The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current network architecture suffers overloading due to extensive resource utility. This paper proposes a resource mapping algorithm upon service layer of service-based network: the unit of service component requests resource as well as limits; an agent is embedded in the component to surveil the utility of network resource. If network resource violates the limits, agent will punish the component...
Floating-point arithmetic plays major role in computer systems. Many of the digital signal processing applications use floating-point algorithms for execution of the floating-point computations and every operating system is answerable practically for floating-point special cases like underflow and overflow. The single precision floating point arithmetic operations are multiplication, division, addition...
Orthogonal frequency division multiple access is a technique in which single data stream is transmitted with small rate of subcarriers. OFDM system needs FFT processor for generation of subcarriers. A Radix-2 Based 32 bit and 64 Point Pipeline FFT Processor Using bit parallel multiplication process for OFDM system is presented in this paper. Proposed architecture uses single path delay feedback FFT...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
Delay Tolerant Network (DTN) is primarily and specifically a class of MANET that is challenged. The working principle of DTN illustrates the mechanism to store information and carry it till some capable node is found and then a message is forwarded. This kind of implementation has found application areas like sparse and constrained networks. This paper explains the design specification issues of DTN...
Nowadays, the demands for composite services with devices such as sensors/actuators and Web services have increased [1]. Many kinds of cloud services that can connect to real world, as typified by image recognition or speech recognition has come into widespread use to address the limitation in information processing on devices. In that situation, sensors are also provided as sensor services that senses...
In this paper, we address the problem of routing disruption attacks in Cognitive Radio Networks (CRNs). In routing disruption attacks, the malicious node intentionally drop data packets to consume more network resources or degrade routing performance. We propose a trust management model to mitigate such attacks in CRNs. Through monitoring forwarding behaviors of secondary users (SUs), trusts of SUs...
Delay-tolerant Network (DTN) is a computer network architecture that operates effectively over an extreme distance and communicates with heterogeneous networks that may affect the continuous network connectivity. DTN is particularly useful for the areas in which there are no direct connection (either physical or wireless) between source and destination over a long distance, as it can overcome the...
In real-time multicast, delay and inter-destination delay variation of group members are bounded above by a value. The problem is known as Delay and Delay Variation Bounded Multicast Tree (DVBMT), which is proven to be NP-complete. In this paper, we propose a directional approach (DCS) for core selection and tree generation satisfying delay and inter-destination delay variation constraints. After...
A lot of research shows that network coding can significantly improve the performance of multi-cast transmission. However, due to the inherent disadvantage of network coding, it is very vulnerable to pollution attacks in which adversaries can inject bogus data. Moreover, those bogus data will be used with legitimate data at the downstream nodes, resulting in the failure of decoding original data as...
Access latency is a crucial performance metric in distributed storage systems as it greatly impacts user experience, especially for hot data visitors. Existing papers argue that coding can reduce access latency compared with the replication method, and many dispatch schemes, such as those implementing redundant requests, dynamically changing code rates, and so on, are proposed and proved to work well...
Idle periods on different processes of Message Passing applications are unavoidable. While the origin of idle periods on a single process is well understood as the effect of system and architectural random delays, yet it is unclear how these idle periods propagate from one process to another. It is important to understand idle period propagation in Message Passing applications as it allows application...
The backward observability (BO) of a part of the vector of trajectories of the system state is tackled for a general class of linear time-delay descriptor systems with unknown inputs. By following a recursive algorithm, we present easy testable sufficient conditions ensuring the BO of descriptor time-delay systems.
This paper proposes a systematic method to analyse the stability of systems with single delay with coefficient polynomial depending on the delay. Such models often arise the describing dynamics in Life Science and Engineering systems. A method was presented by Beretta and Kuang in 2002. Their work extends their results to the general case with the exception of some degenerate cases. The interval of...
Through network function virtualization (NFV), telecom providers aim to flexibly re-use generic-purpose hardware to provide services on-demand and in an agile way. Service function chaining is becoming the preferred model to describe the characteristics of the packet-processing network functions which, together, form these services. NFV allows for network function embedding freedom, creating new dynamics...
The past century of telecommunications has shown that failures in networks are prevalent. Failure recovery processes are therefore needed. Failure recovery is mainly influenced by (1) detection of the failure, and (2) circumvention of the detected failure. However, especially in SDNs where controllers recompute network state reactively, this leads to high delays. Hence, next to primary rules, backup...
In digital circuit multiplier plays an important role. They are useful in many applications like arithmetic and logic unit, MAC(multiplication and accumulator) and DSP(digital signal processing).In this paper a VEDIC multiplier proposed “urdhva tiryagbhyam Multiplication” using MCLA(Modified Carry Look ahead Adder). Speed is one of the parameter of any digital circuit so to improve the speed of the...
A double-tail sense amplifier (DTSA) is designed as a drop-in replacement for a conventional SRAM sense amplifier (SA), to enable a robust read operation at low voltages. A pre-amplification stage helps reduce the offset voltage of the sense amplifier by magnifying the input of the regeneration stage. The self-timed regenerative latch simplifies the timing logic so the DTSA can replace the SA with...
A high-speed transmitter for serial link interface was synthesized by using only Verilog codes and digital standard cells. The transmitter employs a differential voltage-mode architecture with a 2-tap feed-forward equalizer (FFE). A delay line which is locked to a data period is used for the FFE operation because a high speed flip-flop is not available in standard cells. The proposed transmitter chip...
This paper presents a multicast Delay Tolerant Network (DTN) routing protocol that uses an economic gain based routing utility for device-to-device (D2D) commercial coupon dissemination. Majority of the existing DTN routing approaches are not practically applicable to commercial content dissemination since they attempt to individually optimize performance indices such as message delay, forwarding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.