The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High downlink and uplink speeds are achievable with the aid of LTE. Providing this technology in real life requires scheduling algorithms that will effect the concepts such as throughput and fairness. In this paper some new averaging methods for proportional fair algorithm are proposed. Simulation results show that arithmetic mean method can increase spectral efficiency and fairness performance of...
Software Defined Networks (SDNs) allow a centralized controller to globally plan packets forwarding according to the operator's objectives. The realization of global objectives requires more local forwarding rules. However, the forwarding tables in TCAM-based SDN switches are limited resources. In this paper, we concentrate on satisfying global network objectives, such as maximum flow, with the limitation...
In modern communication networks, the security aspect is very important. Encryption algorithms are used to protect user communication from eavesdropping. Symmetric key algorithms must be used to achieve high speed secured communication. In this paper, we propose and evaluate the pipelined implementation of the Camellia encryption algorithm which has been approved for use by the ISO/IEC. Camellia algorithm...
With the significant attention to information security, mobile terminals such as smartphone always be demand for integrating cryptographic processor. In this paper, a high-efficiency reconfigurable cryptographic processor is presented. Integrating small amounts of computing units designed by reconfigurable technology and developing instruction level parallelism of different operations in a block and...
The development of network services makes their requirements for bandwidth become higher and more various, which leads to difficulty in Quality of Service (QoS) guarantee. In this paper, an OpenFlow switch featuring Weighted Fair Queuing (WFQ) algorithm is proposed. The system is implemented into NetFPGA 1G board which utilizes Xilinx Virtex II Pro 50 technology. The results have shown that our circuit...
The increasing number of vehicles nowadays makes traffic congestion problems, inefficient traffic management cannot solve the jam at intersection. In this paper, we propose an intelligent traffic control scheme which uses the dynamic traffic information. An improved algorithm is given to choose phase matrices for short-term throughput maximization by allocate more durations of green-sign to those...
In this paper, we propose a low complexity algorithm to separate collided RFID signals. By carefully analyzing the collided signals when two tags with the same bit durations respond to a reader simultaneously, we observed that the individual amplitudes of each tag appear in pairs and the two tags' information bits are different, and regular RFID signals with larger amplitudes appear if the two tags'...
In Wireless Mesh Networks (WMNs), many applications are based on broadcast, such as the public security information, weather forecast and live show for users. Besides, broadcast is also a fundamental component of network protocols. Many broadcast approaches has been proposed like flooding and node-based CDS(N-CDS) scheme, but few have promising performance when used in multi-channel scenarios. In...
We present a simulation-based study of the impacts of channel switching overhead on the performance of multicast in multi-channel multi-radio wireless mesh networks (MCMR WMNs). We study how channel switching overhead affects the performance metrics such as packet delivery ratio, throughput, end-to-end delay, and delay jitter of a multicast session.
Irregularity is a recognized problem on many- and multi-core platforms but its effect remains to be studied. This paper focuses on multicore processors and assumes that packet traffic is processed by a large number of parallel jobs in realtime, while each job is implemented as a streaming algorithm. Analysis is performed using a real-life measurement dataset collected especially for this study while...
This paper has researched the theory and design principle of GF (28) multiplication which is widely applied in symmetric cryptograms. With the principles in mind, three kinds of reconfigurable multipliers based on x time, xm modular and product separately have been implemented and their merits and demerits also have been investigated. Having analyzed the mix-column and reverse mix-column transformation,...
Coarse-grained reconfigurable block encryption array (REBA) provides massively parallel computing resources but traditional mapping scheme does not develop the advantages of REBA. In this paper, aiming to improve the performance and resource efficiency of algorithm mapping, we research the structure of familiar block cipher algorithm, and propose the speed-up model based on loop unrolling and the...
In this paper, a high-flexibility and energy-efficient reconfigurable symmetric cryptographic processor architecture is presented, which is based on very-long instruction word (VLIW) structure. By analyzing basic operations and storage characteristics of symmetric ciphers, the application-specific instruction-set system for symmetric ciphers is proposed. Eleven kinds of reconfigurable cryptographic...
With the fast progression of digital data exchange information security has become an important issue in data communication. Encryption algorithms play an important role in information security system. These algorithms use techniques to enhance the data confidentiality and privacy by making the information indecipherable which can be only be decoded or decrypted by party those possesses the associated...
it is known that the more reliable LDPC code is the longer code, and it is also known that LDPC decoders with flooded architecture which allow parallel processing can achieve high throughputs. But, just architectures become very complex and require more hardware resources when the code length is large and random, so achieving a high error correction rate on short code lengths is considered a challenge...
This paper uses the Altera SDK for OpenCL (AOCL) High-Level Synthesis (HLS) tool to accelerate the computation of the SHA-1 hash function. Using FPGAs to increase throughput of this algorithm has been a popular topic in research. The work done thus far, focuses on HDL based design methodologies. The goal of this paper is to determine if the HLS implementation can compare in terms of speed to the HDL...
Cognitive radio (CR) network technology is widely used as a approach to the solve the scarce radio spectrum by allowing the unlicensed users to access the licensed spectrum. Since in the CR network, the licensed users are easily be affected by the introduce of the unlicensed user, we have to avoid to bring the interference to the licensed users when the unlicensed users try to transmit the data on...
This paper proposes a novel forward-backward four-way merger min-max algorithm and low latency check node unit (CNU) architecture for check node processing of nonbinary low-density parity check (NB-LDPC) codes. This algorithm derives simultaneously two output vectors for forward and backward processing in each step. A parallel switch network and parallel-serial elementary computation unit are proposed...
The proliferation of smartphones has unleashed a tremendous growth in wireless traffic, which is projected to continue for the foreseeable future, and put yet greater strain on the capacity of cellular networks. Deployment of pico base stations, reducing cell sizes and allowing more efficient reuse of limited radio spectrum, provides a powerful approach to cope with traffic hot spots and bring capacity...
The EDCA protocol was designed to enhance the functionality of the IEEE 802.11 WLAN through the introduction of different channel access parameter values for different traffic types. This enables some degree of service guarantee for traffic depending on their QoS requirements. While the improved standard has recommended values for the channel accessing parameters, it does not take into account the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.