Journal articles on the topic 'Software - configured networks'

To see the other types of publications on this topic, follow the link: Software - configured networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software - configured networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Stepanov, M. D., E. Yu Pavlenko, and D. S. Lavrova. "Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm." Automatic Control and Computer Sciences 55, no. 8 (December 2021): 1039–50. http://dx.doi.org/10.3103/s0146411621080307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saleh, Zahraa, and Qahhar Qadir. "The Downside of Software-Defined Networking in Wireless Network." UKH Journal of Science and Engineering 4, no. 2 (December 31, 2020): 147–56. http://dx.doi.org/10.25079/ukhjse.v4n2y2020.pp147-156.

Full text
Abstract:
Mobile traffic volumes have grown exponentially because of the increase in services and applications. Traditional networks are complex to manage because the forwarding, control, and management planes are all bundled together and, thus, administrators are supposed to deploy high-level policies, as each vendor has its own configuration methods. Software-Defined Networking (SDN) is considered the future paradigm of communication networks. It decouples control logic from its underlying hardware, thereby promoting logically centralized network control and making the network more programmable and easy to configure. Low-power wireless technologies are moving toward a multitenant and multiapplication Internet of Things (IoT), which requires an architecture with scalable, reliable, and configured solutions. However, employing an SDN-based centralized architecture in the environment of a low-power wireless IoT network introduces significant challenges, such as difficult-to-control traffic, unreliable links, network contention, and high associated overheads that can significantly affect the performance of the network. This paper is a contribution toward a performance evaluation for the use of SDN in wireless networking by evaluating the latency, packet drop ratio (PDR), data extraction rate (DER), and overheads. The results show that SDN adds a high percentage of overheads to the network, which is about 43% of the 57% user packets, and the DER drops when the number of mesh nodes are increased, in addition to the high loss that was observed for packets that traveled over more hops.
APA, Harvard, Vancouver, ISO, and other styles
3

Thirunavukkarasu, V., A. Senthil Kumar, P. Prakasam, and G. Suresh. "Lifetime Maximization for 5G Mobile Networks Using Secured and Finest Optimal Routing Protocol." Journal of Nanoelectronics and Optoelectronics 16, no. 11 (November 1, 2021): 1791–96. http://dx.doi.org/10.1166/jno.2021.3139.

Full text
Abstract:
The lifetime enhancement of any 5G Wireless Networks is essential to increase the efficacy and also the network performance. Hence, to enhance the lifetime, identifying a reliable routing protocol is the major challenge in any wireless network. In this proposed research, combined optimization technique named Secured and Finest Optimal Routing (SFOR) protocol is proposed to increase the network lifetime. Therefore, the given scenario is configured as Software Defined Network (SDN) which will configure the network dynamically for efficient management. Three scenario’s of the routing problem is arrived once, the routing of the mobile node is unidentified to derive a SFOR for maximizing the network lifetime. The arrived three scenario’s are mathematically modeled as Linear Programming (LP) problem and the problems are resolved utilizing the source node routing strategies. In this research work, the planned SFOR procedure is deployed in addition efficacy is associated through the reported methods. It is detected that the projected SFOR procedure increases the era of the network is 16% and 50% as compared with Virtual Ad hoc Routing Protocol and Path Collection constructed on Trust Protocol respectively.
APA, Harvard, Vancouver, ISO, and other styles
4

Evglevskaya, N. V., A. I. Paramonov, P. I. Smirnov, and R. V. Shamilova. "Software Defined Network architecture model and cognitive control method for organizing multiple access in the Internet of Things." Radio industry 28, no. 4 (November 27, 2018): 68–75. http://dx.doi.org/10.21778/2413-9599-2018-28-4-68-75.

Full text
Abstract:
The study has the method of random multiple wireless access in the networks of the Internet of Things and the control architecture, similar to a software-configured network, examined. The models of collision description, network parameters selection and their initial values, which provide target values for the probability of the delivery in the considered networks, are analyzed. The paper proposes a method the novelty of which lies in the usage of cognitive control of network parameters, taking into account the heterogeneity of conditions for different users with a given probability of data delivery. The proposed method and model of random multiple access and cognitive selection of network parameters are relevant and can be applied when building the access level of the Internet of Things in networks with allowable losses when managing large volumes of heterogeneous traffic and ensuring the required quality of service.
APA, Harvard, Vancouver, ISO, and other styles
5

Suresh Babu, Kolluru, and Srikanth Vemuru. "A Low-Cost Software Defined Radio Based Cognitive Radio Test-Bed for LTE Networks." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 51. http://dx.doi.org/10.14419/ijet.v7i3.1.16797.

Full text
Abstract:
In this work, we present a low-cost implementation of a Cognitive Radio (CR) test-bed for LTE and LTE-Advanced (LTE-A) Networks. The test-bed setup is implemented using highly integrated Software Defined Radio (SDR) platforms which are well suited for wireless communication. Each transceiver can be configured to work as a primary (resp. secondary) eNodeB or a primary (resp. secondary) user in a Heterogeneous Cognitive Radio framework. In this context, we study the problem of spectrum management in an LTE based heterogeneous network and propose simple distributed algorithms which the secondary eNodeB can employ to efficiently manage the spectral opportunities that arise in such a network. Experimental validation show significant improvement in the secondary link throughput.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Yongli, Jie Zhang, Dahai Han, Lei Wang, Wanyi Gu, and Yuefeng Ji. "Routing on pre-configured topology for dynamic optical networks." Photonic Network Communications 17, no. 3 (August 27, 2008): 299–310. http://dx.doi.org/10.1007/s11107-008-0164-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Roka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.

Full text
Abstract:
The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect computer networks. Signature-based Intrusion Detection System matches network packets against a pre-configured set of intrusion signatures. Current implementations of IDS employ only a single thread of execution and as a consequence benefit very little from multi-processor hardware platforms. A multi-threaded technique would allow more efficient and scalable exploitation of these multi-processor machines.
APA, Harvard, Vancouver, ISO, and other styles
8

LI, DAWEI, JIE WU, DAJIN WANG, and JIAYIN WANG. "Software-Defined Networking Switches for Fast Single-Link Failure Recovery." Journal of Interconnection Networks 18, no. 04 (December 2018): 1850014. http://dx.doi.org/10.1142/s0219265918500147.

Full text
Abstract:
In this paper, we consider IP fast recovery from single-link failures in a given network topology. The basic idea is to replace some existing routers with a designated switch. When a link fails, the affected router will send all the affected traffic to the designated switch (through pre-configured IP tunnels), which will deliver the affected traffic to its destination without using the failed link. The goal of the approach is to achieve faster failure recovery than traditional routing protocols that employ reactive computing upon link failures. Software-Defined Networking (SDN) switches can serve as the designated switches because they can flexibly redirect affected traffic to other routes, instead of only to the shortest paths in the network. However, SDN switches are very expensive. Our objective is to minimize the number of SDN switches needed and to guarantee that the network can still recover from any single-link failure. For networks with uniform link costs, we show that using normal non-SDN switches with IP tunneling capability as designated switches can guarantee recovery from any single-link failure. For networks with general link costs, we find that not all single-link failures can be recovered by using non-SDN switches as designated switches; by using SDN switches only when necessary, we can reduce the total number of SDN switches needed compared to an existing work. We conduct extensive simulations to verify our proposed approaches.
APA, Harvard, Vancouver, ISO, and other styles
9

Garrison, Philip, Esther Han Beol Jang, Michael A. Lithgow, and Nicolás Andrés Pace. ""The Network Is an Excuse": Hardware Maintenance Supporting Community." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–20. http://dx.doi.org/10.1145/3479608.

