Search results for "RDW"
showing 10 items of 1401 documents
Serial In-network Processing for Large Stationary Wireless Sensor Networks
2017
International audience; In wireless sensor networks, a serial processing algorithm browses nodes one by one and can perform different tasks such as: creating a schedule among nodes, querying or gathering data from nodes, supplying nodes with data, etc. Apart from the fact thatserial algorithms totally avoid collisions, numerous recent works have confirmed that these algorithms reduce communications andconsiderably save energy and time in large-dense networks. Yet, due to the path construction complexity, the proposed algorithmsare not optimal and their performances can be further enhanced. To do so, in the present paper, we propose a new serial processing algorithm that, in most of the case…
An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks
2018
Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...
Logic gates scheme based on Coulomb blockade in metallic nanoclusters with organic ligands
2010
We propose a logic gates scheme based on the electron transfer through metallic nanoclusters linked to organic ligands and discuss theoretically the characteristics needed for practical implementation. As a proof-of-the-concept, we demonstrate the OR, AND and NOT gates and study the performance in terms of temperature, applied voltage, and noise.
Optimal Buffer Resource Allocation in Wireless Caching Networks
2019
Wireless caching systems have been exhaustively investigated in recent years. Due to limited buffer capacity, and unbalanced arrival and service rates, the backlogs may exist in the caching node and even cause buffer overflow. In this paper, we first investigate the relationship among backlogs, buffer capacity, data arrival rate and service rate, utilizing the martingale theory which is flexible in handling any arrival and service processes. Then given a target buffer overflow probability, the minimal required buffer portion is determined. If the devoted buffer capacity can fulfill all serving users' minimal buffer requirements, an optimization problem is constructed with the objective to m…
xloops - Automated Feynman diagram calculation
1998
The program package xloops, a general, model independent tool for the calculation of high energy processes up to the two-loop level, is introduced. xloops calculates massive one- and two-loop Feynman diagrams in the standard model and related theories both analytically and numerically. A user-friendly Xwindows frontend is part of the package. xloops relies on the application of parallel space techniques. The treatment of tensor structure and the separation of divergences in analytic expressions is described in this scheme. All analytic calculations are performed with Maple. We describe the mathematical methods and computer algebra techniques xloops uses and give a brief introduction how to …
Development and Evaluation of Paper-Based Devices for Iron(III) Determination in an Advanced Undergraduate Laboratory
2020
We describe a paper-based microfluidic device for iron(III) assay in an applied instrumental analysis laboratory. Simple and convenient devices were fabricated by the students using patterning of f...
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
2013
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…
Self-Organizing Architectures for Digital Signal Processing
2013
Self-organizing maps: A new digital architecture
1991
An original hardware architecture implementing the self-organizing feature maps, which is one of the most powerful and efficent neural network algorithm, is presented. The architecture, contrary to the most investigated hardware implementations of neural networks, is a full digital one and it may be easily built by using the standard VLSI techniques.
Influence of deterministic fluctuations on the 8-state Potts model
1999
We study a layered 8-state Potts model with an aperiodic modulation of the exchange couplings. Depending on its geometric properties, the aperiodic sequence may induce a 2nd order phase transition.