Search results for "Latency"
showing 10 items of 135 documents
Hierarchical Parallelization of an H.264/AVC Video Encoder
2006
Last generation video encoding standards increase computing demands in order to reach the limits on compression efficiency. This is particularly the case of H.264/AVC specification that is gaining interest in industry. We are interested in applying parallel processing to H.264 encoders in order to fulfill the computation requirements imposed by stressing applications like video on demand, videoconference, live broadcast, etc. Given a delivered video quality and bit rate, the main complexity parameters are image resolution, frame rate and latency. These parameters can still be pushed forward in such a way that special purpose hardware solutions are not available. Parallel processing based on…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments
2017
International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…
PV-Alert: Fog Computing based Architecture for Safeguarding Vulnerable Road Users
2018
High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emerging paradigm that has p…
Blockchain based Inter-domain Latency Aware Routing Proposal in Software Defined Network
2018
Border gateway protocol (BGP) version 4 is routing current Internet for more than 20 years. BGP is the only protocol that has proven its routing capability of such size network with continually growing nature. Although BGP is scalable and network layer reachability information it lacks quality of service metrics like latency. BGP routing decision algorithm uses as-path length between autonomous systems (AS) as main factor for most of its best-path calculations. Because of more affordable peering architectures as-path length is generally decreasing in worldwide internet network resulting in less efficient routes for real-time internet protocol traffic. This study proposes future internet arc…
New client puzzle approach for DoS resistance in ad hoc Networks
2010
In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.
Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing
2018
Mobile Edge Computing (MEC) is emerging as one of the effective platforms for offloading the resource- and latency-constrained computational services of modern mobile applications. For latency- and resource-constrained mobile devices, the important issues include: 1) minimize end-to-end service latency; 2) minimize service completion time; 3) high quality-of-service (QoS) requirement to offload the complex computational services. To address the above issues, a latencyoblivious distributed task scheduling scheme is designed in this work to maximize the QoS performance and goodput for the MEC services. Unlike most of the existing works, we consider the latency-oblivious property of different …
Widespread Decoding of Tactile Input Patterns Among Thalamic Neurons
2021
Whereas, there is data to support that cuneothalamic projections predominantly reach a topographically confined volume of the rat thalamus, the ventroposterior lateral (VPL) nucleus, recent findings show that cortical neurons that process tactile inputs are widely distributed across the neocortex. Since cortical neurons project back to the thalamus, the latter observation would suggest that thalamic neurons could contain information about tactile inputs, in principle regardless of where in the thalamus they are located. Here we use a previously introduced electrotactile interface for producing sets of highly reproducible tactile afferent spatiotemporal activation patterns from the tip of di…
An Efficient Implementation of Parallel Parametric HRTF Models for Binaural Sound Synthesis in Mobile Multimedia
2020
The extended use of mobile multimedia devices in applications like gaming, 3D video and audio reproduction, immersive teleconferencing, or virtual and augmented reality, is demanding efficient algorithms and methodologies. All these applications require real-time spatial audio engines with the capability of dealing with intensive signal processing operations while facing a number of constraints related to computational cost, latency and energy consumption. Most mobile multimedia devices include a Graphics Processing Unit (GPU) that is primarily used to accelerate video processing tasks, providing high computational capabilities due to its inherent parallel architecture. This paper describes…
Possible Contribution of T-pattern Detection and Analysis to the Study of the Behavioral Correlates of Afferent Inhibition.
2020
A pivotal tenet in modern behavioral sciences is that the study of behavior, in its most intimate structure, necessarily deals with time and, for this reason, behavioral dynamics are not intuitively perceivable and/or detectable (Eibl-Eibesfeldt, 1970). In reality, the possibility to describe a given behavior in terms of its structural/temporal features makes available new and detailed information otherwise unavailable. The aim of the present paper is to discuss the possible application of T-pattern detection and analysis, i.e., a multivariate approach specifically developed to describe the temporal structure of behavior, to the study of an important and still scantly investigated issue, na…