Full text
Abstract:
The global community networking movement promotes locally-managed network infrastructure as a strategy for affordable Internet connectivity. This case study investigates a group of collectively managed WiFi Internet networks in Argentina and the technologists who design the networking hardware and software. Members of these community networks collaborate on maintenance and repair and practice new forms of collective work. Drawing on Actor-Network Theory, we show that the networking technologies play a role in the social relations of their maintenance and that they are intentionally configured to do so. For technology designers and deployers, we suggest a path beyond designing for easy repair: since every breakdown is an opportunity to learn, we should design for accessible repair experiences that enable effective collaborative learning.
APA, Harvard, Vancouver, ISO, and other styles
10

Bakouri, Mohsen, Mohammed Alsehaimi, Husham Farouk Ismail, Khaled Alshareef, Ali Ganoun, Abdulrahman Alqahtani, and Yousef Alharbi. "Steering a Robotic Wheelchair Based on Voice Recognition System Using Convolutional Neural Networks." Electronics 11, no. 1 (January 5, 2022): 168. http://dx.doi.org/10.3390/electronics11010168.

Full text
Abstract:
Many wheelchair people depend on others to control the movement of their wheelchairs, which significantly influences their independence and quality of life. Smart wheelchairs offer a degree of self-dependence and freedom to drive their own vehicles. In this work, we designed and implemented a low-cost software and hardware method to steer a robotic wheelchair. Moreover, from our method, we developed our own Android mobile app based on Flutter software. A convolutional neural network (CNN)-based network-in-network (NIN) structure approach integrated with a voice recognition model was also developed and configured to build the mobile app. The technique was also implemented and configured using an offline Wi-Fi network hotspot between software and hardware components. Five voice commands (yes, no, left, right, and stop) guided and controlled the wheelchair through the Raspberry Pi and DC motor drives. The overall system was evaluated based on a trained and validated English speech corpus by Arabic native speakers for isolated words to assess the performance of the Android OS application. The maneuverability performance of indoor and outdoor navigation was also evaluated in terms of accuracy. The results indicated a degree of accuracy of approximately 87.2% of the accurate prediction of some of the five voice commands. Additionally, in the real-time performance test, the root-mean-square deviation (RMSD) values between the planned and actual nodes for indoor/outdoor maneuvering were 1.721 × 10−5 and 1.743 × 10−5, respectively.
APA, Harvard, Vancouver, ISO, and other styles
11

Taniguchi, Yoshiaki, Hiroaki Tsutsumi, Nobukazu Iguchi, and Kenzi Watanabe. "Design and Evaluation of a Proxy-Based Monitoring System for OpenFlow Networks." Scientific World Journal 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/6513649.

Full text
Abstract:
Software-Defined Networking (SDN) has attracted attention along with the popularization of cloud environment and server virtualization. In SDN, the control plane and the data plane are decoupled so that the logical topology and routing control can be configured dynamically depending on network conditions. To obtain network conditions precisely, a network monitoring mechanism is necessary. In this paper, we focus on OpenFlow which is a core technology to realize SDN. We propose, design, implement, and evaluate a network monitoring system for OpenFlow networks. Our proposed system acts as a proxy between an OpenFlow controller and OpenFlow switches. Through experimental evaluations, we confirm that our proposed system can capture packets and monitor traffic information depending on administrator’s configuration. In addition, we show that our proposed system does not influence significant performance degradation to overall network performance.
APA, Harvard, Vancouver, ISO, and other styles
12

VERGILIO, SILVIA REGINA, and AURORA POZO. "A GRAMMAR-GUIDED GENETIC PROGRAMMING FRAMEWORK CONFIGURED FOR DATA MINING AND SOFTWARE TESTING." International Journal of Software Engineering and Knowledge Engineering 16, no. 02 (April 2006): 245–67. http://dx.doi.org/10.1142/s0218194006002781.

Full text
Abstract:
Genetic Programming (GP) is a powerful software induction technique that can be applied to solve a wide variety of problems. However, most researchers develop tailor-made GP tools for solving specific problems. These tools generally require significant modifications in their kernel to be adapted to other domains. In this paper, we explore the Grammar-Guided Genetic Programming (GGGP) approach as an alternative to overcome such limitation. We describe a GGGP based framework, named Chameleon, that can be easily configured to solve different problems. We explore the use of Chameleon in two domains, not usually addressed by works in the literature: in the task of mining relational databases and in the software testing activity. The presented results point out that the use of the grammar-guided approach helps us to obtain more generic GP frameworks and that they can contribute in the explored domains.
APA, Harvard, Vancouver, ISO, and other styles
13

Ou, Zhou, and Xiao Peng Xie. "Research on In-Vehicle FlexRay Bus Network Nodes." Advanced Materials Research 591-593 (November 2012): 1325–29. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.1325.

Full text
Abstract:
Network node designs of hardware system and software system based on in-vehicle FlexRay Bus were put forward. Structure and theory of node’s MCU, communication controller and Bus drive were analyzed. The simplest system of FlexRay Bus node was structured, and main files program, clock program, interruption program, and FlexRay Bus communication program were configured. The operation status of FlexRay Bus protocol was analyzed, and programs of receiving and transmitting data were designed. The experimental system based on MC9S12XF512 was established, and in development environment of CodeWarrior IDE, FlexRay Bus networks nodes communication was accomplished based on TDMA and FTDMA mechanism.
APA, Harvard, Vancouver, ISO, and other styles
14

Jeyaprakash, Thangakumar, and Rajeswari Mukesh. "Simulation of Vehicular Ad-hoc Network Routing Protocols with a Performance Analysis." Journal of Communications Software and Systems 11, no. 2 (June 23, 2015): 86. http://dx.doi.org/10.24138/jcomss.v11i2.107.

Full text
Abstract:
Vehicular Ad-hoc Network (VANET), a subset of Mobile Ad-hoc networks (MANETs), is one of the emerging technologies of Road Transportation system. In recent years, the aspect of Vehicular Ad-hoc Network (VANET) is becoming an interesting research area as it is characterized as self-configured wireless network. The design of routing protocols in VANETs is play a vital role and necessary issue for the Vehicle to Vehicle Communication Technology. The existing routing protocols of MANETs are suitable for VANET with changes in configuration of protocol. The routing protocols fall into two major categories of topology-based and position-based routing. We discussed different kinds of existing routing protocols with two major categories, the advantages and limitations of each which will helps to enhance the existing routing protocols for the suitability of Vehicular Ad-hoc Networks. We implemented three existing routing protocols and the testing results stated that the performance of each in aspects of various parameters such as Packet Delivery Ratio, Throughput and End-End Delay using Network Simulator.
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Geng Ran, Ying Hong Luo, and Yu Zhou. "OPNET-Based Simulation and Research of Communication Network Performance in Digital Traction Substation." Applied Mechanics and Materials 440 (October 2013): 283–88. http://dx.doi.org/10.4028/www.scientific.net/amm.440.283.

