411 Hits in 5.0 sec

The M2DC Project: Modular Microserver DataCentre

Mariano Cecowski, Giovanni Agosta, Ariel Oleksiak, Michal Kierzynka, Micha vor dem Berge, Wolfgang Christmann, Stefan Krupop, Mario Porrmann, Jens Hagemeyer, Rene Griessl, Meysam Peykanu, Lennart Tigges (+13 others)
2016 2016 Euromicro Conference on Digital System Design (DSD)  
Since their introduction, FPGAs can be seen in more and more different fields of applications.  ...  Nevertheless, every application field introduces special requirements to the used computational architecture.  ...  read channel simulator 2002 [123] Prototyping Microcomputersystem 2002 [124] Cryptography Rijndael algorithm 2002 [125] Communication Chaotic generators based on Lorenz chaotic system 2002  ... 
doi:10.1109/dsd.2016.76 dblp:conf/dsd/CecowskiAOKBCKP16 fatcat:bu4nbkqaejebjafrotibui6mkq

Statistical multiplexing

1982 Microprocessors and microsystems  
[26] propose a deterministic model based on chaotic maps for modeling these long-range dependence features.  ...  Voice and Data Multiplexers In the early 1980s integrated services digital networks (ISDNs) [45] were envisoned to support multiplexed transport of voice-, data-, and image-based applications on a common  ... 
doi:10.1016/0141-9331(82)90703-7 fatcat:m2wv235qmrcolofj5rfaqlyfc4

statistical multiplexing [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
[26] propose a deterministic model based on chaotic maps for modeling these long-range dependence features.  ...  Voice and Data Multiplexers In the early 1980s integrated services digital networks (ISDNs) [45] were envisoned to support multiplexed transport of voice-, data-, and image-based applications on a common  ... 
doi:10.1007/1-4020-0613-6_18211 fatcat:mjo6ctlkqjhcjgjsqfbhbjsxkm

Optimal nonlinear adaptive prediction and modeling of MPEG video in ATM networks using pipelined recurrent neural networks

Po-Rong Chang, Jen-Tsung Hu
1997 IEEE Journal on Selected Areas in Communications  
This paper investigates the application of a pipelined recurrent neural network (PRNN) to the adaptive traffic prediction of MPEG video signal via dynamic ATM networks.  ...  Moreover, a minimum mean-squared error predictor based on the NARMA model is developed to provide the best prediction for the video traffic signal.  ...  INTRODUCTION F UTURE broad-band integrated services digital netorks (B-ISDN's) based on the asynchronous transfer mode (ATM) principle are designed to support a wide variety of multimedia services with  ... 
doi:10.1109/49.611161 fatcat:agunurzkyfhz3ehomo6y2kotxq

Soft Computing for Robust Secure Wireless Reception

E. Sarma, Pillai Pillai
2009 Defence Science Journal  
These are aimed to exploit the tolerance for imprecision and uncertainty to achieve tractability, robustness, and low solution cost.  ...  in a fading signal propagation scenario.  ...  In blind reception, the channel or signal is estimated based on prior knowledge of temporal or spatial signal or channel properties, either statistically or deterministically, without access to either  ... 
doi:10.14429/dsj.59.1554 fatcat:z556yhrdafgunbqi6rmwvetw5y

Linear conversion of pressure into concentration, rapid switching of concentration, and generation of linear ramps of concentration in a microfluidic device

Micha Adler, Alex Groisman
2012 Biomicrofluidics  
Generation of specific temporal patterns of concentration in microfluidic devices is an important technique to study responses of cells and model organisms to variations in the chemical composition of  ...  The use of chaotic vs. laminar mixers is discussed in the context of microfluidic devices providing rapid switching and generating temporal waves of concentration.  ...  P01 GM078586 and R01 GM084332.  ... 
doi:10.1063/1.3687379 pmid:22550555 pmcid:PMC3338547 fatcat:7xbtxzaykjapbbmgjbkrjsvuau

The software radio architecture

J. Mitola
1995 IEEE Communications Magazine  
These architectures have evolved from early point-to-point and relatively chaotic peer networks (e.g., citizens band and push-to-talk mobile military radio networks) toward more hierarchical structures  ...  interfaces, adjacent channel power envelopes Analog + early digital + cell site and frequency plan + handoff protocol Analog + code design + digital voice channel Network organization Pdnt-to-point  ... 
doi:10.1109/35.393001 fatcat:jgq6evh3zbbrzkvw6bl5gthopi

Digital Image Watermarking using Fibonacci Transform in YIQ Color Space

Manoranjan KrSinha, Rajesh Kumar Rai, G. Kumar
2014 International Journal of Computer Applications  
Digital watermarking is a technique for inserting ownership information to the digital data to prove the authenticity.  ...  The host image is converted into YIQ color space and then Y channel decomposed into wavelet coefficients.  ...  One is tensile (multiplied by the matrix C to make x and y larger), and another is folding (make x and y retract unit matrix by modulus). In fact, Arnold mapping is also a chaotic mapping.  ... 
doi:10.5120/18280-9206 fatcat:zxabh36ykrhynolvlmoah6sgeq

