The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High throughput data transfers across the Internet has become a challenge with deployment of data centers and cloud platforms. In this paper, we propose to utilize the cores of a router to build multiple abstractions of the underlying topology to parallelize end-to-end (e2e) streams for bulk data transfers. By abstracting a different graph for each core, we steer each core to calculate a different...
In this paper, we investigate the energy efficiency (EE) and spectral efficiency (SE) tradeoff in multi-cell heterogeneous networks (HetNets). Our objective is to maximize both EE and SE of the network while satisfying the rate requirement of users. We use multi-objective optimization techniques to define the objective function. We propose a three-stage algorithm in this paper. First, we select the...
This work investigates the problem of channel sensing order in distributed cognitive networks with multiuser, in which the set of active secondary users is randomly changing in each time slot. We model this problem into a non-cooperative game and define a generalized interference metric. The optimization objective is to minimize the generalized interference metric. To cope with this problem, we propose...
Existing researches on the theoretical analysis for Proportional Fair (PF) scheduling are mostly based on the full buffer assumption while the user always has a bursty traffic in reality. In this paper, an analytical framework for PF scheduling in an Orthogonal Frequency Division Multiple Access (OFDMA) wireless network is proposed, and the user traffic is set to follow a poisson arrival process....
Network Function Virtualization (NFV) is a novel paradigm that enables flexible and scalable implementation of network services on cloud infrastructure. An important enabler for the NFV paradigm is software switching, which should satisfy rigid network requirements such as high throughput and low latency. Despite recent research activities in the field of NFV, not much attention was given to understand...
The equipment efficiency plays a great role in the profitability of a manufacturing company. It impacts the throughput, cycle times, costs, and return on investment in manufacturing capacity. This article presents the implementation case study of an Overall Equipment Efficiency (OEE) metric and improvement methods in the semiconductor backend facility (Final Test and Sort). The case study will show...
As most of consumer electronics are connected to the Internet, network attacks can cause massive damage and loss of data to the users. By sending periodic packet bursts to bottleneck routers, Low-Rate Denial-of-Service (LDoS) attacks can degrade the throughput of TCP applications while being hard to be detected. In this paper, we introduce Power Spectrum Density Entropy (PSD-entropy) to detect LDoS...
In this paper, we study the performance of initial access beamforming schemes in the cases with large but finite number of transmit antennas and users. Particularly, we develop an efficient beamforming scheme using genetic algorithms. Moreover, taking the millimeter wave communication characteristics and different metrics into account, we investigate the effect of various parameters such as number...
It is becoming more and more obvious that the challenges regarding tactical radio communication cannot be met by a single static radio waveform. Instead, waveforms with different properties regarding range, robustness, and throughput need to be orchestrated. In order to benefit from the advantages of each radio technology integrated into the transparent tactical radio network, traffic engineering,...
Computer architects use a variety of workloads to measure system performance. For many workloads, the workload configuration determines the stress applied to the system and the corresponding performance behavior. Therefore, architects must make great efforts to explore and find the correct workload configuration before performing detailed analysis. However, such explorations become impossible for...
State-of-the-art GPU chips are designed to deliver extreme throughput for graphics as well as for data-parallel general purpose computing workloads (GPGPU computing). Unlike graphics computing, GPGPU computing requires highly reliable operation. The performance-oriented design of GPUs requires to jointly evaluate the vulnerability of GPU workloads to soft-errors with the performance of GPU chips....
Distributed systems consist of several heterogeneous computing devices. In such systems, the total cost of ownership (TCO) includes capital expenditure such as purchasing of equipment like servers, switches, etc. and operational expenditure such as human salary, electricity bills, etc. Thusly, power consumption is a big portion of operational expenditure. The high rate of power wastage is directly...
Combined (soft-hard) method for decoding block turbo-product codes is proposed in the paper. The method allows leveraging advantages of soft input data usage with the speed of hard-decoding procedure. The main peculiarity of the method is rule-based decoding stage. The proposed approach simplifies calculation procedure and reaches better correction ability than hard-decision decoder. Mathematical...
LTE networks are deployed to increase capacity and coverage especially for the indoor and cell-edge mobile users. However, such deployment comes with major challenges, radio resource management and inter-cell interferences. Fractional Frequency Reuse mechanism (FFR) is one of the most effective interference avoidance techniques. In this paper, we evaluate an existing adaptation process that adjusts...
Background/Objective: Interior gateway protocols are used for communication between devices in an organizational network. The setup which includes routers, switches and hosts is simulated in GNS3 software to represent a complex real time enterprise level network. Each protocol is implemented in the designed topology. Methods/Statistical analysis: Interior gateway protocols-RIP (Routing Information...
Semantic web services represent the potential of the web and they have significant impact on the discovery process. Due to the high proliferation of web services, selecting the best web services from functional equivalent service providers have become a real challenge when a large number of services have been published in a registry. If these services have been functionally-equivalent, it is difficult...
The placement of the Last Level Cache (LLC) banks in the GPU on-chip network can significantly affect the performance of memory-intensive workloads. In this paper, we attempt to offer a placement methodology for the LLC banks to maximize the performance of the on-chip network connecting the LLC banks to the streaming multiprocessors in GPUs. We argue that an efficient placement needs to be derived...
Effective interference evaluation methods are crucial when making regulatory decisions about whether new wireless technologies should be allowed to operate. Such decisions are highly relevant for both DSA technologies in licensed bands and for technologies coexisting in unlicensed bands. In this paper we demonstrate the benefit of risk-informed interference assessment as an effective method that aids...
In this work, we do an empirical approach to identify 802.11n technology Train to Ground communication specifics in underground applications from an industrial point of view. The equipment for the measurements was located aboard and along a track. The experiments consisted on measuring signal to noise ratio levels and beacon loss along a standard train cycle for physical layer performance assessment...
Wi-Fi Mesh Community has turn out to be an important area community to offer internet to challenge the thrown domains and wireless link in metropolitan environments. In this paper, hassle of figuring out the most to be had bandwidth direction is targeted, which is an essential problem in helping pleasant-of-carrier in WMCs. Due to the concept of interference, bandwidth, which is a familiar challenging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.