Full text
Abstract:
In order to keep pace with the development of IEC61850-based intelligent and digital power grid technology, a high-performance communication network must be configured in the process of electrified railway traction substation digitization to achieve the various functions of the substation automation system (SAS). First of all, the structure of communication network in a digital traction substation and the category of different data flow in it are analyzed in this paper. Secondly, the part of packet end-to-end delay (ETE Delay) is specifically discussed. In the last place, by using OPNET, a dynamic network modeling and simulating software, the networks both in substation level and process level is simulated and researched. The results show that the network built in this article can meet the real-time requirements of IEC61850.
APA, Harvard, Vancouver, ISO, and other styles
16

M., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (January 20, 2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.

Full text
Abstract:
Mobile Ad hoc Network is a self-configured network, the main responsibility faced in the network is security. Malicious nodes are mostly to blame for the insecurity of MANET. The malicious attacker nodes will disrupt the overall functioning of the network, and many security solution approaches are utilized for safe and reliable communication in MANET to stop such harmful activity. This routing, known as Hybrid Trust Cluster based Multiple Routing (H-TCMR), helps to minimize the amount of messages carried inside the network, lowering the network's total energy usage. It utilizes Hybrid Time Division Multiple Access (HTDMA) for time slots and the Unified Slot Assignment Protocol (USAP) for cluster allocation. Using Hybrid Rider Optimization Algorithm (HROA) approaches, a group of riders will drive together to a specified location in order to obtain the cluster head slot. The suggested approach encrypts the data before sending it to its final destination. It also helps to extend the life of mobile networks. Some of the factors considered in simulation studies include connection, energy, average delay, throughput, as well as overall cluster quality. The simulation result demonstrates a performance study of HTCMR's dependable security, as well as increased system efficiency and improved data transfer security.
APA, Harvard, Vancouver, ISO, and other styles
17

Kadhim, Hussam Jawad, and Mohammed Jabbar MohammedAmeen. "Design and implement a smart system to detect intruders and firing using IOT." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 5932. http://dx.doi.org/10.11591/ijece.v10i6.pp5932-5939.

Full text
Abstract:
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IOTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on /off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
APA, Harvard, Vancouver, ISO, and other styles
18

Sebbah, Samir, and Brigitte Jaumard. "Design of survivable WDM networks using pre-configured protection structures with unrestricted shapes." Photonic Network Communications 19, no. 1 (August 28, 2009): 9–21. http://dx.doi.org/10.1007/s11107-009-0206-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sholikhin, Achmad Riyadus, Taufiq Timur Warisaji, and Triawan Adi Cahyanto. "Penerapan Wireless Distribution System (WDS) Mesh Untuk Optimasi Cakupan Area Wi-Fi di UM Jember." BIOS : Jurnal Teknologi Informasi dan Rekayasa Komputer 1, no. 2 (February 11, 2021): 61–69. http://dx.doi.org/10.37148/bios.v1i2.14.

Full text
Abstract:
One very rapid change in computer networks is the use of Wireless Local Area Network (WLAN) to access systems both locally and the internet. One way to add an Access Point (AP) so as not to change the configuration of the running software is use the Wireless Distribution System Mesh (WDS) network. The use of WDS mesh at Universitas Muhammmadiyah Jember (UM Jember) enables a slightly different wireless configuration to reduce the connection loss in the user due to the wireless network area coverage. One step is use AP devices into one unit to handle the case of a connection break by utilizing a network service that is WDS Mesh. WDS Mesh can cover Wi-Fi areas at UM Jember, and the results of testing and analysis of client devices for APs that have been configured WDS Mesh with parameters Signal Strength, CCQ, Signal to Noise Ratio Ratio, Throughput is Excellent.
APA, Harvard, Vancouver, ISO, and other styles
20

Moshenchenko, Nikita, and Bohdan Zhurakovskyi. "SMARTCITY WIRELESS FENCE AND INTERACTIVE INFRASTRUCTURE MODEL." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 63–80. http://dx.doi.org/10.28925/2663-4023.2021.13.6380.

Full text
Abstract:
This article considers the problem of the process of using robots and their control in catering establishments with the help of wireless networks, shows the main features of existing solutions in the field of robotics and networks, their advantages and disadvantages. Wireless networks for their application in robot control have been studied. The main task of wireless networks is to provide high-speed local access to services and data in a certain area, the exchange of information between users within the territory. Building wireless Wi-Fi (IEEE 802.11) networks is now in high demand due to a host of benefits. Among the main advantages of this technology are the most attractive: low cost of equipment; flexibility of equipment use; high data rate. This technology provides the ability to run a number of custom applications. The infrastructure of wireless networks is the basis on which the further implementation of custom applications is built and the support of key services for the company is provided. Such services include network management, information security and service quality assurance (QoS) mechanisms. A virtual environment with the appropriate software was configured, a network simulation was performed, and its results were recorded. This solution can be used in catering establishments. It allows to introduce new technologies into the sphere of human life and increase the profits of food business owners.
APA, Harvard, Vancouver, ISO, and other styles
21

Lomborg, Stine. "Social media as communicative genres." MedieKultur: Journal of media and communication research 27, no. 51 (August 23, 2011): 17. http://dx.doi.org/10.7146/mediekultur.v27i51.4012.

Full text
Abstract:
<p>As a focus of study, ‘social media’ tend to lack definitional clarity and grounding in theories of media and text. This paper establishes and discusses a conceptual framework for defining social media as communicative genres, constituted by the interplay between interactive functionalities configured at the software level and the invocation and appropriation of various software functionalities to achieve specific purposes in and through users’ actual communicative practices. I suggest that social media might be seen as particularly dynamic genres, subject to continuous disruption and uncertainty,owing to their deinstitutionalised and participatory character, and the shifting roles of producers and recipients in the networks and conversations that make up social media content.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Elmorshedy, Riam Mohamed Elsagher Mahmod. "Spatial Assessment for Open Spaces in Residential Areas: Case of Sheikh Zayed City, Egypt." Academic Research Community publication 3, no. 2 (May 1, 2019): 141. http://dx.doi.org/10.21625/archive.v3i2.507.

Full text
Abstract:
Open spaces have one of the most essential roles in social communications and people relaxation. However, the design of its locations and relations with the surroundings neglect this role, especially in Egypt. Here, we aimed to support the configured structure of spaces and its potential impact as a suitable place for social life, communication, relaxation, playing, . . . .so on, in an institution housing topology.This paper is applied in a neighborhood of intermediate social housing level: dealing with which surround the open space; whether they are streets, buildings’ walls, another space, or buildings’ entrances. Concentrating on two main variables: the relationship between the open spaces and the movement networks, and the pattern of house buildings’ distribution, which have an effect on the segregation degree of space and its role in social settings.This practical study uses a collection of programs software, mainly depending on Space Syntax methodology for understanding a network of spaces by using DepthmapX software, auto cad, and excel software as aid programs.The results show the difference in the space location’s integration values, and from this the guide lines for a good open space location in residential areas were determined.
APA, Harvard, Vancouver, ISO, and other styles
23

YASUI, T., T. KAMINOGOU, T. NAKATA, and H. MATSUDA. "Internet Access System with GMPLS Architecture Configured on Wavelength Assignment Photonic Switching System." IEICE Transactions on Communications E90-B, no. 4 (April 1, 2007): 836–44. http://dx.doi.org/10.1093/ietcom/e90-b.4.836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Roopa, K., T. V. Rama Murthy, and P. Cyril Prasanna Raj. "Neural Network Classifier for Fighter Aircraft Model Recognition." Journal of Intelligent Systems 27, no. 3 (July 26, 2018): 447–63. http://dx.doi.org/10.1515/jisys-2016-0087.

