The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we consider stability of singularly perturbed nonlinear systems affected by time-delays. In particular, we consider the case when trajectories of the boundary layer system of such a system converge to a compact set. By combining the averaging method and the Lyapunov-Razumikhin approach, we obtained sufficient conditions for semi-global and practical stability based on conditions of the...
With the continuous shrinking of process technology, FinFET overpowers conventional bulk CMOS in terms of reducing Short Channel Effect's, channel control, drive strength, high ION/IOFF current ratio. So, FinFET proves to be the best alternative to cope up with the Moore's law and the current semiconductor industry needs. In this paper most active component in Digital circuits, ALU is implemented...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
Reversible logic is an emerging technology with wide spread applications in the field of digital systems. The term RAM refers to memory that is accessed with an address and has latency independent of address. In semiconductor memories RAM usually refers to volatile memory read/write memory as opposed to ROM (read only memory). The 2n×2m×1 RAM has n rows and m columns, out of which one bit is selected...
The internet play an vital role in accumulating the Data, even from different location, easily available to all users all over the world. However, the majority of this data are not of much concern to most of the web users as their interest vary over the time. Nowadays there exists more than a billion web sites providing necessary information to users with precise data within fewer page access delay...
Many fields of science, engineering, finance, mathematical optimization methods, Artificial Neural Networks, signal and image processing algorithms requires the operations and manipulations of real numbers. Floating-point operations are most extensively adopted approach for exploiting real numbers. The speed of Floating-point arithmetic unit is very crucial performance parameter which impinges the...
The structure of modified tree multipliers with different adders is presented. Multiplication is an important fundamental arithmetic operation in all microprocessor circuits and algorithms. Currently the speed of multipliers is limited by the speed of adders used for partial products addition. In this paper Conventional Array Multiplier and Dadda Multiplier are compared with the Wallace multiplier...
Built in Logic Block Observer (BILBO) is a bank of flip-flops which are used for self-testing for complex digital IC's in pipeline approach. As per the Launder's principle, KTln2 heat is dissipated if there is any loss in bit. Since BILBO is designed with irreversible logic gates we observe large amount of leakage power which affects its performance. So by keeping this as main criteria, our paper...
The TCP/IP model is a widely used protocol at present time due to unparalleled popularity of the Internet. Although it is efficient and reliable it does not include the user into its architecture and thus leaves the user without any control over the underlying layers. While the default layering mechanism is set up in such a way that it would give efficient service to most of its clients, it does not...
Dynamic Index coding as a generalization of the traditional index coding problem, deals with transmission of some dynamic data flows in the presence of side information. For a dynamic index coding system, the set of average flow rates for which the system can be stable is named Code-Constraint Capacity region. In this paper, we identify the code-constraint capacity region for a dynamic index coding...
A fundamental problem in QoS (quality-of-service) routing is the multi-constrained path (MCP) problem. The MCP problem used the shortest path with respect to a single edge weighting function as an approximate solution to MCP. For solving MCP problem was offered a lot of methods. One of these methods is based on Lagrangian Relaxation. These algorithms allow finding the shortest paths from the source...
This paper proposes a delay-aware resource provisioning policy for virtualized wireless networks (VWNs) to minimize the total average transmit power while holding the minimum required average rate of each slice and maximum average packet transmission delay for each user. The proposed cross-layer optimization problem is inherently non-convex and has high computational complexity. To develop an efficient...
Today, the transition of traditional networking model to SDN-type architectures poses several major challenges. In typical SDN settings, the routers and switches frequently generate requests to the controller which ensures the proper and efficient operation of the network. Increased workload on the controller results in larger control plane response times, which, in turn, leads to a delayed response...
This paper presents the case for Data Plane Timestamping (DPT). We argue that in the unique environment of Software-Defined Networks (SDN), attaching a timestamp to the header of all packets is a powerful feature that can be leveraged by various diverse SDN applications. We analyze three key use cases that demonstrate the advantages of using DPT, and show that SDN applications can benefit even from...
This paper proposes a delay-aware resource provisioning policy for virtualized wireless networks (VWNs) to minimize the total average transmit power while holding the minimum required average rate of each slice and maximum average packet transmission delay for each user. The proposed cross-layer optimization problem is inherently non-convex and has high computational complexity. To develop an efficient...
The Bluetooth Low Energy (BLE) is one of promising technologies widely used for Internet of things (IoT) services because of its low energy consumption. In IoT, BLE gateways should discover surrounding BLE devices in a short time. However, this requirement is difficult to achieve when the number of BLE devices is very large. As the number of BLE devices increase, the signal density increase, and the...
Traffic flowing through a software defined network is vulnerable to disruptions caused by malicious switches. The malicious behaviors are diverse such as dropping traffic, adding traffic or modifying it. A switch could be malicious or otherwise dysfunctional or misconfigured. A lot of work in SDN has addressed the problem by securing the control plane and having it validate network wide properties...
This abstract presents the synthesis of a conformal timed array for optimum energy patterns during beam-scanning. The study presents a performance evaluation and a design example of the conformal timed array in a half cylinder shape with optimum true-time delays. The particle swarm optimization is used as the synthesis technique. Important remarks are given for designing a conformal timed array.
Arithmetic logic unit (ALU) is an important part of microprocessor. In digital processor logical and arithmetic operation executes using ALU. In this paper we describes 8-bit ALU using low power 11-transistor full adder (FA) and Gate diffusion input (GDI) based multiplexer. By using FA and multiplexer, we have reduced power and delay of 8-bit ALU as compare to existing design. All design were simulated...
Very popular system in VANET applications is collision prevention system that helps to prevent from chain collisions. The system obtain the vehicle information and traffic information during any emergency situation happens. It broadcast the warning messages to other vehicles for automatic break control to prevent collisions. The system sends the emergency message to vehicles in the network, before...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.