A Study on Authentication Framework by using 2-D 3-D Image/Video Based Encryption

Shailesh Kumar, Dr. Yogesh Kumar Sharma, Dr. Keshava Prasanna
2018 International Journal of Engineering Research and  
Also in recent years there is a rising trend towards chaotic sequence based cryptosystems.  ...  In this paper, attempts are made to combine the two with a new algorithm for data hiding. Here key images required for Steganography are generated using chaotic sequence.  ...  The applications such as ATM cards, computer passwords, online bank transaction, electronic commerce and group-oriented applications like video conferencing mainly depend on cryptography.  ... 
doi:10.17577/ijertv7is020073 fatcat:4pdnj2bbwbdwbfirtxmezpm4wu

A novel competitive learning neural network based acoustic transmission system for oil-well monitoring

M. Godoy Simoes, C. Massatoshi Furukawa, A.T. Mafra, J. Cezar Adamowski
2000 IEEE transactions on industry applications  
The neural network estimation principles presented in this paper can be easily applied to other patterns and time-domain recognition applications.  ...  The neural network presented here classifies signals received by the receiver to estimate transmitted data, using a linear-vector-quantization-based network, with the help of a preprocessing procedure  ...  During his undergraduate studies, he was engaged in research on neural networks applications to pattern recognition, such as fingerprint recognition and digital filtering for FSK signals with high noise  ... 
doi:10.1109/28.833765 fatcat:3jm6xh4hg5amlffyljmyaxzkmm

Advances in Underwater Acoustic Networking [chapter]

Tommaso Melodia, Hovannes Kulhandjian, Li-Chung Kuo, Emrecan Demirors
2013 Mobile Ad Hoc Networking  
The field of underwater acoustic networking is growing rapidly thanks to the key role it plays in many military and commercial applications.  ...  The objective of this chapter is to provide an overview of the recent advances in underwater acoustic communication and networking.  ...  Acknowledgements This chapter is based on material supported by the US National Science Foundation under grants CNS-1055945 and CNS-1126357.  ... 
doi:10.1002/9781118511305.ch23 fatcat:zq22thfjs5aovk3pfllf53mqce

Multimedia service provisioning in the Munich trial of the AMUSE project [chapter]

Hartmut Elbert, Jürgen Enssle, Matthias Frank, Horst Hessenmüller, Ebba Thora Hvannberg, Thomas Theimer
1997 Lecture Notes in Computer Science  
In the framework of the European ACTS programme, the AMUSE project aims to develop, specify, implement and trial advanced multimedia services using an end-to-end ATM infrastructure based on different types  ...  of access network technologies.  ...  Configuration of the Munich field trialDue to the ATM-based transport in the access network, interworking with an ATM core network is very simple.  ... 
doi:10.1007/bfb0037388 fatcat:nn6zl3p2xbcq7kfzaof5c2ygiy

ICISC 2020 Table of Contents

2020 2020 Fourth International Conference on Inventive Systems and Control (ICISC)  
Arutchelvan, 505 92 Color Cipher Scheme based ATM Pin Generation and Verification Sandesh Akre, Avinash Sonawane 510 93 Design Optimization of Two Stage Operational Amplifiers using Chaotic  ...  System Based on Wireless Sensor Network Prasanta Pratim Bairagi, L.  ... 
doi:10.1109/icisc47916.2020.9171157 fatcat:y3oh2zptcvdhdfji2k53xh4fma

Secure and Lightweight Encryption Model for IoT Surveillance Camera

Mohammed Abbas Fadhil Al-Husainy
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed and stored on Cloud.  ...  In addition, the key size used to encrypt transmitted data in the proposed model is large enough which makes it hard to break by the attackers.  ...  ACKNOWLEDGMENT The authors are grateful to the Middle East University, Amman, Jordan for the financial support granted to cover the publication fee of this research article.  ... 
doi:10.30534/ijatcse/2020/143922020 fatcat:a3sdlpurzbfu3m7ukymxqcn3vu

Deep-Spying: Spying using Smartwatch and Deep Learning [article]

Tony Beltramelli, Sebastian Risi
2015 arXiv   pre-print
Thus demonstrating that deep neural networks are capable of making keystroke inference attacks based on motion sensors easier to achieve by removing the need for non-trivial pre-processing pipelines and  ...  Wearable technologies are today on the rise, becoming more common and broadly available to mainstream users.  ...  Data Analytics the weights are initialized with a pseudo-random number generator seeded with a hard-coded constant integer. All models rely on the same loss function to compute the network error.  ... 
arXiv:1512.05616v1 fatcat:eqpcooo4grft7dujbpnbgyxfo4
« Previous Showing results 1 — 15 out of 411 results