Search results for "Overhead"
showing 10 items of 101 documents
Fault-Tolerant Network-on-Chip Design for Mesh-of-Tree Topology Using Particle Swarm Optimization
2018
As the size of the chip is scaling down the density of Intellectual Property (IP) cores integrated on a chip has been increased rapidly. The communication between these IP cores on a chip is highly challenging. To overcome this issue, Network-on-Chip (NoC) has been proposed to provide an efficient and a scalable communication architecture. In the deep sub-micron level NoCs are prone to faults which can occur in any component of NoC. To build a reliable and robust systems, it is necessary to apply efficient fault-tolerant techniques. In this paper, we present a flexible spare core placement in Mesh-of-Tree (MoT) topology using Particle Swarm Optimization (PSO) by considering IP core failures…
A Sequential Game Approach for Computation-Offloading in an UAV Network
2017
International audience; Small drones are currently emerging as versatile nascent technology that can be used in exploration and surveillance missions. However, most of the underlying applications require very often complex and time-consuming calculations. Although, the limited resources available onboard the small drones, their mobility, the computation delays and energy consumption make the operation of these applications very challenging. Nevertheless, computation-offloading solutions provide feasible resolves to mitigate the issues facing these constrained devices. In this context, we address in this paper the problem of offloading highly intensive computation tasks, performed by a fleet…
Estimation of Sway-angle Based on Hybrid State Observer Using Continuous and Discrete Sensing
2019
A hybrid state observer design is presented herein to estimate sway-angle and angular velocity in trolley systems with pendulum. In general, anti-sway control for trolley systems with pendulum such as overhead cranes are designed based on sway-angle signals detected by angular sensors. Opposed to that, a state observer without those sensors is proposed to estimate the sway-angle of the pendulum. A standard linear continuous feedback observer causes estimation error owing to the system nonlinearity and modeling error. This paper proposes a hybrid state observer incorporating discrete sensor signals. In the hybrid state observer, the estimation performance is improved by correcting the state …
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive
2014
Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…
Robust Transmission for Reconfigurable Intelligent Surface Aided Millimeter Wave Vehicular Communications With Statistical CSI
2022
The integration of reconfigurable intelligent surface (RIS) into millimeter wave (mmWave) vehicular communications offers the possibility to unleash the potential of future proliferating vehicular applications. However, the high-mobility-induced rapidly varying channel state information (CSI) has been making it challenging to obtain the accurate instantaneous CSI (I-CSI) and to cope with the incurable high signaling overhead. The situation may become worse when the RIS with a large number of passive reflecting elements is deployed. To overcome this challenge, we investigate in this paper a robust transmission scheme for the time-varying RIS-aided mmWave vehicular communications, in which, s…
Detecting faulty wireless sensor nodes through Stochastic classification
2011
In many distributed systems, the possibility to adapt the behavior of the involved resources in response to unforeseen failures is an important requirement in order to significantly reduce the costs of management. Autonomous detection of faulty entities, however, is often a challenging task, especially when no direct human intervention is possible, as is the case for many scenarios involving Wireless Sensor Networks (WSNs), which usually operate in inaccessible and hostile environments. This paper presents an unsupervised approach for identifying faulty sensor nodes within a WSN. The proposed algorithm uses a probabilistic approach based on Markov Random Fields, requiring exclusively an ana…
Gossip
2019
Nowadays, a growing number of servers and workstations feature an increasing number of GPUs. However, slow communication among GPUs can lead to poor application performance. Thus, there is a latent demand for efficient multi-GPU communication primitives on such systems. This paper focuses on the gather, scatter and all-to-all collectives, which are important operations for various algorithms including parallel sorting and distributed hashing. We present two distinct communication strategies (ring-based and flow-oriented) to generate transfer plans for their topology-aware implementation on NVLink-connected multi-GPU systems. We achieve a throughput of up to 526 GB/s for all-to-all and 148 G…
Molecular biology, China and the West
2000
More than 15 years ago, in November 1985, I travelled to China for the first time. I joined a symposium on developmental biology in the Shanghai Institute of Cell Biology (CBI), organised by the Chinese Academy of Sciences and the Max‐Planck‐Gesellschaft in Germany. The symposium was meant to provide perspectives for the future of the Max Planck Guest Laboratory, just founded in the CBI. When I attended, I did not anticipate that my visit to Shanghai would initiate a long‐term commitment to China. I did not even expect to return to China in the near future. But early in 1987, my colleague Uli Schwarz from the Max Planck Institute of Developmental Biology in Tubingen, who was and still is in…
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
2015
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…