SVD) and aimed to electromagnetic transient (EMT) analysis. The proposed approach initially adopts a rational approximation obtained by the vector fitting (VF) software tool for an arbitrary frequency range. Then, it applies SVD-based truncation separately to low-frequency range and to...
WiFi offloading has been exploited as a quick and viable solution to decrease the burden on cellular networks. In this paper, we study the problem of deploying new WiFi access points (AP) in a city-wide area for offloading purposes. Different than previous work which look at the problem only from operator's perspective and targets the maximization of offloaded traffic volume, we approach the problem...
The problem arises when there is no tool that can help users to make best decision for choosing provider that meets user requirements satisfactorily. Available tools only compare the services of providers without considering user requirements. Thus the objective of this paper is to present a tool, called PTUR to meet the requirements and satisfaction of user from the selected providers that are ranked...
Proofs of Retrievability (POR) is a scheme to build a verifiable storage on a remote server that a client can access the data randomly, and periodically execute an efficient Audit protocol to ensure that the data is intact. In dynamic POR, the difficulties are to maintain the latest version of the data while achieving efficient Update and Audit. In this paper, we propose PDPOR that achieves the best...
Nowadays, lots of people concern about the privacy violation in the video surveillance systems widely utilized in order to protect people and their properties. Various protection techniques have been proposed to protect the privacy-sensitive information in the video surveillance and they properly provide the protection. Unfortunately, the video compression rate and the energy consumption have not...
To deal with urban traffic congestion, this paper proposes an actuated green wave method. It extends an arterial actuated bandwidth method to network situations. The arterial bandwidth is based on several key temporal differences to determine phase patterns and offsets. The network is decomposed in such a way that it only consists of arterial bandwidth problems. It adds intersections from the start...
The work addresses classification of EEG signals into seizure and non-seizure by applying EMD and SVM with proposal of new feature Root Mean Square (RMS) frequency and feature using Hilbert marginal spectrum which overcomes the drawback of feature instantaneous bandwidth. We have success in achieving the consistency with the new features which shows classification average accuracy of 97.72% and highest...
Large teams of robots that operate collectively, whose behavior emerges from local interactions with neighbors, are known as swarms. While significant progress has been made improving the hardware, communication capabilities, and autonomous operation of these swarms, we still have much to learn about how human operators control and interact with them. This research is necessary if real world swarms...
The storage-bandwidth tradeoff of linear and exact-repair regenerating codes is considered. An outer bound on the storage-bandwidth tradeoff is proposed for arbitrary (n, k, d) case. n, k, and d denote typical code parameters of regenerating codes. The proposed outer bound becomes tighter than other existing outer bounds as k gets closer to n. In addition, for the case of d = n − 1, it is shown that...
We provide a bound on the ϵ-entropy of square-integrable bandlimited waveforms in terms of their energy and of the spatial extension of the domain where they are observed. This result is closely related to the largest amount of information that can be contained in a physical system of a given size, known as the Bekenstein universal entropy bound.
This paper presents a five-order Butterworth low-pass filter with DC offset cancellation (DCOC) for WLAN Applications in a 65-nm CMOS process. The low-pass filter employs transconductance cell instead of conventional two-stage amplifiers to avoid internal poles which may otherwise cause the reduction of GBW. In order to achieve an appropriate 1-dB bandwidth of the integral filter, extra parasitic...
Generally in practice there are Optical Fiber, Waveguides, Satellite Communication, Coaxial Cable and copper Wire which are utilized by the heterogeneous and homogeneous networks to offer wider range of data and voice communication to the end users. In future as the demands for bandwidth increases for the purpose of communication, this results into imbalance of the traffic load. To provide addition...
This paper proposes a new method of output optimization for a wideband vibration-based impact mode piezoelectric power generator. The method utilizes indirect impact configuration so that the impact forces will be optimally transferred to the device. As a result, at certain frequency, the peak voltage increases by 4.3 times that of the direct impact configuration.
Storage backend characterization is vital to the workload aware storage platform which aims at providing optimal mapping between storage workloads and backends. Storage benchmarking as one major activity in the path of backend characterization, is very challenging due to the diversity and complexity of the storage environments. In this paper, we present our storage benchmarking design and implementation...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.