Full text
Abstract:
Abstract Fighter aircraft recognition is important in military applications to make strategic decisions. The complexity lies in correctly identifying the unknown aircraft irrespective of its orientations. The work reported here is a research initiative in this regard. The database used here was obtained by using rapid prototyped physical models of four classes of fighter aircraft: P51 Mustang, G1-Fokker, MiG25-F, and Mirage 2000. The image database was divided into the training set and test set. Two feature sets, Feature Set1 (FS1) and FS2, were extracted for the images. FS1 consisted of 15 general features and FS2 consisted of 14 invariant moment features. Four multilayered feedforward backpropagation neural networks were designed and trained optimally with the normalized feature sets. The neural networks were configured to classify the test aircraft image. An overall accuracy of recognition of 91% and a response time of 3 s were achieved for the developed automatic fighter aircraft model image recognition system.
APA, Harvard, Vancouver, ISO, and other styles
25

Zeng, Zeng, and Bharadwaj Veeravalli. "Distributed scheduling strategy for divisible loads on arbitrarily configured distributed networks using load balancing via virtual routing." Journal of Parallel and Distributed Computing 66, no. 11 (November 2006): 1404–18. http://dx.doi.org/10.1016/j.jpdc.2006.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

HONMA, N. "Series-Fed Beam-Scanning Antenna Employing Multi-Stage Configured Microstrip Antennas with Tunable Reactance Devices." IEICE Transactions on Communications E88-B, no. 6 (June 1, 2005): 2297–304. http://dx.doi.org/10.1093/ietcom/e88-b.6.2297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Neftci, Emre, Elisabetta Chicca, Giacomo Indiveri, and Rodney Douglas. "A Systematic Method for Configuring VLSI Networks of Spiking Neurons." Neural Computation 23, no. 10 (October 2011): 2457–97. http://dx.doi.org/10.1162/neco_a_00182.

Full text
Abstract:
An increasing number of research groups are developing custom hybrid analog/digital very large scale integration (VLSI) chips and systems that implement hundreds to thousands of spiking neurons with biophysically realistic dynamics, with the intention of emulating brainlike real-world behavior in hardware and robotic systems rather than simply simulating their performance on general-purpose digital computers. Although the electronic engineering aspects of these emulation systems is proceeding well, progress toward the actual emulation of brainlike tasks is restricted by the lack of suitable high-level configuration methods of the kind that have already been developed over many decades for simulations on general-purpose computers. The key difficulty is that the dynamics of the CMOS electronic analogs are determined by transistor biases that do not map simply to the parameter types and values used in typical abstract mathematical models of neurons and their networks. Here we provide a general method for resolving this difficulty. We describe a parameter mapping technique that permits an automatic configuration of VLSI neural networks so that their electronic emulation conforms to a higher-level neuronal simulation. We show that the neurons configured by our method exhibit spike timing statistics and temporal dynamics that are the same as those observed in the software simulated neurons and, in particular, that the key parameters of recurrent VLSI neural networks (e.g., implementing soft winner-take-all) can be precisely tuned. The proposed method permits a seamless integration between software simulations with hardware emulations and intertranslatability between the parameters of abstract neuronal models and their emulation counterparts. Most important, our method offers a route toward a high-level task configuration language for neuromorphic VLSI systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Morell, Antoni, Elvis Díaz Machado, Enrique Miranda, Guillem Boquet, and Jose Lopez Vicario. "Ternary Neural Networks Based on on/off Memristors: Set-Up and Training." Electronics 11, no. 10 (May 10, 2022): 1526. http://dx.doi.org/10.3390/electronics11101526.

Full text
Abstract:
Neuromorphic systems based on hardware neural networks (HNNs) are expected to be an energy and time-efficient computing architecture for solving complex tasks. In this paper, we consider the implementation of deep neural networks (DNNs) using crossbar arrays of memristors. More specifically, we considered the case where such devices can be configured in just two states: the low-resistance state (LRS) and the high-resistance state (HRS). HNNs suffer from several non-idealities that need to be solved when mapping our software-based models. A clear example in memristor-based neural networks is conductance variability, which is inherent to resistive switching devices, so achieving good performance in an HNN largely depends on the development of reliable weight storage or, alternatively, mitigation techniques against weight uncertainty. In this manuscript, we provide guidelines for a system-level designer where we take into account several issues related to the set-up of the HNN, such as what the appropriate conductance value in the LRS is or the adaptive conversion of current outputs at one stage to input voltages for the next stage. A second contribution is the training of the system, which is performed via offline learning, and considering the hardware imperfections, which in this case are conductance fluctuations. Finally, the resulting inference system is tested in two well-known databases from MNIST, showing that is competitive in terms of classification performance against the software-based counterpart. Additional advice and insights on system tuning and expected performance are given throughout the paper.
APA, Harvard, Vancouver, ISO, and other styles
29

Saad, Wasan Kadhim, Ibraheem Shayea, Bashar J. Hamza, Hafizal Mohamad, Yousef Ibrahim Daradkeh, and Waheb A. Jabbar. "Handover Parameters Optimisation Techniques in 5G Networks." Sensors 21, no. 15 (July 31, 2021): 5202. http://dx.doi.org/10.3390/s21155202.

Full text
Abstract:
The massive growth of mobile users will spread to significant numbers of small cells for the Fifth Generation (5G) mobile network, which will overlap the fourth generation (4G) network. A tremendous increase in handover (HO) scenarios and HO rates will occur. Ensuring stable and reliable connection through the mobility of user equipment (UE) will become a major problem in future mobile networks. This problem will be magnified with the use of suboptimal handover control parameter (HCP) settings, which can be configured manually or automatically. Therefore, the aim of this study is to investigate the impact of different HCP settings on the performance of 5G network. Several system scenarios are proposed and investigated based on different HCP settings and mobile speed scenarios. The different mobile speeds are expected to demonstrate the influence of many proposed system scenarios on 5G network execution. We conducted simulations utilizing MATLAB software and its related tools. Evaluation comparisons were performed in terms of handover probability (HOP), ping-pong handover probability (PPHP) and outage probability (OP). The 5G network framework has been employed to evaluate the proposed system scenarios used. The simulation results reveal that there is a trade-off in the results obtained from various systems. The use of lower HCP settings provides noticeable enhancements compared to higher HCP settings in terms of OP. Simultaneously, the use of lower HCP settings provides noticeable drawbacks compared to higher HCP settings in terms of high PPHP for all scenarios of mobile speed. The simulation results show that medium HCP settings may be the acceptable solution if one of these systems is applied. This study emphasises the application of automatic self-optimisation (ASO) functions as the best solution that considers user experience.
APA, Harvard, Vancouver, ISO, and other styles
30

El Barrak, Soumaya, Amina El Gonnouni, Salvatore Serrano, Antonio Puliafito, and Abdelouahid Lyhyaoui. "GSM-RF Channel Characterization Using a Wideband Subspace Sensing Mechanism for Cognitive Radio Networks." Wireless Communications and Mobile Computing 2018 (November 14, 2018): 1–11. http://dx.doi.org/10.1155/2018/7095763.

