Search results for "Computer network"

showing 10 items of 1634 documents

A low power and high resolution data logger for submarine seismic monitoring

2010

The design, implementation and characterization of a digital waveform recorder for ocean bottom seismic monitoring is here reported. The system is capable of synchronously acquiring, and logging on a flash memory bank, four high resolution signals. Thanks to a very careful design of the system architecture and by using robust digital signal processing techniques, two main conflicting issues have been addressed: a high dynamic range, better than 120 dB, usually obtained with high energy demanding converters, and a power consumption as low as 250 mW, hence allowing to easily increase the time of a continuous submarine monitoring session up to 3 months.

Computer Networks and Communicationsbusiness.industryComputer scienceSubmarineDigital filteringSettore ING-INF/01 - ElettronicaArtificial IntelligenceHardware and ArchitectureData loggerLow powerHigh resolution data acquisitionWaveformbusinessEmbedded systemSoftwareDigital signal processingComputer hardwareSeismic recording
researchProduct

Downlink radio resource allocation for coordinated cellular OFDMA networks

2010

Base station coordination is considered as a promising technique to mitigate inter-cell interference and improve the cell-edge performance in cellular orthogonal frequency division multiple-access (OFDMA) networks. The problem to design an efficient radio resource allocation scheme for coordinated cellular OFDMA networks incorporating base station coordination has been only partially investigated. In this contribution, a novel radio resource allocation algorithm with universal frequency reuse is proposed to support base station coordinated transmission. Firstly, with the assumption of global coordination between all base station sectors in the network, a coordinated subchannel assignment al…

Computer Networks and Communicationsbusiness.industryComputer scienceThroughputInterference (wave propagation)Frequency reuseTelecomunicacióBase stationTransmission (telecommunications)Telecommunications linkElectrical and Electronic EngineeringbusinessComunicació i tecnologiaSoftwareComputer network
researchProduct

Analyzing the performance of a cluster-based architecture for immersive visualization systems

2008

Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code. Thi…

Computer Networks and Communicationsbusiness.industryComputer scienceVirtual realityModular designcomputer.software_genreTheoretical Computer ScienceVisualizationShared memoryArtificial IntelligenceHardware and ArchitectureHuman–computer interactionComputer clusterScalabilityCluster (physics)Operating systemArchitecturebusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?

2007

Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless ad hoc networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingThroughputNetwork topologyIEEE 802.11Packet lossNetwork performancebusinessInformation SystemsComputer networkJournal of Communications and Networks
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

An efficient hardware implementation of MQ decoder of the JPEG2000

2014

Abstract JPEG2000 is an international standard for still images intended to overcome the shortcomings of the existing JPEG standard. Compared to JPEG image compression techniques, JPEG2000 standard has not only better not only has better compression ratios, but it also offers some exciting features. As it’s hard to meet the real-time requirement of image compression systems by software, it is necessary to implement compression system by hardware. The MQ decoder of the JPEG2000 standard is an important bottleneck for real-time applications. In order to meet the real-time requirement we propose in this paper a novel architecture for a MQ decoder with high throughput which is comparable to tha…

Computer Networks and Communicationsbusiness.industryComputer sciencecomputer.file_formatFrame rateJPEGArtificial IntelligenceHardware and ArchitectureEmbedded systemJPEG 2000StratixOverhead (computing)businessField-programmable gate arraycomputerThroughput (business)SoftwareComputer hardwareImage compressionMicroprocessors and Microsystems
researchProduct

Architectures and protocols for mobile computing applications: a reconfigurable approach

2004

This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs. The control functions are implemented in a software module, named Reconfigurable Access module for MObile computiNg applications (RAMON), placed in mobile and/or base stations. RAMON operates on abstract models of the main communication functions of a wireless systems (e.g., transmission over the radio channel, coding end error recovery, capacity sharing and packet scheduling, handover, congestion control, etc.). RAMON algorithms are programmed with reference to the abstract models, independently of specific radi…

Computer Networks and Communicationsbusiness.industryComputer sciencemobile computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingReconfigurabilityreconfigurable systemsresource controllaw.inventionBluetoothNetwork congestionBase stationHandoverlawmobile computing; mobility management; reconfigurable systems; resource control; session controlCellular networkWirelessbusinessMobility managementmobility managementUMTS frequency bandssession controlComputer network
researchProduct

Dual-model approach for safety-critical embedded systems

2020

Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.

Computer Networks and Communicationsbusiness.industryDual modelComputer scienceReliability (computer networking)020208 electrical & electronic engineeringInteroperabilityDesign flow02 engineering and technologyPetri net020202 computer hardware & architectureUML state machineArtificial IntelligenceHardware and ArchitectureControl theoryEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessSoftwareMicroprocessors and Microsystems
researchProduct

A measurement-based study on the correlations of inter-domain Internet application flows

2014

Internet traffic characterization has a profound impact on network engineering and traffic identification. Existing studies are often carried out on a per-flow basis, focusing on the properties of individual flows. In this paper, we study the interaction of Internet traffic flows and network features from a complex network perspective, focusing on six types of applications: P2P file sharing, P2P stream, HTTP, instant messaging, online games and abnormal traffic. With large-volume traffic flow records collected through proprietary line-speed hardware-based monitors, we construct flow graphs of these different application types. Based on the flow graphs, we calculate the correlation coefficie…

Computer Networks and Communicationsbusiness.industryInter-domainComputer scienceAssortativityNetwork engineeringInternet trafficComplex networkTraffic flowcomputer.software_genreFile sharingThe InternetData miningbusinesscomputerTraffic generation modelComputer networkComputer Networks
researchProduct

Efficient analysis of cubic junction of rectangular waveguides using admittance-matrix representation

2000

In the paper an efficient and accurate method, based on the multimode-admittance-matrix representation and the theory of cavities, is proposed for the analysis of a six-port ‘cubic’ junction composed of the orthogonal intersection of three rectangular waveguides. Very simple closed-form analytical expressions are explicitly detailed for all matrix elements of this basic key building block. More general waveguide multiport junctions, composed of a central cubic junction with arbitrarily shaped waveguide access ports, are also studied using a segmentation procedure. To validate the theory, numerical results are first discussed for a standard rectangular waveguide six-port cross junction. Fina…

Computer Networks and Communicationsbusiness.industryMathematical analysisPhysics::OpticsWaveguide (optics)Admittance parametersMatrix (mathematics)OpticsIntersectionSimple (abstract algebra)SegmentationElectrical and Electronic EngineeringRepresentation (mathematics)businessBlock (data storage)MathematicsIEE Proceedings - Microwaves, Antennas and Propagation
researchProduct