The explosive growth of the mobile multimedia industry has accentuated the need for efficient VLSI implementations of the
associated computationally demanding signal processing algorithms. In particular, the short battery life caused by excessive
power consumption of mobile devices has become the biggest obstacle facing truly mobile multimedia. We propose novel hardware
accelerator architectures for two of the most computationally demanding algorithms of the MPEG-4 video compression standard––the
forward and inverse shape adaptive discrete cosine transforms (SA-DCT/IDCT). These accelerators have been designed using general
low-energy design philosophies at the algorithmic/architectural abstraction levels. The themes of these philosophies are avoiding
waste and trading area/performance for power and energy gains. Each core has been synthesised targeting TSMC 0.09 μm TCBN90LP
technology, and the experimental results presented in this paper show that the proposed cores improve upon the prior art.
Reliability and ageing tests on power semiconductor devices require estimation of junction temperatures in order to control thermal stresses and monitor failure criteria. For this purpose, thermo-electrical parameters, such as voltage forward drop dependence with temperature are usually carried out in low injection level. Nevertheless, it is still difficult to evaluate the limits of such exploitation. An analytical model has been developed and validated by experimental measurements in order to evaluate self-heating effects and to understand high temperature effects. This model should also allow to highlight the role of some physical parameters in the voltage–temperature dependence and to clarify such thermal calibration. 相似文献
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency. 相似文献
In this paper the bit error rate performance and error vector magnitude of a tunable impedance matching network is analyzed assuming QPSK, 16-QAM and 64-QAM digital modulation schemes. The characterized tunable impedance matching network is based on barium–strontium–titanate ferroelectric thick-film varactors. Inherent dispersive behavior is subsumed into the forward transmission of the passive device. Due to this nonlinear phase response, in general to maximize the overall system performance, an agile tuning of the varactor values is demonstrated, taking into account the phase and group delay of s21 parameter. Detailed signal simulation results based on measured data of a testbed are presented. The influence of varying matched impedances on the tuning behavior with different modulation bandwidths is discussed at a center frequency of 1.9 GHz. 相似文献
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.
We analyze IPv6 handover over wireless LAN. Mobile IPv6 is designed to manage mobile nodes' movements between wireless IPv6 networks. Nevertheless, the active communications of a mobile node are interrupted until the handover completes. Therefore, several extensions to Mobile IPv6 have been proposed to reduce the handover latency and the number of lost packets. We describe two of them, hierarchical Mobile IPv6, which manages local movements into a domain, and fast handover protocol, which allows the use of layer 2 triggers to anticipate the handover. We expose the specific handover algorithms proposed by all these methods. We also evaluate the handover latency over IEEE 802.11b wireless LAN. We compare the layer 2 and layer 3 handover latency in the Mobile IPv6 case in order to show the saving of time expected by using anticipation. We conclude by showing how to adapt the IEEE 802.11b control frames to set up such anticipation. 相似文献
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method
to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep
scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined
coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing,
and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area
of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing
scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping)
of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme
also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling
and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving
both connectivity and coverage. 相似文献
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.