data transfer
Recently Published Documents


TOTAL DOCUMENTS

3985
(FIVE YEARS 1862)

H-INDEX

37
(FIVE YEARS 17)

2022 ◽  
Vol 54 (8) ◽  
pp. 1-36
Author(s):  
Satyaki Roy ◽  
Preetam Ghosh ◽  
Nirnay Ghosh ◽  
Sajal K. Das

The advent of the edge computing network paradigm places the computational and storage resources away from the data centers and closer to the edge of the network largely comprising the heterogeneous IoT devices collecting huge volumes of data. This paradigm has led to considerable improvement in network latency and bandwidth usage over the traditional cloud-centric paradigm. However, the next generation networks continue to be stymied by their inability to achieve adaptive, energy-efficient, timely data transfer in a dynamic and failure-prone environment—the very optimization challenges that are dealt with by biological networks as a consequence of millions of years of evolution. The transcriptional regulatory network (TRN) is a biological network whose innate topological robustness is a function of its underlying graph topology. In this article, we survey these properties of TRN and the metrics derived therefrom that lend themselves to the design of smart networking protocols and architectures. We then review a body of literature on bio-inspired networking solutions that leverage the stated properties of TRN. Finally, we present a vision for specific aspects of TRNs that may inspire future research directions in the fields of large-scale social and communication networks.


Author(s):  
Bilal Asaad Mubdir ◽  
Hassan Mohammed Ali Bayram

<span>Coronavirus disease (COVID-19) altered the way of caregiving and the new pandemic forced the health systems to adopt new treatment protocols in which remote follow-up is essential. This paper introduces a proposed system to link a remote healthcare unit as it is inside the hospital. Two different network protocols; a global system for mobile communication (GSM) and Wi-Fi were used to simulate the heath data transfer from the two different geographical locations, using Raspberry Pi development board and Microcontroller units. Message queuing telemetry transport (MQTT) protocol was employed to transfer the measured data from the healthcare unit to the hospital’s Gateway. The gateway is used to route the aggregated health data from healthcare units to the hospital server, doctors’ dashboards, and the further processing. The system was successfully implemented and tested, where the experimental tests show that the remote healthcare units using a GSM network consumed about 900 mWh. A high percentage of success data packets transfer was recorded within the network framework as it reaches 99.89% with an average round trip time (RTT) of 7.5 milliseconds and a data transfer rate up to 12.3 kbps.</span>


Author(s):  
Salman Ali Syed ◽  
Shahzad Ali

Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.


2022 ◽  
Vol 21 (1) ◽  
pp. 1-24
Author(s):  
Katherine Missimer ◽  
Manos Athanassoulis ◽  
Richard West

Modern solid-state disks achieve high data transfer rates due to their massive internal parallelism. However, out-of-place updates for flash memory incur garbage collection costs when valid data needs to be copied during space reclamation. The root cause of this extra cost is that solid-state disks are not always able to accurately determine data lifetime and group together data that expires before the space needs to be reclaimed. Real-time systems found in autonomous vehicles, industrial control systems, and assembly-line robots store data from hundreds of sensors and often have predictable data lifetimes. These systems require guaranteed high storage bandwidth for read and write operations by mission-critical real-time tasks. In this article, we depart from the traditional block device interface to guarantee the high throughput needed to process large volumes of data. Using data lifetime information from the application layer, our proposed real-time design, called Telomere , is able to intelligently lay out data in NAND flash memory and eliminate valid page copies during garbage collection. Telomere’s real-time admission control is able to guarantee tasks their required read and write operations within their periods. Under randomly generated tasksets containing 500 tasks, Telomere achieves 30% higher throughput with a 5% storage cost compared to pre-existing techniques.


SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 147-154
Author(s):  
Deuis Nur Astrida ◽  
Agung Restu Saputra ◽  
Akhmad Ikhza Assaufi

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe


2022 ◽  
Vol 2022 ◽  
pp. 1-15
Author(s):  
Usman Rauf Kamboh ◽  
Muhammad Rehman Shahid ◽  
Hamza Aldabbas ◽  
Ammar Rafiq ◽  
Bader Alouffi ◽  
...  

For the last two decades, cybercrimes are growing on a daily basis. To track down cybercrimes and radio network crimes, digital forensic for radio networks provides foundations. The data transfer rate for the next-generation wireless networks would be much greater than today’s network in the coming years. The fifth-generation wireless systems are considering bands beyond 6 GHz. The network design of the next-generation wireless systems depends on propagation characteristics, frequency reuse, and bandwidth variation. This article declares the channel’s propagation characteristics of both line of sight (LoS) and non-LOS (NLoS) to construct and detect the path of rays coming from anomalies. The simulations were carried out to investigate the diffraction loss (DL) and frequency drop (FD). Indoor and outdoor measurements were taken with the omnidirectional circular dipole antenna with a transmitting frequency of 28 GHz and 60 GHz to compare the two bands of the 5th generation. Millimeter-wave communication comes with a higher constraint for implementing and deploying higher losses, low diffractions, and low signal penetrations for the mentioned two bands. For outdoor, a MATLAB built-in 3D ray tracing algorithm is used while for an indoor office environment, an in-house algorithmic simulator built using MATLAB is used to analyze the channel characteristics.


