The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-Path TCP (MPTCP) boosts network performance of applications by aggregating bandwidth over multiple paths using sub-flows of the same TCP connection. However, MPTCP suffers from three limitations: (1) it is an end-to-end protocol with no control over the network routes, and sub-flows might end up traversing the same links, (2) it has no dynamic control over choosing the optimal number of sub-flows...
Network research relies on packet generators to assess performance and correctness of new ideas. Software-based generators in particular are widely used by academic researchers because of their flexibility, affordability, and open-source nature. The rise of new frameworks for fast IO on commodity hardware is making them even more attractive. Longstanding performance differences of software generation...
For the incoming 5G mobile communications, enhanced cell coordination is deemed as crucial to maximize network throughput. In this paper we focus on the impact that the placement of coordination controllers in the metro optical network has on the performance of cell coordination, and we aim at verifying how throughput maximization can be achieved through optimized controller placement. Specifically,...
In recent years, multiple neuromorphic architectures have been designed to execute cognitive applications that deal with image and speech analysis. These architectures have followed one of two approaches. One class of architectures is based on machine learning with artificial neural networks. A second class is focused on emulating biology with spiking neuron models, in an attempt to eventually approach...
Radiation power from the base station is highly hazardous to the human health. Macro cell environment with the aim of providing better QOs services to the mobile user are careless about the radiation power. Femto cell is an emerging cellular concept which can cater to the need the required QOs and at the same time with the base stations radiating less power. In this paper, an UMTS network with Macro...
State-of-the-art GPU chips are designed to deliver extreme throughput for graphics as well as for data-parallel general purpose computing workloads (GPGPU computing). Unlike graphics computing, GPGPU computing requires highly reliable operation. The performance-oriented design of GPUs requires to jointly evaluate the vulnerability of GPU workloads to soft-errors with the performance of GPU chips....
Markov Chain Monte Carlo (MCMC) algorithms are used to obtain samples from any target probability distribution and are widely used in stochastic processing techniques. Stochastic processing techniques such as machine learning and image processing need to compute large amounts of data in real-time, thus high throughput MCMC samplers are of utmost importance. Parallel Tempering (PT) MCMC has proven...
Pipe-and-Filter (P&F) is a well-known and often used architectural style. However, to the best of our knowledge, there is no P&F framework which can model and execute generic P&F architectures. For example, the frameworks Fastflow, StreamIt, and Spark do not support multiple input and output streams per filter and thus cannot model branches. Other frameworks focus on very specific use...
Hierarchical temporal memory (HTM) is the model of the neocortex functionality, developed by Numenta, Inc. The level of implementation does cover only the subset of actual neocortex layers functionality, but, however, is sufficient to be useful in different domain areas e.g. for a novelty or anomaly detection. Numenta provides their implementation of the HTM for commercial or research purposes as...
In this paper we present a data-driven power control (DDPC) approach to improve total cell throughput and energy efficiency of ultra-dense femtocells. Although femtocells can increase the capacity and coverage in an indoor environment, ultra-dense femtocells may consume a lot of energy and generate severe interference. We investigate a data-driven clustering approach to reduce co-tier interference...
The distinction between the radio access network and the backhaul network is disappearing with emerging advanced features. The backhaul is invading the radio assess spectrum to enable wireless in-band connections and the radio network is overlapping with the transport network through cloud processing and distributed functions. As such, it is of pivotal importance to approach the optimisation of the...
Named Data Networking is a new data centric kind of communication network. This paper shows the study about NDN network and applies this architecture over Vehicular ad-hoc networks so that performance of network improves and communication becomes faster. At the end of simulation results are discussed in the form of packet delivery ratio, throughput, good put, routing overhead and various network parameters...
Multichannel active noise control (MCANC) systems are commonly used in acoustic noise or vibration control, such as large-dimension ventilation ducts, open windows and mechanical structures. However, its computational load far exceeds the capabilities of digital signal processors (DSPs) and microcontrollers. Even the field programmable gate array (FPGA) cannot straightforwardly cope with the exponential...
In this paper, we evaluate the performance of two WMN architectures considering throughput, delay and fairness index metrics. For simulations, we used ns-3. We compare the performance for two architectures considering different transmission rates and OLSR protocol. The simulation results show that for 100 [kbps] transmission rate, the throughput of Hybrid WMN is higher than I/B WMN. But, for transmission...
In recent years, connected component analysis (CCA) has become one of the vital image/video processing algorithms due to its wide-range applicability in the field of computer vision. Numerous applications such as pattern recognition, object detection and image segmentation involve connected component analysis. In the context of camera-based inspection systems, CCA plays an important role for quality...
A refresh free and scalable ultimate DRAM (uDRAM) bitcell and architecture is proposed for embedded application. uDRAM 1T1C bitcell is designed using access Tunnel FETs. Proposed design is able to store the data statically during retention eliminating the need for refresh. This is achieved using negative differential resistance property of TFETs and storage capacitor leakage. uDRAM allows scaling...
These days, microservice architecture is widely used in the design and development of many real-time, critical, and large-scale online services. These services are typically deployed using Docker containers on cloud platforms. Container technology supports the deployment of these services with high portability, scalability, and performance, when compared to deploying them using virtual machines (i...
Higher throughput is always desired in real time image processing applications. There are many ways to achieve higher throughput. However, if we have additional resources and memory bandwidth available, parallelism can be applied to achieve it. In this work, we have presented two image scanning methods that carry out parallelism to double the throughput of any architecture. Partitioned image scanning...
Software has gained its importance in all aspects of every walk of life. Algorithms play a vital role in ensuring the successful operation of any software. According to the applications, various algorithms have been designed in order to accomplish the desired goals. This paper therefore aims to provide an insight on significance of performance and further, throw light on various matrix multiplication...
In the information security field, varions algorithms are applied to provide users with a variety of security services. Although many of the algorithms are implemented in software, there is a rapidly growing demand for hardware implementations. The BlaMka algorithm is a cryptographic sponge algorithm, used in password hashing schemes (PHS) such as Lyra2 and Argon2, which are algorithms that generate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.