Search results for "Computer network"
showing 10 items of 1634 documents
A low power and high resolution data logger for submarine seismic monitoring
2010
The design, implementation and characterization of a digital waveform recorder for ocean bottom seismic monitoring is here reported. The system is capable of synchronously acquiring, and logging on a flash memory bank, four high resolution signals. Thanks to a very careful design of the system architecture and by using robust digital signal processing techniques, two main conflicting issues have been addressed: a high dynamic range, better than 120 dB, usually obtained with high energy demanding converters, and a power consumption as low as 250 mW, hence allowing to easily increase the time of a continuous submarine monitoring session up to 3 months.
Downlink radio resource allocation for coordinated cellular OFDMA networks
2010
Base station coordination is considered as a promising technique to mitigate inter-cell interference and improve the cell-edge performance in cellular orthogonal frequency division multiple-access (OFDMA) networks. The problem to design an efficient radio resource allocation scheme for coordinated cellular OFDMA networks incorporating base station coordination has been only partially investigated. In this contribution, a novel radio resource allocation algorithm with universal frequency reuse is proposed to support base station coordinated transmission. Firstly, with the assumption of global coordination between all base station sectors in the network, a coordinated subchannel assignment al…
Analyzing the performance of a cluster-based architecture for immersive visualization systems
2008
Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code. Thi…
Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?
2007
Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
2015
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…
An efficient hardware implementation of MQ decoder of the JPEG2000
2014
Abstract JPEG2000 is an international standard for still images intended to overcome the shortcomings of the existing JPEG standard. Compared to JPEG image compression techniques, JPEG2000 standard has not only better not only has better compression ratios, but it also offers some exciting features. As it’s hard to meet the real-time requirement of image compression systems by software, it is necessary to implement compression system by hardware. The MQ decoder of the JPEG2000 standard is an important bottleneck for real-time applications. In order to meet the real-time requirement we propose in this paper a novel architecture for a MQ decoder with high throughput which is comparable to tha…
Architectures and protocols for mobile computing applications: a reconfigurable approach
2004
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs. The control functions are implemented in a software module, named Reconfigurable Access module for MObile computiNg applications (RAMON), placed in mobile and/or base stations. RAMON operates on abstract models of the main communication functions of a wireless systems (e.g., transmission over the radio channel, coding end error recovery, capacity sharing and packet scheduling, handover, congestion control, etc.). RAMON algorithms are programmed with reference to the abstract models, independently of specific radi…
Dual-model approach for safety-critical embedded systems
2020
Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.
A measurement-based study on the correlations of inter-domain Internet application flows
2014
Internet traffic characterization has a profound impact on network engineering and traffic identification. Existing studies are often carried out on a per-flow basis, focusing on the properties of individual flows. In this paper, we study the interaction of Internet traffic flows and network features from a complex network perspective, focusing on six types of applications: P2P file sharing, P2P stream, HTTP, instant messaging, online games and abnormal traffic. With large-volume traffic flow records collected through proprietary line-speed hardware-based monitors, we construct flow graphs of these different application types. Based on the flow graphs, we calculate the correlation coefficie…
Efficient analysis of cubic junction of rectangular waveguides using admittance-matrix representation
2000
In the paper an efficient and accurate method, based on the multimode-admittance-matrix representation and the theory of cavities, is proposed for the analysis of a six-port ‘cubic’ junction composed of the orthogonal intersection of three rectangular waveguides. Very simple closed-form analytical expressions are explicitly detailed for all matrix elements of this basic key building block. More general waveguide multiport junctions, composed of a central cubic junction with arbitrarily shaped waveguide access ports, are also studied using a segmentation procedure. To validate the theory, numerical results are first discussed for a standard rectangular waveguide six-port cross junction. Fina…