An analog computing method is proposed to accelerate the computation of two-point boundary value problems (BVPs). The analog network has many self-communicating nodes. The analog information (current and voltage) prop...
详细信息
An analog computing method is proposed to accelerate the computation of two-point boundary value problems (BVPs). The analog network has many self-communicating nodes. The analog information (current and voltage) propagates through the network with much faster communication speed than a digital approach. The parallelism is inherent in the network. Physically imposing a two-point boundary condition on the analog network permits the BVP problem to be simulated and solved by measuring the distribution of stabilized voltage across the network. Two problems from robotics and computer vision are considered to illustrate the process.
Model predictive control (MPC), also known as receding horizon control (RHC), is an advanced control strategy for optimizing the performance of control systems. For non-linear systems, standard MPC schemes based on li...
详细信息
ISBN:
(纸本)9781424446018
Model predictive control (MPC), also known as receding horizon control (RHC), is an advanced control strategy for optimizing the performance of control systems. For non-linear systems, standard MPC schemes based on linearization would result in poor performance. In this paper, we propose an MPC scheme for nonlinear affine systems based on a recurrent neural network (RNN) called the simplified dual network. The proposed RNN-based approach is efficient and suitable for real-time MPC implementation in industrial applications. Simulation results are provided to demonstrate the effectiveness and efficiency of the proposed MPC scheme.
This paper proposes a Fault-Tolerance Effect and Cost Function based Multipath Routing Mechanism (FEAC) in the Data Center network (DCN). The path value is used to represent the quality of the path, measured by bandwi...
详细信息
ISBN:
(纸本)9781538674451
This paper proposes a Fault-Tolerance Effect and Cost Function based Multipath Routing Mechanism (FEAC) in the Data Center network (DCN). The path value is used to represent the quality of the path, measured by bandwidth, delay, packet loss rate and other information. We design a fault-tolerance effect and cost function, which is used to calculate optimal path numbers. The effect is expressed by the probability of selecting multiple paths to successfully transmit a flow. The fault-tolerance cost includes link congestion and elephant flow replication cost. Heuristic thoughts are adopted to design the algorithm of generating feasible path set. After the final path set is obtained, the data flow is copied and transmitted on it to improve the reliability of the network. The proposed algorithm is simulated on two network topologies;and it has a better performance than benchmark algorithms according to a variety of evaluation criteria.
While many Fast Fourier Transform (FFT) architectures have been presented for computing real-valued FFT (RFFT), which of these architectures is best suited for low-throughput applications such as biomedical signals wh...
详细信息
ISBN:
(纸本)9781665424615
While many Fast Fourier Transform (FFT) architectures have been presented for computing real-valued FFT (RFFT), which of these architectures is best suited for low-throughput applications such as biomedical signals which are typically sampled between 256 Hz and 1 kHz remains unclear. This paper implements and compares throughput, resources, and energy consumption of three different hardware architectures for real-valued FFT algorithms using Xilinx Zynq-7000 FPGA. The RFFT architectures exploit the conjugate symmetry property of the real signals, thereby eliminating about half of the computations compared to a complex FFT. The three FFT architectures investigated in this paper include: single processing element (SPE), pipelined, and in-place. It is shown that, for a 256-point RFFT, using FPGA, the in place architectures require the least device resources when compared to the pipelined architectures, while the throughput of the pipelined architectures is approximately 8 times that of the in place architecture.
Time Synchronization is a pertinent field of study to fulfill the OS requirements in many distributed applications. In this work, we implemented the ieee 1588 protocol - Precision Time Protocol - for the EPOS operatin...
详细信息
ISBN:
(纸本)9781467357470;9780769549293
Time Synchronization is a pertinent field of study to fulfill the OS requirements in many distributed applications. In this work, we implemented the ieee 1588 protocol - Precision Time Protocol - for the EPOS operating system to deliver the clock time among the network. For test purposes, we choose a topology consisted of one master clock and another slave clock. We made two configurations: one in which we have two previously synchronized clocks, to evaluate their behavior among time after some synchronizations. On the other configuration, we delayed the slave clock in some hours and analysed the behavior of the protocol after some iterations. With the results obtained we can ensure the viability of the protocol implementation to the EPOS operating system and consequently to embedded systems.
HTTP Adaptive Streaming (HAS) is one of the most promising solutions for delivering streaming video services to users. However, due to its client-driven nature, it is challenging for telecom operators and mobile servi...
