The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless intelligent transport systems based on Car-to-X communication technology are about to enter the mass market in upcoming years. Thereby, efficient and reliable security systems are a core point of concern in system design. Currently regarded digital signature schemes using pseudonym certificates can introduce significant overhead into the highly bandwidth restricted system. Thus, mechanisms...
In this digital era, Internet has become the most widely used media of communication. Numerous critical services like e-commerce, social media, online banking are based on the Internet, so non-availability of Internet may lead of financial, social and legal implications. DDoS attacks are the most serious attack that hampers the availability of Internet. Their major aim is to deny the services of the...
Numerous research groups and other organizations collect data from popular data sources such as online social networks. This leads to the problem of data islands, wherein all this data is isolated and lying idly, without any use to the community at large. Using existing centralized solutions such as Drop box to replicate data to all interested parties is prohibitively costly, given the large size...
The Internet of Things (IoT) has a significant effect on the evolution of modern Information and Communication Technology. It reshapes the traditional network infrastructures with novel hardware and software technologies. In this work we analyse the IoT platforms from the communication architecture point of view and we evaluate the effects of the communication anomalies on different edges of the data...
A detailed understanding of HPC application's resource needs and their complex interactions with each other and HPC platform resources is critical to achieving scalability and performance. Such understanding has been difficult to achieve because typical application profiling tools do not capture the behaviors of codes under the potentially wide spectrum of actual production conditions and because...
In this work, we present the characterization of a set of scientific kernels which are representative of the behavior of fundamental and applied physics applications across a wide range of fields. We collect performance attributes in the form of micro-operation mix and off-chip memory bandwidth measurements for these kernels. Using these measurements, we use two clustering methodologies to show which...
To understand better what happens when video streaming takes place, this paper introduces a framework to simulate a real-time video streaming over wireless channels. The system is divided into many modules and is simulated with different tools. DUMMYNET is used for the network simulator while FFMPEG is for coder/encoder and sender/receiver module. The video quality is measured by spatial (SSIM and...
This paper aims to investigate the resource allocation problem in a relay-assisted OFDMA cognitive radio (CR) system. Different from conventional CR resource allocation problems, a joint bandwidth and power optimization framework using the bandwidth-power product metric is proposed. Besides, rate requirement of the secondary system is satisfied and interference power at the primary receiver is limited...
In Mobile ad-hoc networks (MANET), QoS protocols includes the intermediate nodes which have sufficient resources along the route, from source to destination. Nodes may turn non cooperative when they are running with shortage of resources, which weakens the effectiveness of the protocol. The proposed model (Uncertain Rule-based Fuzzy Logic QoS Trust Model in MANETs -FQTM) selects the nodes which are...
This document presents cross-polarisation ratios (XPRs) of propagation paths measured in indoor 70 GHz channels. To the best of authors' knowledge, very few polarisation measurement results of millimetre wave channels have been reported. The channel measurements are performed in large indoor short-range scenarios such as offices, a shopping mall, and a railway station. Due to the large measurement...
A sinusoidally corrugated periodic Bull's-Eye leaky wave antenna operating at 77 GHz is numerically and experimentally analyzed. Gain enhancement and bandwidth narrowing are observed as the number of periods is increased. Numerical and experimental results are in good agreement for the fabricated 20 period sinusoidal structure, showing a 28.9 dB gain with less than −20 dB side lobe level and a very...
The large bandwidth of ultra wideband (UWB) makes it attractive in high speed transmission applications. However, the possibility of frequency selectivity of the channel is high due to this bandwidth. Channel characterization is important to study the behavior of the channel. The ground reflection effects are important parameters affecting the ultra wideband channel. In this paper, based on outdoor...
Heterogeneous networks principally composed of macro-cells overlaid with small cells (e.g., Femtocells, pico-cells, and relays) can potentially improve the coverage and capacity of existing cellular networks and satisfy the growing demands of data throughput. In Het Nets, small cells play a key role in offloading user data traffic from congested macro-cells and extending the limited coverage of macro-cells...
Although cooperation among individuals plays a key factor in the commercial development of wireless networks, trust is an important factor due to the uncertainty and uncontrollability caused by the self-organizing character of different entities. In this paper, we present a trust-based user assignment scheme by considering node sociality, the reason behind is that effective user assignment should...
To meet the challenge of the ever-growing traffic volume in current wireless communications, ultra-dense network (UDN) deployment with high system capacity has attracted wide attention in recent years. However, existing researches on UDN mainly focus on system throughput while ignore energy efficiency (EE). Therefore, we will analyze the UDN performance including not only system throughput but also...
HTTP Adaptive Streaming (HAS) is a streaming video technique commonly employed over best-effort networks. However, it is characterized by some issues that harm its quality of experience (QoE) in cases of daily use. The main use case of the present investigation involves HAS clients competing for bandwidth inside the same home network. Based on related work, we found that one of the most convenient...
We present a novel relationship between the distribution of circular and non-circular complex Gaussian random variables. Specifically, we show that the distribution of the squared norm of a non-circular complex Gaussian random variable, usually referred to as squared Hoyt distribution, can be constructed from a conditional exponential distribution. Leveraging this approach, we provide novel results...
We define k-content connectivity as the reachability of at least one content from any point of a data center network under concurrent k-1 failures. A flexible content placement algorithm is proposed to achieve k-content connectivity.
3D-Stacked IC (3D-SIC) based on Through-Silicon-Vias (TSV) is an emerging technology that enables heterogeneous integration and high bandwidth low latency interconnection. In this paper we propose a 3D novel cache architecture that leverages a wide TSV-based data link distributed on the entire memory array to support two orthogonal interfaces: (i) a vertical one, with a large data width, and, (ii)...
We present a survey of non-volatile memory technology papers published between 2000 and 2014 in leading journals and conference proceedings in the area of integrated circuit design and semiconductor devices. We present a summary of the data provided in these papers and use that data to model basic aspects of their performance at an architectural level. The full data set and complete bibliography will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.