communication algorithms
Recently Published Documents


TOTAL DOCUMENTS

89
(FIVE YEARS 11)

H-INDEX

16
(FIVE YEARS 1)

2022 ◽  
Vol 12 (2) ◽  
pp. 641
Author(s):  
Junsung Choi ◽  
Dongryul Park ◽  
Suil Kim ◽  
Seungyoung Ahn

Along with the development of electromagnetic weapons, Electronic Warfare (EW) has been rising as the future form of war. Especially in the area of wireless communications, high security defense systems such as Low Probability of Detection (LPD), Low Probability of Interception (LPI), and Low Probability of Exploitation (LPE) communication algorithms are being studied to prevent military force loss. One LPD, LPI, and LPE communication algorithm, physical-layer security, has been discussed and studied. We propose a noise signaling system, a type of physical-layer security, which modifies conventionally modulated I/Q data into a noise-like shape. To suggest the possibility of realistic implementation, we use Software-Defined Radio (SDR). Since there are certain hardware limitations, we present the limitations, requirements, and preferences of practical implementation of the noise signaling system. The proposed system uses ring-shaped signaling, and we present a ring-shaped signaling system algorithm, SDR implementation methodology, and performance evaluations of the system using the metrics of Bit Error Rate (BER) and Probability of Modulation Identification (PMI), which we obtain by using a Convolutional Neural Network (CNN) algorithm. We conclude that the ring-shaped signaling system can perform high LPI/LPE communication functioning because an eavesdropper cannot obtain the correct modulation scheme information. However, the performance can vary with the configurations of the I/Q data-modifying factors.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Li Liu

This paper presents an in-depth analysis and research on teaching English listening through a wireless communication microprocessor combined with a virtual environment and designs and implements an English listening teaching experiment. Based on an in-depth understanding of wireless communication algorithms, this thesis extends the instruction set based on the general-purpose compact instruction set computer architecture (RISC) for common operations in wireless communication algorithms, adding new instructions such as multiplication and addition and bit inversion. The microprocessor has an increase in the number of execution clocks for wireless algorithm processing. The processor is extended with an interrupt interface to facilitate information interaction between the processor and the external environment to achieve coordinated work between the processor and the accelerator and to further enhance the speed of digital signal processing through the introduction of the accelerator. An overview and comparison of the status of domestic and foreign research are presented in the vein of VR teaching and the overall development of English teaching. Then, the problems and hypotheses to be explored in this study are presented, and several types of research methods used to explore the solutions to the problems are introduced. The results of the two classroom formats were compared, and specific performance data were obtained. The analysis of the results showed that the students in the VR scenario teaching group made greater progress in vocabulary judgments, complementary dialogues, and Chinese to English translation, with a 43% merit rate and a 100% pass rate in English for the whole group. The real-life scenarios created through VR technology greatly increased students’ interest in learning and significantly improved the effectiveness of classroom teaching. The development trend of education informatization is towards virtualization and intelligence, and the application of VR to the process of education teaching is of great significance to promote the modernization of secondary education informatization.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yupeng Li ◽  
Kitak Kim ◽  
Yu Ding

Problems such as excessive centralization of sports industry operations, unclear value, and lack of IP protection hinder the benign interaction between various formats of the sports industry and the healthy operation of the industrial ecosystem. This article is aimed at studying the use of the decentralization, openness and transparency, smart contracts, copyright traceability, and other characteristics of the BT to construct a PCMR model, which can solve the pain points faced by the sports industry ecosystem in a targeted manner, and forming a way to reconstruct trust, the specific implementation path of the integration of BT and sports industry with mechanism as the core. This paper proposes blockchain network and data communication algorithms such as consensus algorithm, signature core algorithm, and practical Byzantine fault-tolerant algorithm to provide technical support for the application of blockchain technology in the sports industry ecosystem and, at the same time, provide technical support for blockchain network and data communication. The feasibility analysis of the application of the sports industry ecosystem is proposed, and the implementation path of the blockchain network and data communication to reconstruct the sports industry ecosystem is analyzed. Finally, the empirical test of the support of blockchain sports to the sports industry is carried out. By analyzing the panel data of 240 observations of 48 listed companies in 5 years as a sample of the sports industry, the experimental results show that the dominant modulus of the sample does not have other differences, and the leftovers all pass significance test at the 10% level at least, denoting that the fundamental sample is more rational.