详细信息
ISBN:
(纸本)9781665449083
HTTP Adaptive Streaming (HAS) is one of the most promising solutions for delivering streaming video services to users. However, due to its client-driven nature, it is challenging for telecom operators and mobile service providers to guarantee a certain level of quality of experience (QoE) for their mobile users when using HAS. Researches have shown that when various HAS clients compete simultaneously to obtain bandwidth resources from a shared network, this leads to unfairness and under-utilization of the system and degrades customers' QoE. In order to address these issues and provide some coordination between HAS clients, this paper introduces an innovative solution which employs a recently introduced MPEG solution, called Server and network Assisted Dynamic Adaptive Streaming over HTTP (SAND-DASH) and Multi-Access Edge computing (MEC) support in the existing wireless network environment. The solution is based on an optimisation algorithm which maximizes QoE, fairness, and system utilization while considering the radio resource constraints. The paper formulates a novel cross-layer joint optimization model which considers QoE, fairness, system utilization, and radio resource limitation. Then it describes the MEC-OP-SA, an efficient online greedy-based algorithm for solving the modeled optimization problem. The results indicate that the proposed algorithm, MEC-OP-SA, improves the overall system utilization and fairness while maintaining a high QoE level for HAS clients compared to existing solutions.
network security protocol design is important aspect of network security research. DoS/DDoS is very serious attack in wired and wireless network. DoS/DDoS attack depletes memory/cpu of service provider, so legitimate ...
详细信息
ISBN:
(纸本)9781479989379
network security protocol design is important aspect of network security research. DoS/DDoS is very serious attack in wired and wireless network. DoS/DDoS attack depletes memory/cpu of service provider, so legitimate user can't gain normal service. According to anti-DoS attack strategy of network security protocols, we give and discuss three mechanisms (stateless connection, Fail-together and Subset Sum Client-Puzzle) on design of a key exchange protocol against denial of service attack for ISO/IEC1170-3 key exchange protocol. Subset Sum Client-Puzzle has simple structure, Non-Parallelizable speciality and fast verification. N Subset Sum Client-Puzzles' difficulties are sum of n Subset Sum Client-Puzzle's difficulty. Based on analysis of new key exchange protocol, we compare initiator and responder for computation resource, memory depletion and anti-DoS/DDoS. ISO/IEC1170-3 key exchange protocol on Subset Sum Client Puzzle, which is non-parallelizable, easy construction and verification, has the good property against DoS/DDoS attack. It provides a very good reference for network security protocol design with anti-DoS/DDoS attack.
Random opportunistic networks are dynamic, resulting in nodes not being able to sense the state of the network, and the network topology of nodes changes all the time. Therefore, this paper proposes a RIS-aided channe...
详细信息
ieee Std 802.15.4, as an widespread wireless network standard, defines the protocol and compatible interconnection for data communication devices using low-power and low-complexity short-range radio frequency (RF) tra...
详细信息
ISBN:
(纸本)9781424437092
ieee Std 802.15.4, as an widespread wireless network standard, defines the protocol and compatible interconnection for data communication devices using low-power and low-complexity short-range radio frequency (RF) transmissions in a wireless personal area network (WPAN). It presents the advantage to fit different requirements of potential applications by adequately setting its parameters. For time critical applications, the protocol can provide timeliness guarantees by using its Guaranteed Time Slot (GTS) mechanism in beacon-enabled mode. Deterministic performance evaluation methods are inevitable for the validation of systems that must guarantee hard delay bounds and timeliness of information processing. One recent deterministic modeling approach is network Calculus, which allows determining worst case transmission times. Based on GTS allocation mechanism, we generate appropriate modeling elements for the network Calculus as arrival curves and service curves. The results of this work may pave the way for a time efficient management of the GTS mechanism in an ieee 802.15.4-based network.
A miniaturized dual-band antenna is proposed and investigated by combining spiral and meander lines for wireless local area network (WLAN) applications. The proposed antenna consists of a meander line and a spiral lin...
ISBN:
(纸本)9781479978151
A miniaturized dual-band antenna is proposed and investigated by combining spiral and meander lines for wireless local area network (WLAN) applications. The proposed antenna consists of a meander line and a spiral line, which are used to generate the bands of 2.37-2.58GHz and 5.11-5.96GHz. The proposed antenna fed by a 50-Ohm mini-coaxial line has a small size of 12.5x7.5 mm(2). The experimental results show that the proposed antenna can cover the required bandwidths for WLAN communication applications. Moreover, it can provide good omnidirectional radiation patterns and tunable dual-band characteristics, making it promising for practical WLAN communication applications.
暂无评论