Full text
Abstract:
In this paper, we examine a spectrum sharing opportunities over the existing Global System of Mobile Communication (GSM) networks, by identifying the unused channels at a specific time and location. For this purpose, we propose a wideband spectrum sensing mechanism to analyze the status of 51 channels at once, belonging to the 10 MHz bandwidth centered at the frequency 945 MHz, in four different areas. We propose a subspace based spectral estimation mechanism, adapted to deal with real measurements. The process begins with data collection using Secondary User (SU) device enabled with Software Defined Radio (SDR) technology, configured to operate in the GSM band. Obtained samples are used then to feed the sensing mechanism. Spectral analysis is delivered to estimate power density peaks and corresponding frequencies. Decision making phase brings together power thresholding technique and GSM control channel decoding to identify idle and busy channels. Experiments are evaluated using detection and false alarm probabilities emulated via Receiver Operating Characteristic (ROC) curves. Obtained performances show better detection accuracy and robustness against variant noise/fading effects, when using our mechanism compared to Energy Detection (ED) based ones as Welch method, and Beamforming based ones as Minimum Variance Distortionless Response (MVDR) method. Occupancy results exhibit considerable potential of secondary use in GSM based primary network.
APA, Harvard, Vancouver, ISO, and other styles
31

Yoon Khang, Adam Wong, Arnidza Ramli, Shamsul J. Elias, J. Pusppanathan, Jamil Abedalrahim Jamil Alsayaydeh, Fatin Hamimi Mustafa, Win Adiyansyah Indra, and Johar Akbar Mohamat Gani. "Self-configuration and self-optimization process with taguchi method in hybrid optical wireless network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 870. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp870-878.

Full text
Abstract:
<p>In this paper, an alternative improvement is proposed which is the adaptive wireless access networks-based optical backhaul convergence that will greatly promote to use the existing resource of MANET (mobile ad hoc network). However, these characteristics itself acts as a drawback to the MANET applications such as the random distribution of nodes and continuously changing topology. MiNiTab statistical software was used to model the effect of the parameter variation to predict the field quality through the design of experiments while OMNeT++ network simulation was created to visualize the effect of QoS performance study in response with varying speed scenario. The result shows that the proposed ESCMDR scheme can obtain robustness and outperformed compared to the non-Taguchi previous study when it is used in random waypoint mobility model in any speed of sources. The work is based on Packet Delivery Ratio (PDR) and Packet Loss Probability (PLP) metric under the varying speed scenario. It results in better QoS network PDR of 28.9% improvement, with 83.56% improvement on average PLP. The paper shows that the MANET QoS performance constrained can be addressed with the self-configured data rate of integrated optimization with Taguchi method on AODV-UU (Adhoc On Demand Distance Vector-Uppsala University) routing technique.</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Olha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS." Problems of Modeling and Design Automatization, no. 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.

Full text
Abstract:
In conditions of high business competition, IT organizations need to respond quickly to the needs of their users who need resources to support business applications. This is due to the rapid spread of the cloud computing model, in which resources can be deployed independently and on demand. Cloud computing is a source of tools to automate the deployment of resources, so IT organizations do not have to spend so much time doing this process manually. When deploying new applications, moving virtual servers or commissioning new instances due to dynamic applications, the network must respond quickly and provide the required type of connection. There has been a significant breakthrough in software configured networks (SDN / NFV) over the past few years. SDN / NFV organizations need to increase network adaptability by automating the network on cloud computing platforms.However, the new challenges posed by the combination of cloud computing and SDN / NFV, especially in the area of enterprise network security, are still poorly understood. This article is about solving this important problem. The article examines the impact on the mechanisms of protection against network attacks in the corporate network, which uses both technologies, simulates DDoS-attacks on cloud computing systems. It has been shown that SDN / NFV technology can really help protect against DDoS attacks if the security architecture is designed correctly.
APA, Harvard, Vancouver, ISO, and other styles
33

Vidal, Ivan, Borja Nogales, Diego Lopez, Juan Rodríguez, Francisco Valera, and Arturo Azcorra. "A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services." Electronics 10, no. 15 (August 3, 2021): 1868. http://dx.doi.org/10.3390/electronics10151868.

Full text
Abstract:
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components, referred to as Virtual Network Functions (VNFs). It provides a high degree of flexibility in placing these components on distributed NFV infrastructures (e.g., at the network edge, close to end users). Still, this flexibility creates new challenges in terms of VNF connectivity. To address these challenges, we introduce a novel secure link-layer connectivity platform, L2S. Our solution can automatically be deployed and configured as a regular multi-site NFV service, providing the abstraction of a layer-2 switch that offers link-layer connectivity to VNFs deployed on remote NFV sites. Inter-site communications are effectively protected using existing security solutions and protocols, such as IP security (IPsec). We have developed a functional prototype of L2S using open-source software technologies. Our evaluation results indicate that this prototype can perform IP tunneling and cryptographic operations at Gb/s data rates. Finally, we have validated L2S using a multi-site NFV ecosystem at the Telefonica Open Network Innovation Centre (5TONIC), using our solution to support a multicast-based IP television service.
APA, Harvard, Vancouver, ISO, and other styles
34

MAJID, Sonia, and Kazi AHMED. "Mobile Handsets as Sensing Nodes in an Auto-Configured Hierarchical Cognitive Radio Network Scheme for Immediate Post-Disaster Communications." IEICE Transactions on Communications E92-B, no. 7 (2009): 2397–405. http://dx.doi.org/10.1587/transcom.e92.b.2397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Abdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (January 12, 2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.

Full text
Abstract:
Automatic means to manage the security in moderate and large networks are of extreme importance to avoid error-prone manual techniques. This paper paves the way to develop an automatic network security management (NSM) system that is both flexible in deciding the system’s objectives and efficient in using the valuable network bandwidth with a relatively low transmission overhead. The required flexibility and efficiency are obtained using mobile agents (MA) to collect the required security information from various network components and devices, and using ontology to specify the required security policies in such a way understandable by the MA’s software. A simplified NSM prototype is developed, implemented, and tested over a typical local area network to investigate the validity of the suggested ideas. The MA travels through the network and collects the necessary information using an ontology-based security policy. Next, it may either return back to the network administrator to let him decide and perform the suitable actions, or alternatively the MA may take the appropriate decisions. This prototype is tested to examine its functionality and performance using a simple local area network consisting of three computers with different configurations. The developed MA was able to understand the ontology and move around the network. It has properly detected the components that are wrongly configured. It should be made clear that the design is scalable and can be directly applied to more computers in a local area network or even in a wide area network.
APA, Harvard, Vancouver, ISO, and other styles
36

Liao, Lizhi, Heng Li, Weiyi Shang, and Lei Ma. "An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks." ACM Transactions on Software Engineering and Methodology 31, no. 3 (July 31, 2022): 1–40. http://dx.doi.org/10.1145/3506695.

