The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time *** IoT's foremost task is ensuring that there is proper communication among different types ...
详细信息
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time *** IoT's foremost task is ensuring that there is proper communication among different types of applications and devices,and that the application layer protocols fulfill this ***,as the number of applications grows,it is necessary to modify or enhance the application layer protocols according to specific IoT applications,allowing specific issues to be addressed,such as dynamic adaption to network conditions and ***,several IoT application layer protocols have been enhanced and modified according to application ***,no existing survey articles focus on these *** this article,we survey traditional and recent advances in IoT application layer protocols,as well as relevant real-time applications and their adapted application layer protocols for improving *** changing the nature of protocols for each application is unrealistic,machine learning offers means of making protocols intelligent and is able to adapt *** this context,we focus on providing open challenges to drive IoT application layer protocols in such a direction.
A novel neural network approach using the maximum neuron model is presented for N-queens problems. The goal of the N-queens problem is to find a set of locations of N queens on an N x N chessboard such that no pair of...
详细信息
A novel neural network approach using the maximum neuron model is presented for N-queens problems. The goal of the N-queens problem is to find a set of locations of N queens on an N x N chessboard such that no pair of queens commands each other. The maximum neuron model proposed by Takefuji et al. has been applied to two optimization problems where the optimization of objective functions is requested without constraints. This paper demonstrates the effectiveness of the maximum neuron model for constraint satisfaction problems through the N-queens problem. The performance is verified through simulations in up to 500-queens problems on the sequential mode, the N-parallel mode, and the N-2-parallel mode, where our maximum neural network shows the far better performance than the existing neural networks.
We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architectu...
详细信息
Embedded systems such as mobile devices are currently ubiquitous. The performance potential of these devices is rapidly improving by incorporating multi-core and GPU technologies, and is rapidly catching up with the w...
详细信息
ISBN:
(纸本)9781450329415
Embedded systems such as mobile devices are currently ubiquitous. The performance potential of these devices is rapidly improving by incorporating multi-core and GPU technologies, and is rapidly catching up with the workstation platforms. Nevertheless, the heterogeneity of the underlying hardware as well as the low-power constraints severely limit performance portability. In this paper we consider the case of leveraging JIT compilers to provide portable parallelization while hiding the corresponding expensive runtime analysis. We propose a novel lightweight JIT framework that exploits the device idle time and the large storage space generally available on these devices. The framework performs 'incremental' analysis while the processor is idle (such as during charging time), and exploits the storage space to cache intermediate analysis results. Such approach requires reengineering existing complex optimization analysis methods. For this paper, we focus on the traditional loop parallelization analysis, and implement a working prototype into the LLVM framework, integrating a lightweight dynamic profiling method to identify hotspots. Initial results demonstrate the low overhead of our method for parallelizing simple loops on an embedded GPU.
A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired...
详细信息
Diversity on durian varieties makes it difficult to distinguish between durian varieties. In addition, some durian varieties also have similarities which further complicate the classification process, and are known as...
详细信息
As demand for power increases in rural areas serviced by Single Wire Earth Return (SWER) networks, distribution issues are becoming increasingly evident. Voltage regulation and system capacity concerns are driving uti...
详细信息
ISBN:
(纸本)9780863967184
As demand for power increases in rural areas serviced by Single Wire Earth Return (SWER) networks, distribution issues are becoming increasingly evident. Voltage regulation and system capacity concerns are driving utilities toward using smarter compensation devices for network control in an attempt to provide longevity for aging SWER infrastructure. To date, despite increasing complexity in power delivery over SWER, no effective network monitoring solutions have been proposed. This paper examines the case for network monitoring and centralised management of smart compensation devices via Power Line Communications (PLC). After establishing advantages in network monitoring, regulation and maintenance for SWER networks, narrowband and broadband PLC issues are reviewed. The channel capacity of typical SWER conductors is then evaluated and compared to data throughput requirements derived from existing infrastructure to validate the applicability of developing PLC over SWER infrastructure.
Fifth Generation(5G)systems aim to improve flexibility,coexistence and diverse service in several aspects to achieve the emerging applications *** and filtering of the traditional multicarrier waveforms are now consid...
详细信息
Fifth Generation(5G)systems aim to improve flexibility,coexistence and diverse service in several aspects to achieve the emerging applications *** and filtering of the traditional multicarrier waveforms are now considered common sense when designing more flexible *** paper proposed a Universal Windowing Multi-Carrier(UWMC)waveform design platform that is flexible,providing more easily coexists with different pulse shapes,and reduces the Out of Band Emissions(OOBE),which is generated by the traditional multicarrier methods that used in the previous generations of the mobile *** novel proposed approach is different from other approaches that have been proposed,and it is based on applying a novel modulation approach for the Quadrature-Amplitude Modulation(64-QAM)which is considered very popular in mobile *** new approach is done by employing flexible pulse shaping windowing,by assigning windows to various *** leads to decreased side-lobes,which are going to reduce OOBE and boost the spectral efficiency by assigning them to edge subscribers *** new subband windowing(UWMC)will also maintain comprehensively the non-orthogonality by a variety of windowing and make sure to keep window time the same for all *** addition,this paper shows that the new approach made the Bit Error Rate(BER)equal to the conventional Windowed-Orthogonal Frequency Division Multiplexing(W-OFDM).This platform achieved great improvement for some other Key Performance Indicators(KPI),such as the Peak to Average Power Ratio(PAPR)compared with the conventional(W-OFDM)and the conventional Universal Filtered Multicarrier(UFMC)*** particular,the proposed windowing scheme outperforms previous designs in terms of the Power Spectral Density(PSD)by 58%and the(BER)by 1.5 dB and reduces the Complementary Cumulative Distribution Function Cubic Metric(CCDF-CM)by 24%.
Water loss and improper scheduling are problems with traditional irrigation techniques, making it difficult to meet the growing demand for food production while also preserving precious water resources. To address the...
详细信息
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industr...
详细信息
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industry and *** blockchain is based on a distributed network and has the characteristics of non-tampering and traceability of block *** is thus naturally able to solve the security problems of the sensor ***,this paper first analyzes the security risks associated with data storage in the sensor networks,then proposes using blockchain technology to ensure that data storage in the sensor networks is *** the traditional blockchain,the data layer uses a Merkle hash tree to store data;however,the Merkle hash tree cannot provide non-member proof,which makes it unable to resist the attacks of malicious nodes in *** solve this problem,this paper utilizes a cryptographic accumulator rather than a Merkle hash tree to provide both member proof and non-member ***,the number of elements in the existing accumulator is limited and unable to meet the blockchain’s expansion *** paper therefore proposes a new type of unbounded accumulator and provides its definition and security ***,this paper constructs an unbounded accumulator scheme using bilinear pairs and analyzes its performance.
暂无评论