2022 ◽  
Author(s):  
Houk Jang ◽  
Henry Hinton ◽  
Woo-Bin Jung ◽  
Min-Hyun Lee ◽  
Changhyun Kim ◽  
...  

Abstract Complementary metal-oxide-semiconductor (CMOS) image sensors are a visual outpost of many machines that interact with the world. While they presently separate image capture in front-end silicon photodiode arrays from image processing in digital back-ends, efforts to process images within the photodiode array itself are rapidly emerging, in hopes of minimizing the data transfer between sensing and computing, and the associated overhead in energy and bandwidth. Electrical modulation, or programming, of photocurrents is requisite for such in-sensor computing, which was indeed demonstrated with electrostatically doped, but non-silicon, photodiodes. CMOS image sensors are currently incapable of in-sensor computing, as their chemically doped photodiodes cannot produce electrically tunable photocurrents. Here we report in-sensor computing with an array of electrostatically doped silicon p-i-n photodiodes, which is amenable to seamless integration with the rest of the CMOS image sensor electronics. This silicon-based approach could more rapidly bring in-sensor computing to the real world due to its compatibility with the mainstream CMOS electronics industry. Our wafer-scale production of thousands of silicon photodiodes using standard fabrication emphasizes this compatibility. We then demonstrate in-sensor processing of optical images using a variety of convolutional filters electrically programmed into a 3 × 3 network of these photodiodes.


Author(s):  
Dennis Valbjørn Christensen ◽  
Regina Dittmann ◽  
Bernabe Linares-Barranco ◽  
Abu Sebastian ◽  
Manuel Le Gallo ◽  
...  

Abstract Modern computation based on the von Neumann architecture is today a mature cutting-edge science. In the Von Neumann architecture, processing and memory units are implemented as separate blocks interchanging data intensively and continuously. This data transfer is responsible for a large part of the power consumption. The next generation computer technology is expected to solve problems at the exascale with 1018 calculations each second. Even though these future computers will be incredibly powerful, if they are based on von Neumann type architectures, they will consume between 20 and 30 megawatts of power and will not have intrinsic physically built-in capabilities to learn or deal with complex data as our brain does. These needs can be addressed by neuromorphic computing systems which are inspired by the biological concepts of the human brain. This new generation of computers has the potential to be used for the storage and processing of large amounts of digital information with much lower power consumption than conventional processors. Among their potential future applications, an important niche is moving the control from data centers to edge devices. The aim of this Roadmap is to present a snapshot of the present state of neuromorphic technology and provide an opinion on the challenges and opportunities that the future holds in the major areas of neuromorphic technology, namely materials, devices, neuromorphic circuits, neuromorphic algorithms, applications, and ethics. The Roadmap is a collection of perspectives where leading researchers in the neuromorphic community provide their own view about the current state and the future challenges for each research area. We hope that this Roadmap will be a useful resource by providing a concise yet comprehensive introduction to readers outside this field, for those who are just entering the field, as well as providing future perspectives for those who are well established in the neuromorphic computing community.


2022 ◽  
Vol 2022 ◽  
pp. 1-7
Author(s):  
J. Divakaran ◽  
Somashekhar Malipatil ◽  
Tareeq Zaid ◽  
M. Pushpalatha ◽  
Vilaskumar Patil ◽  
...  

With increasing advancements in the field of telecommunication, the attainment of a higher data transfer rate is essentially a greater need to meet high-performance communication. The exploitation of the fuzzy system in the wireless telecommunication systems, especially in Fifth Generation Mobile Networks (or) 5G networks is a vital paradigm in telecommunication markets. A comprehensive survey is dealt in the paper, where it initially reviews the basic understanding of fuzzy systems over 5G telecommunication. The literature studies are collected from various repositories that include reference materials, Internet, and other books. The collection of articles is based on empirical or evidence-based from various peer-reviewed journals, conference proceedings, dissertations, and theses. Most of the existing soft computing models are streamlined to certain applications of 5G networking. Firstly, it is hence essential to provide the readers to find research gaps and new innovative models on wide varied applications of 5G. Secondly, it deals with the scenarios in which the fuzzy systems are developed under the 5G platform. Thirdly, it discusses the applicability of fuzzy logic systems on various 5G telecommunication applications. Finally, the paper derives the conclusions associated with various studies on the fuzzy systems that have been utilized for the improvement of 5G telecommunication systems.


Author(s):  
Takashi Yoda ◽  
Noboru Ishihara ◽  
Yuta Oshima ◽  
Motoki Ando ◽  
Kohei Kashiwagi ◽  
...  

Abstract Circuits for CMOS two-dimensional (2-D) array data transfer are indispensable for applications such as space and nuclear fields. Issues include to be operated with higher speed, lower power, fewer size penalty and radiation hardness. To meet these requirements, two kinds of CMOS 2-D array data transfer circuits, such as a shift register type and a memory access type, are proposed and fabricated by the standard 0.18-µm CMOS process technology. In the both types, 16 µm pitch, 8×124 array data transfer operations were realized with data rate of more than 1 Gb/s. Furthermore, we conducted 60Co γ-ray irradiation experiments on those circuits. The current consumption ratio of the shift register type to the memory access type ranges from 150 to 200% as the dosage increases. The result indicate that the memory access type has better radiation hardness at 1 Gb/s than that of the shift register type.


Sign in / Sign up

Export Citation Format

Share Document