Full text
Abstract:
Deep neural network (DNN) models typically have many hyperparameters that can be configured to achieve optimal performance on a particular dataset. Practitioners usually tune the hyperparameters of their DNN models by training a number of trial models with different configurations of the hyperparameters, to find the optimal hyperparameter configuration that maximizes the training accuracy or minimizes the training loss. As such hyperparameter tuning usually focuses on the model accuracy or the loss function, it is not clear and remains under-explored how the process impacts other performance properties of DNN models, such as inference latency and model size. On the other hand, standard DNN models are often large in size and computing-intensive, prohibiting them from being directly deployed in resource-bounded environments such as mobile devices and Internet of Things (IoT) devices. To tackle this problem, various model optimization techniques (e.g., pruning or quantization) are proposed to make DNN models smaller and less computing-intensive so that they are better suited for resource-bounded environments. However, it is neither clear how the model optimization techniques impact other performance properties of DNN models such as inference latency and battery consumption, nor how the model optimization techniques impact the effect of hyperparameter tuning (i.e., the compounding effect). Therefore, in this paper, we perform a comprehensive study on four representative and widely-adopted DNN models, i.e., CNN image classification , Resnet-50 , CNN text classification , and LSTM sentiment classification , to investigate how different DNN model hyperparameters affect the standard DNN models, as well as how the hyperparameter tuning combined with model optimization affect the optimized DNN models, in terms of various performance properties (e.g., inference latency or battery consumption). Our empirical results indicate that tuning specific hyperparameters has heterogeneous impact on the performance of DNN models across different models and different performance properties. In particular, although the top tuned DNN models usually have very similar accuracy, they may have significantly different performance in terms of other aspects (e.g., inference latency). We also observe that model optimization has a confounding effect on the impact of hyperparameters on DNN model performance. For example, two sets of hyperparameters may result in standard models with similar performance but their performance may become significantly different after they are optimized and deployed on the mobile device. Our findings highlight that practitioners can benefit from paying attention to a variety of performance properties and the confounding effect of model optimization when tuning and optimizing their DNN models.
APA, Harvard, Vancouver, ISO, and other styles
37

Ruíz Martínez, William, Yesid Díaz-Gutiérrez, Roberto Ferro-Escobar, and Luis Pallares. "Application of the Internet of Things through a Network of Wireless Sensors in a Coffee Crop for Monitoring and Control its Environmental Variables." TecnoLógicas 22, no. 46 (September 20, 2019): 155–70. http://dx.doi.org/10.22430/22565337.1485.

Full text
Abstract:
This article presents the application of the Internet of things (IoT), as a technological tool for the development of a wireless sensor network with the aim of monitoring and controlling a series of environmental variables affecting the cultivation of coffee and its final quality. The logical and physical design of the network and its devices was carried out, the sensors network was configured in a given field and the information of certain environmental variables was collected to be compared with a series of parameters already established. This procedure will allow the coffee growers to observe the behavior of these variables over time and set the generation of alerts or warnings when these measures are outside the established ranges. The study determined that the management of coffee cultivation is quite complex due to the large number of varieties found, the terrain and environmental variables affecting the production process and the final quality of the grain. It was also determined that the development and implementation of wireless sensor networks is possible today due to factors such as the reduction of device costs and the use of open source software, avoiding additional licensing values. Finally, based on the parameters analyzed, it was possible to establish that one of the main problems in coffee crops is the intense humidity that, in practice, can affect the performance of the sensors and their measurements.
APA, Harvard, Vancouver, ISO, and other styles
38

Dass, Shuvalaxmi, and Akbar Siami Namin. "Reinforcement Learning for Generating Secure Configurations." Electronics 10, no. 19 (September 30, 2021): 2392. http://dx.doi.org/10.3390/electronics10192392.

Full text
Abstract:
Many security problems in software systems are because of vulnerabilities caused by improper configurations. A poorly configured software system leads to a multitude of vulnerabilities that can be exploited by adversaries. The problem becomes even more serious when the architecture of the underlying system is static and the misconfiguration remains for a longer period of time, enabling adversaries to thoroughly inspect the software system under attack during the reconnaissance stage. Employing diversification techniques such as Moving Target Defense (MTD) can minimize the risk of exposing vulnerabilities. MTD is an evolving defense technique through which the attack surface of the underlying system is continuously changing. However, the effectiveness of such dynamically changing platform depends not only on the goodness of the next configuration setting with respect to minimization of attack surfaces but also the diversity of set of configurations generated. To address the problem of generating a diverse and large set of secure software and system configurations, this paper introduces an approach based on Reinforcement Learning (RL) through which an agent is trained to generate the desirable set of configurations. The paper reports the performance of the RL-based secure and diverse configurations through some case studies.
APA, Harvard, Vancouver, ISO, and other styles
39

Fuller, Crispian. "Understanding the impact of Brexit: The case of foreign software corporations in Scotland and South East England." European Urban and Regional Studies 28, no. 2 (February 5, 2021): 173–91. http://dx.doi.org/10.1177/0969776421989401.

Full text
Abstract:
Market and institutional shocks and upheaval, brought about by political, economic and social changes, have the potential to generate significant corporate restructuring. Foreign subsidiaries are particularly vulnerable to such impacts given the embeddedness of parent companies in their home countries, with the potential for disinvestment and regional decoupling. This paper examines the impact of the Brexit vote and negotiation period on UK-based foreign subsidiaries in the software and software-related sectors in Scotland and South East England. This firm-centric approach follows recent evolutionary thinking that restates the importance of examining the firm as a means by which to understand how regions respond to such disturbances. Rather than simply examine impact, the paper is concerned with why the scope and scale of impacts are mediated by particular corporate and global production networks (GPN) processes. Key to this is the examination of the importance of the value creation corporate role and degree of replication within the corporation (specificity), the GPN spatial configuration, and the markets that subsidiaries are mandated to serve. The paper concludes that a variety of impacts are evident, but that notable negative consequences have arisen for subsidiaries with low corporate specificity, working through European Union (EU)-configured GPNs, and serving European markets. These negative impacts are more notable in Scotland, compared with South East England where a large minority have experienced no detrimental impacts.
APA, Harvard, Vancouver, ISO, and other styles
40

Varatharaj, Nagaraj, and Sumithira Thulasimani Ramalingam. "Enabling continuous connectivity services for ambrosus blockchain application by incorporating 5G-multilevel machine learning orchestrations." Journal of Intelligent & Fuzzy Systems 42, no. 4 (March 4, 2022): 3575–90. http://dx.doi.org/10.3233/jifs-211745.

Full text
Abstract:
Most revolutionary applications extending far beyond smartphones and high configured mobile device use to the future generation wireless networks’ are high potential capabilities in recent days. One of the advanced wireless networks and mobile technology is 5G, where it provides high speed, better reliability, and amended capacity. 5 G offers complete coverage, which is accommodates any IoT device, connectivity, and intelligent edge algorithms. So that 5 G has a high demand in a wide range of commercial applications. Ambrosus is a commercial company that integrates block-chain security, IoT network, and supply chain management for medical and food enterprises. This paper proposed a novel framework that integrates 5 G technology, Machine Learning (ML) algorithms, and block-chain security. The main idea of this work is to incorporate the 5 G technology into Machine learning architectures for the Ambrosus application. 5 G technology provides continuous connection among the network user/nodes, where choosing the right user, base station, and the controller is obtained by using for ML architecture. The proposed framework comprises 5 G technology incorporate, a novel network orchestration, Radio Access Network, and a centralized distributor, and a radio unit layer. The radio unit layer is used for integrating all the components of the framework. The ML algorithm is evaluated the dynamic condition of the base station, like as IoT nodes, Ambrosus users, channels, and the route to enhance the efficiency of the communication. The performance of the proposed framework is evaluated in terms of prediction by simulating the model in MATLAB software. From the performance comparison, it is noticed that the proposed unified architecture obtained 98.6% of accuracy which is higher than the accuracy of the existing decision tree algorithm 97.1%.
APA, Harvard, Vancouver, ISO, and other styles
41

Dorward, D. W. "A Low Cost Configuration for Internetwork Telemicroscopy." Microscopy and Microanalysis 6, S2 (August 2000): 1146–47. http://dx.doi.org/10.1017/s1431927600038228.