2021 ◽  
Vol 279 ◽  
pp. 01002
Author(s):  
Alexander Lukyanov ◽  
Danila Donskoy ◽  
Miroslav Vernezi ◽  
Dmitry Karev

The development of the Internet of Things contributes to improving network protocols and increasing the requirements for energy efficiency of devices. In the field of the Internet of Things and automation systems, one of the most popular microcontrollers is the ESP8266. This article discusses the leading Internet of Things connection protocols based on ESP8266, such as ESP-NOW, HTTP, and ESP-MESH. The study of the power consumption of this microcontroller in various situations and describes the optimal applications of IoT based on ESP8266. The correct choice of communication means of the ESP8266 microcontroller allows you to reduce its power consumption by more than 10% relative to energyintensive communication algorithms. Compared to the power-intensive MESH network, the reduction in power consumption when using the HTTP protocol is 3.34%, and the percentage of energy-consuming events drops by 50.85%. When using ESP-NOW, energy efficiency increases by 5.35%, and the number of energy-consuming events decreases by 83.05%. The value of the carbon footprint generated by the device during the year was, for the three communication technologies used, 2 kg 500 g, 2 kg 320 g, and 2 kg 290 g of CO2, respectively.


2021 ◽  
Vol 247 ◽  
pp. 03016
Author(s):  
Raffi Yessayan ◽  
Yousry Y. Azmy ◽  
R. Joseph Zerr

The PIDOTS neutral particle transport code utilizes a red/black implementation of the Parallel Gauss-Seidel algorithm to solve the SN approximation of the neutron transport equation on 3D Cartesian meshes. PIDOTS is designed for execution on massively parallel platforms and is capable of using the full resources of modern, leadership class high performance computers. Initial testing revealed that some configurations of PIDOTS’s Integral Transport Matrix Method solver demonstrated unexpectedly poor parallel scaling. Work at Idaho and Los Alamos National Laboratories then revealed that this inefficiency was a result of the accumulation of high-cost latency events in the complex blocking communication networks employed during each PIDOTS iteration. That work explored the possibility of minimizing those inefficiencies while maintaining a blocking communications model. While significant speedups were obtained, it was shown that fully mitigating the problem on general-purpose platforms was highly unlikely for a blocking code. This work continues that analysis by implementing a deeply interleaved non-blocking communication model into PIDOTS. This new model benefits from the optimization work performed on the blocking model while also providing significant opportunities to overlap the remaining un-mitigated communication costs with computation. Additionally, our new approach is easily transferable to other similarly spatially decomposed codes. The resulting algorithm was tested on LANL’s Trinity system at up to 32,768 processors and was found at that processor count to effectively hide 100% of MPI communication cost – equivalently 20% of the red/black phase time. It is expected that the implemented interleaving algorithm can fully support far higher processor counts and completely hide communication costs up ~50% of total iteration time.


Author(s):  
Hidetoshi Iwashita ◽  
Masahiro Nakao

AbstractCoarray features have been implemented on the Omni XcalableMP compiler with a source-to-source translator and layered runtime libraries. Three memory allocation methods for coarrays were implemented for the GASNet and MPI-3 communication libraries and the native interface of Fujitsu. For the coarray PUT/GET communication, algorithms using DMA (zero-copy) and buffering were introduced. Important techniques for achieving high performance were the non-blocking PUT communication implemented in the runtime library and the optimization for the GET communication in the translator. Using the ping-pong benchmark and the modified version, the fundamental performance was evaluated and analyzed. The MPI version of the Himeno benchmark was ported to the coarray version and modified for fully using the non-blocking PUT. As a result of the evaluation, the non-blocking coarray version clearly outperformed the original and non-blocking MPI versions.


2019 ◽  
Vol sceeer (3d) ◽  
pp. 17-24
Author(s):  
Mohammed Al-Qaraghuli ◽  
Saadaldeen Ahmed ◽  
Muhammad Ilyas

In this paper, we focus on ensuring encrypted vehicular communication using wireless controller area network performance at high node densities, by means of Dedicated Short-Range Communication (DSRC) algorithms. We analyses the effect of the vehicular communication parameters, message-rate, data-rate, transmission power and carrier sensing threshold, on the application performance. After a state-of-the-art analysis, we propose a data-rate DSRC algorithm. Simulation studies show that DSRC performs better than other decentralized vehicular communication algorithms for a wide range of application requirements and densities. Vehicular communication plays one of the most important roles for future autonomous vehicle. We have systematically investigated the impact of vehicular communication using the MATLAB© application platform and achieved an accuracy of 93.74% after encrypting all the communications between the vehicles and securing them by applying the encryption on V2V communication in comparison with the existing system of Sensor Networks which stands at 92.97%. The transmission time for the encryption is 165 seconds while the rate of encryption is as low as 120 Mbps for the proposed awareness range of vehicles to vehicle using DSRC algorithm in Wireless-Controller Area Network for communication. Experimental results show that our proposed method performs 3% better than the recently developed algorithms.


Sign in / Sign up

Export Citation Format

Share Document