The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p...
详细信息
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ...
详细信息
This paper proposes an active disturbance rejection zero-phase virtual sampling repetitive control (ADR-ZVSRC) for permanent magnet synchronous generator (PMSG)-based wind energy conversion systems (WECSs) to mitigate...
详细信息
A model for evaluating the availability of a fault-tolerant cluster with a constraint on the maximum query service time is proposed. Node recovery in the cluster involves replacing the entire computational node with t...
详细信息
作者:
Wang, FeiZhang, XiSouthwest University
Chongqing Key Laboratory of Non-linear Circuit and Intelligent Information Processing College of Electronic and Information Engineering Chongqing400715 China Texas AandM University
Networking and Information Systems Laboratory Department of Electrical and Computer Engineering College StationTX77843 United States
We propose the novel scheme to solve a multi-objective optimization problem over an unmanned aerial vehicle (UAV) communications system to jointly minimize the energy consumption of the UAV and ground users (GUs). In ...
详细信息
The memristive Computing-in-Memory (CIM) sys-Tem can efficiently accelerate matrix-vector multiplication (MVM) operations through in-situ computing. The data layout has a significant impact on the communication perfor...
详细信息
ISBN:
(纸本)9798350350579
The memristive Computing-in-Memory (CIM) sys-Tem can efficiently accelerate matrix-vector multiplication (MVM) operations through in-situ computing. The data layout has a significant impact on the communication performance of CIM systems. Existing software-level communication opti-mizations aim to reduce communication distance by carefully designing static data layouts, while wear-leveling (WL) and error mitigation methods use dynamic scheduling to enhance system reliability, resulting in randomized data layouts and increased communication overhead. Besides, existing CIM compilers di-rectly map data to physical crossbars and generate instructions, which causes inconvenience for dynamic scheduling. To address these challenges of balancing communication performance and reliability while coordinating existing CIM compilers and dy-namic scheduling, we propose a disorder-resistant computation translation layer (DRCTL), which improves system lifetime and communication performance through co-optimization of data layout and dynamic scheduling. It consists of three parts: (1) We propose an address conversion method for dynamic scheduling, which updates the addresses in the instruction stream after dynamic scheduling, thereby avoiding recompilation. (2) Dynamic scheduling strategy for reliability improvement. We propose a hierarchical wear-leveling (HWL) strategy, which reduces communication by increasing scheduling granularity. (3) Communication optimization for dynamic scheduling. We propose data layout-Aware selective remapping (LASR), which helps dynamic scheduling methods improve communication lo-cality and reduce latency by exploiting data dependencies. The experiments demonstrate that HWL extends lifetime by 100.3-205.9 x compared to not using WL. Even with a slight lifetime decrease compared to the state-of-The-Art WL (TIWL), it still supports continuous neural network training for 7 years. After applying LASR to HWL, the number of execution cycles, energy consumption
Micro-expressions are spontaneous, rapid and subtle facial movements that can hardly be suppressed or fabricated. Micro-expression recognition (MER) is one of the most challenging topics in affective computing. It aim...
详细信息
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp...
详细信息
ISBN:
(数字)9798331515683
ISBN:
(纸本)9798331515690
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its importance lies in its ability to enable seamless data exchange and interaction across a wide range of applications, from personal gadgets to complex industrial systems. Despite its widespread adoption, Bluetooth is not immune to critical security vulnerabilities. Issues like Bluetooth Low Energy (BLE) vulnerabilities and denial-of-service (DoS) attacks can overwhelm devices with excessive traffic, while BLE Forced Connection can lead to unauthorized access, and eavesdropping exposes sensitive data being exchanged. We have discussed these vulnerabilities in detail, examining their mechanisms, potential impacts, and various implementation aspects. Additionally, we have added demonstrations to illustrate how these attacks can be executed and the potential consequences. To prevent these threats, we explored essential measures, including regular firmware updates, secure pairing protocols, and careful management of Bluetooth settings. Adopting best practices like disabling Bluetooth when not in use and monitoring connected devices can further enhance security, ensuring the reliable and safe operation of the vast and growing ecosystem of Bluetooth-enabled devices.
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no...
详细信息
Climate is rapidly changing around the world. Over time, there have been significant changes in the weather. Rainfall is now erratic due to climate change. The frequency of extreme weather events like droughts and flo...
详细信息
暂无评论