Full text
Abstract:
Advances in internetwork data transmission rates and reductions in the cost of imaging components and applications have facilitated real-time sharing of video, still images, and microscope operating systems with collaborators or observers at remote locations. Specialized direct and web-based systems for transmission electron microscopy have been described previously. However, in order to develop a generic and flexible means of sharing live images and data from light, scanning electron, and transmission electron microscope instruments, a telemicroscopy system was configured using readily available components and software that can be adapted for use with most common computer operating and networking systems.Figure 1 diagrams the general configuration used in our laboratory. Input devices can include inexpensive desktop digital or analog video cameras, specialized fast or slow scan CCD cameras, and the analog video-screen signal generated by scanning electron microscopes. For transmission through TCP/IP networks, analog signals must be digitized with a frame grabber card.
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Haike, Huajian Zhang, Kai Yang, and Jiali Li. "Virtualized High Throughput Satellite Gateway with a Global Bandwidth Management Method." Mobile Information Systems 2022 (January 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/6257885.

Full text
Abstract:
With the development of new satellite payload technology, in order to improve the utilization of system resources, research is based on software-defined network (SDN) and network function virtualization (NFV) gateway architecture. Based on this architecture, the system realizes global resource management and overall data distribution, which can solve the problem of resource allocation and maximum/minimum rate guarantee between different VNO terminals under different beams, different gateways, and different satellites. For this, a global bandwidth management method can be used which is mainly a process of management to control the traffic on a communication link. The proposed global resource management and control method can be based on the rate guarantee value of the VNO/terminal configured in the system as the basic limiting condition and reallocate the rate guarantee value limiting parameter according to the resource application status of the online terminal. The method can maximize the resource utilization of the entire satellite communication system and satisfy the resource request of the user terminal as much as possible.
APA, Harvard, Vancouver, ISO, and other styles
43

Choudhury, Ziaul, Shashwat Shrivastava, Lavanya Ramapantulu, and Suresh Purini. "An FPGA Overlay for CNN Inference with Fine-grained Flexible Parallelism." ACM Transactions on Architecture and Code Optimization 19, no. 3 (September 30, 2022): 1–26. http://dx.doi.org/10.1145/3519598.

Full text
Abstract:
Increasingly, pre-trained convolutional neural networks (CNNs) are being deployed for inference in various computer vision applications, both on the server-side in the data centers and at the edge. CNN inference is a very compute-intensive task. It is a challenge to meet performance metrics such as latency and throughput while optimizing power. Special-purpose ASICs and FPGAs are suitable candidates to meet these power and performance budgets simultaneously. Rapidly evolving CNN architectures involve novel convolution operations such as point convolutions, depth separable convolutions, and so on. This leads to substantial variation in the computational structure across CNNs and layers within a CNN. Because of this, FPGA reconfigurability provides an attractive tradeoff compared to ASICs. FPGA-based hardware designers address the structural variability issue by generating a network-specific accelerator for a single network or a class of networks. However, homogeneous accelerators are network agnostic and often sacrifice throughput and FPGA LUTs for flexibility. In this article, we propose an FPGA overlay for efficient processing of CNNs that can be scaled based on the available compute and memory resources of the FPGA. The overlay is configured on the fly through control words sent by the host on a per-layer basis. Unlike current overlays, our architecture exploits all forms of parallelism inside a convolution operation. A constraint system is employed at the host end to find out the per-layer configuration of the overlay that uses all forms of parallelism in the processing of the layer, resulting in the highest throughput for that layer. We studied the effectiveness of our overlay by using it to process AlexNet, VGG16, YOLO, MobileNet, and ResNet-50 CNNs targeting a Virtex7 and a bigger Ultrascale+VU9P FPGAs. The chosen CNNs have a mix of different types of convolution layers and filter sizes, presenting a good variation in model size and structure. Our accelerator reported a maximum throughput of 1,200 GOps/second on the Virtex7, an improvement of 1.2 \( \times \) to 5 \( \times \) over the recent designs. Also, the reported performance density, measured in giga operations per second per KLUT, is 1.3 \( \times \) to 4 \( \times \) improvement over existing works. Similar speed-up and performance density is also observed for the Ultrascale+VU9P FPGA.
APA, Harvard, Vancouver, ISO, and other styles
44

Arnold, Paul, and Dirk von Hugo. "Future integrated communication network architectures enabling heterogeneous service provision." Advances in Radio Science 16 (September 4, 2018): 59–66. http://dx.doi.org/10.5194/ars-16-59-2018.

Full text
Abstract:
Abstract. This paper summarizes expectations and requirements towards future converged communication systems denoted by 5th Generation (5G). Multiple research and standardization activities globally contribute to the definition and specification of an Information and Communication Technology (ICT) to provide business customers and residential users with both, existing and future upcoming services which demand for higher data rates and granted performance figures in terms of QoS parameters, such as low latency and high reliability. Representative use case families are threefold and represented as enhanced Mobile Broadband (eMBB), massive Internet of Things (mIoT), and Critical Communication, i.e. Ultra-Low Latency (ULL)/Ultra-High Reliability (UHR). To deploy and operate a dedicated network for each service or use case separately would raise the expenses and service costs to an unduly high amount. Instead provision of a commonly shared physical infrastructure offering resources for transport, processing, and storage of data to several separated logical networks (slices) individually managed and configured by potentially multiple service providers is the main concept of this new approach. Beside a multitude of other initiatives the EU-funded 5G NORMA project (5G Novel Radio Multiservice adaptive network Architecture) has developed an architecture which enables not only network programmability (configurability in software), but also network slicing and Multi Tenancy (allowing independent 3rd parties to offer an end-to-end service tailored according to their needs) in a mobile network. Major aspects dealt with here are the selectable support of mobility (on-demand) and service-aware QoE/QoS (Quality of Experience/Service) control. Specifically we will report on the outcome of the analysis of design criteria for Mobility Management schemes and the result of an exemplary application of the modular mobility function to scenarios with variable service requirements (e.g. high-terminal speed vs. on-demand mobility or portability of devices). An efficient sharing of scarce frequency resources in new radio systems demands for tight coordination of orchestration and assignment (scheduling) of resources for the different network slices as per capacity and priority (QoS) demand. Dynamicity aspects in changing algorithms and schemes to manage, configure, and optimize the resources at the radio base stations according to slice specific Service Level Agreements (SLAs) are investigated. It has been shown that architectural issues in terms of hierarchy (centralized vs. distributed) and layering, i.e. separation of control (signaling) and (user) data plane will play an essential role to increase the elasticity of network infrastructures which is in focus of applying SDN (Software Defined Networking) and NFV (Network Function Virtualization) to next generation communication systems. An outlook towards follow-on standardization and open research questions within different SDOs (Standards Defining Organizations) and recently started cooperative projects concludes the contribution.
APA, Harvard, Vancouver, ISO, and other styles
45

BARBOSA, DANIEL L., HELTON S. LIMA, PATRICIA D. L. MACHADO, JORGE C. A. FIGUEIREDO, MAKELLI A. JUCÁ, and WILKERSON L. ANDRADE. "AUTOMATING FUNCTIONAL TESTING OF COMPONENTS FROM UML SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 17, no. 03 (June 2007): 339–58. http://dx.doi.org/10.1142/s0218194007003276.

