To increase both the capacity and the processing speed for Input-Queued (IQ) Switches, a Fair Scalable Scheduling Architecture (FSSA) has been proposed. By employing FSSA comprised of several chips of cascaded sub-sch...
详细信息
ISBN:
(纸本)9781424448876
To increase both the capacity and the processing speed for Input-Queued (IQ) Switches, a Fair Scalable Scheduling Architecture (FSSA) has been proposed. By employing FSSA comprised of several chips of cascaded sub-scheduler, a large-scale high performance network scheduler can be realized without the capacity limitation of monolithic device. In this paper, we present an improved scheduling algorithm named FSSA_DI instead of the ordinary FSSA. Using the proposed algorithm where a distributed iteration scheme is employed, the scheduler performance can be improved and the processing time can be reduced as well. Simulation results show that FSSA_DI achieves better performance on average delay and throughput under heavy loads compared to other existing algorithms. Moreover, a practical 64×64 FSSA using FSSA_DI algorithm is implemented with 4 Xilinx Vertex-4 FPGAs. Measurement results show that the data rates of our solution can be up to 800 Mbps and the tradeoff between performance and hardware complexity has been solved peacefully.
MIMO (multiple input multiple output) and OFDM (orthogonal frequency division multiplexing) bringing along a number of pros; a combination of both stands a good possibility of being the next-generation (4th generation...
详细信息
MIMO (multiple input multiple output) and OFDM (orthogonal frequency division multiplexing) bringing along a number of pros; a combination of both stands a good possibility of being the next-generation (4th generation) of mobile wireless systems. The technology however imposes a challenge that is the increased complexity of channel equalization. Wireless channels are multipath fading channels, causing deformation in the signal. To remove the effect (imposed by channel) from received signal, the receiver needs to have knowledge of CIR (Channel impulse response) that is usually provided by a separate channel estimator. This paper is aimed at exploring the use of Neural Network (NN) as a tool for MIMO-OFDM channel estimation and compensation. The research attempts to gauges the usefulness of proposed system by analyzing different algorithms to train NN. Further to ascertain the performance of the proposed technique; length of the known training sequence has been varied over a reasonable range and observations are made. Finally, the results obtained by using different algorithms for training NN have been compared with each-other and against the traditional least squares channel estimator, which along with observations/comments form part of the paper.
The research of micro-forces between micro-parts forms the base for micro-machine (MEMS) development. According to the characteristics of the interactions between micro-parts in MEMS, three models were simplified. Bas...
详细信息
The research of micro-forces between micro-parts forms the base for micro-machine (MEMS) development. According to the characteristics of the interactions between micro-parts in MEMS, three models were simplified. Based on these models, micro-forces between micro-parts were analyzed, and the analytical formulas were formulated. Factors which may affect the micro-forces, such as surface condition, media and constitutive material of micro-parts were discussed. A coefficient of surface roughness on micro-forces was introduced, which facilitated the analysis of the influence of surface roughness.
To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and u...
详细信息
To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and user behaviors. The method extracts information from the log analysis of submitted packets using the algorithm which depends on the definition of the intrusion. Large itemsets were extracted to represent the super facts to build the association analysis for the intrusion. Network data files were analysed for experiments. The analysis and experimental results are encouraging with better performance as packet frequency number increases.
To avoid the complexity and inefficiency for specific applications of the current software architecture, a novel approach using partial evaluation is proposed to improve the running performance of components. The gene...
详细信息
To avoid the complexity and inefficiency for specific applications of the current software architecture, a novel approach using partial evaluation is proposed to improve the running performance of components. The generic program was specialized into domain-specific realization for the known knowledge and environments. The syntax and semantic(adj.) were analyzed based on byte code instruction sequences, and partial evaluation rules depicted how to perform the specialization. The partial evaluation for object-oriented programs was implemented. The experimental results show that partial evaluation is effective to speed up the running efficiency. The more generality and scalability can be obtained by the integration of partial evaluation with the favorable design mechanisms and compiler optimization technology.
C preprocessor (CPP) is a major cause that makes it much difficult to precisely analyze C source code, which is indispensable to refactoring tools for C programs. To precisely analyze C source code, we need to obtain ...
详细信息
C preprocessor (CPP) is a major cause that makes it much difficult to precisely analyze C source code, which is indispensable to refactoring tools for C programs. To precisely analyze C source code, we need to obtain the mapping information between unpreprocessed C source code and preprocessed one. Previous works obtain the mapping information by extending the existing CPP (e.g., Cpplib), which results in low portability and low maintainability due to the strong dependency on CPP implementation. To solve this problem, this paper proposes a novel approach based on tracer, which obtains the mapping information by automatically embedding XML-like tracers in source code, running native CPP "as-is", and finally analyzing the resulting tracers. Thus the tracer method is highly portable and maintainable, while the previous methods are not. We successfully implemented a first prototype of tracer-based CPP analyzer (called TBCppA), and experimentally applied TBCppA to the code of gcc-4.1.1 (consisting of around 630 KLOC). This preliminary result suggests that our tracer approach works fine both in functionality and performance for obtaining the CPP mapping information in a very portable manner.
To solve the problems that exist in the color morphological sieves, a new fuzzy color morphological sieve is *** method adopts color fuzzy model to define extrema and selects more rational regional merging way to prod...
详细信息
To solve the problems that exist in the color morphological sieves, a new fuzzy color morphological sieve is *** method adopts color fuzzy model to define extrema and selects more rational regional merging way to produce better *** can deal with the maxima or the minima areas respectively and the approach is simple and agile in *** color fuzzy model and the steps of the algorithm are *** evaluation of the performance shows the new method can produce the best synthetical performance.
In harsh industrial environment, industrial wireless networks need high quality performance at real-time, deterministic schedule, reliability and low-power consumption, and so on, or it will bring disastrous conseq...
详细信息
ISBN:
(纸本)9781424438631;9781424438624
In harsh industrial environment, industrial wireless networks need high quality performance at real-time, deterministic schedule, reliability and low-power consumption, and so on, or it will bring disastrous consequences to the industrial field. The existing industrial wireless network can not fundamentally solve the multi-hop network beacon collision, thus it will influence its real-time capability, the demand for certainty and reliability. This requires a method of scheduling uncertainties communications star-based network to standardize the channel access mechanisms, multi-hop network and to address the mutual interference, thus completing the tree network scheduling. So, the problem of beacon collision in Multi-hop network will be solved and it can be widely applied to industrial wireless network.
The deployment of wireless technologies for device communication in the industrial control field is a challenging and promising issue mainly due to the increasing flexibility and the mobility. However, with limited ...
详细信息
ISBN:
(纸本)9781424438631;9781424438624
The deployment of wireless technologies for device communication in the industrial control field is a challenging and promising issue mainly due to the increasing flexibility and the mobility. However, with limited resources such as computation capability and memory, traditional security solutions can not guarantee security requirements and communications overhead in industrial wireless networks. The *** standard defines the protocol suite, system management, gateway, and security specifications for low-data-rate wireless connectivity with fixed, portable, and moving devices supporting very limited power consumption requirements. In this paper, the security architecture and security protocol stack for ISA 100.11a networks are proposed. Furthermore, we survey security service measures to improve data confidentiality and integrity, and to prevent some attacks including reply attack. Finally, our test results show these security measures may enhance the security reliability of the ISA 100.11a network communication.
In a structured P2P system, peers maintain information about what resources neighbor peers offer. Chord is one of well-known structured P2P systems to efficiently support resource finding based on the hashing approach...
详细信息
暂无评论