Full text
Abstract:
A method of functional testing for software components according to model-based testing techniques is proposed. Test cases are generated from UML diagrams and OCL constraints that comprise a component interface and realization specification. The method uses a reduced set of UML artifacts that constitute the main requirements for its application along with a component development process, making use of development artifacts. Also, the set of generated test artifacts are packed together with the provided components to reduce the overall testing effort when clients assemble applications. A tool has been developed to automate the method with test cases generated as Java test components. Test execution and result analysis is also supported. For each component, the tool generates a test component that can be easily upgraded and configured for testing the services provided by a component throughout its life cycle.
APA, Harvard, Vancouver, ISO, and other styles
46

Bonelli, Nicola, Stefano Giordano, and Gregorio Procissi. "Enif-Lang: A Specialized Language for Programming Network Functions on Commodity Hardware." Journal of Sensor and Actuator Networks 7, no. 3 (August 7, 2018): 34. http://dx.doi.org/10.3390/jsan7030034.

Full text
Abstract:
The maturity level reached by today’s commodity platforms makes even low-cost PCs viable alternatives to dedicated hardware to implement real network functions without sacrificing performance. Indeed, the availability of multi-core processing packages and multi-queue network interfaces that can be managed by accelerated I/O frameworks, provides off-the-shelf servers with the necessary power capability for running a broad variety of network applications with near hardware-class performance. At the same time, the introduction of the Software Defined Networks (SDN) and the Network Functions Virtualization (NFV) paradigms call for new programming abstractions and tools to allow this new class of network devices to be flexibly configured and functionally repurposed from the network control plane. The paper presents the ongoing work towards Enif-Lang (Enhanced Network processIng Functional Language), a functional language for programming network functions over generic middleboxes running the Linux operating system. The language addresses concurrent programming by design and is targeted at developing simple stand-alone applications as well as pre-processing stages of packet elaborations. Enif-Lang is implemented as a Domain Specific Language embedded in the Haskell language and inherits the main principles of its ancestor, including the strong typedness and the concept of function compositions. Complex network functions are implemented by composing a set of elementary operations (primitives) by means of a compact yet expressive language grammar. Throughout the paper, the description of the design principles and features of Enif-Lang are accompanied by examples and use cases. In addition, a preliminary performance assessment is carried out to prove the effectiveness of the language for developing practical applications with the performance level required by 5G systems and the Tactile Internet.
APA, Harvard, Vancouver, ISO, and other styles
47

Soetedjo, Aryuanto, and Sotyohadi Sotyohadi. "Modeling of Occupancy-Based Energy Consumption in a Campus Building Using Embedded Devices and IoT Technology." Electronics 10, no. 18 (September 19, 2021): 2307. http://dx.doi.org/10.3390/electronics10182307.

Full text
Abstract:
Since occupancy affects energy consumption, it is common to model and simulate occupancy using simulation software. One drawback of simulation software is that it cannot provide data transmission information from the sensors, which is essential for real-time energy monitoring systems. This paper proposes an approach to integrating an occupancy model and a real-time monitoring system for real-time modeling. The integration was performed by implementing a model on embedded devices and employing an IoT-based real-time monitoring application. The experimental results showed that the proposed approach effectively configured and monitored the model using a smartphone. Moreover, the data generated by the model were stored in an IoT cloud server for monitoring and further analysis. The evaluation result showed that the model ran perfectly in real-time embedded devices. The assessment of the IoT data transmission performances yielded a maximum latency of 9.0348 s, jitter of 0.9829 s, inter-arrival time of 5.5085 s, and packet loss of 10.8%, which are adequate for real-time modeling of occupancy-based energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
48

Pérez-Solà, Cristina, and Jordi Herrera-Joancomartí. "Improving Classification of Interlinked Entities Using Only the Network Structure." International Journal of Software Engineering and Knowledge Engineering 29, no. 01 (January 2019): 63–91. http://dx.doi.org/10.1142/s0218194019500049.

Full text
Abstract:
This paper presents a classifier architecture that is able to deal with classification of interlinked entities when the only information available is the existing relationships between these entities, i.e. no semantic content is known for either the entities or their relationships. After proposing a classifier to deal with this problem, we provide extensive experimental evaluation showing that our proposed method is sound and that it is able to achieve high accuracy, in most cases much higher than other already existing algorithms configured to tackle this very same problem. The contributions of this paper are twofold: first, it presents a classifier for interlinked entities that outperforms most of the existing algorithms when the only information available is the relationships between these entities; second, it reveals the power of using label independent (LI) features extracted from network structural properties in the bootstrapping phases of relational classification.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Zeying, Weijiang Wang, Chengbo Xue, and Rongkun Jiang. "Resource-Efficient Hardware Implementation of Perspective Transformation Based on Central Projection." Electronics 11, no. 9 (April 25, 2022): 1367. http://dx.doi.org/10.3390/electronics11091367.

Full text
Abstract:
Perspective correction of images is an important preprocessing task in computer vision applications, which can resolve distortions caused by shooting angles, etc. This paper proposes a hardware implementation of perspective transformation based on central projection, which is simpler than the homography transformation method. In particular, it does not need to solve complex equations, thus no software assistance is required. The design can be flexibly configured with different degrees of parallelism to meet different speed requirements. Implemented on the Xilinx Zynq-7000 platform, 2893 Look-up Tables (LUTs) are required when the parallelism is one, and it can process a 20 Hz video with a resolution of 640 × 480 in real time. When the parallelism is eight, it can process 157 Hz video and requires 11,223 LUTs. The proposed design can well meet the actual needs.
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Zeying, Weijiang Wang, Chengbo Xue, and Rongkun Jiang. "Resource-Efficient Hardware Implementation of Perspective Transformation Based on Central Projection." Electronics 11, no. 9 (April 25, 2022): 1367. http://dx.doi.org/10.3390/electronics11091367.

Full text
Abstract:
Perspective correction of images is an important preprocessing task in computer vision applications, which can resolve distortions caused by shooting angles, etc. This paper proposes a hardware implementation of perspective transformation based on central projection, which is simpler than the homography transformation method. In particular, it does not need to solve complex equations, thus no software assistance is required. The design can be flexibly configured with different degrees of parallelism to meet different speed requirements. Implemented on the Xilinx Zynq-7000 platform, 2893 Look-up Tables (LUTs) are required when the parallelism is one, and it can process a 20 Hz video with a resolution of 640 × 480 in real time. When the parallelism is eight, it can process 157 Hz video and requires 11,223 LUTs. The proposed design can well meet the actual needs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography