Sökresultat

Filtyp

Din sökning på "Buy fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The service is affordable and quick..xfNj" gav 93457 sökträffar

Improved Key Recovery Attack on the BEAN Stream Cipher

BEAN is a newly proposed lightweight stream cipher adopting Fibonacci FCSRs. It is designed for very constrained environments and aims at providing a balance between security, efficiency and cost. A weakness in BEAN was first found by Ågren and Hell in 2011, resulting in a key recovery attack slightly better than brute force. In this paper, we present new correlations between state and keystream w

An overview of routing methods in optical burst switching networks

In this article we present a survey of routing methods in Optical Burst Switching (OBS) networks We begin with a description of routing approaches and follow the discussion with a detailed classification of routing algorithms in OBS. Afterwards, we discuss common OBS network loss models that are frequently used in routing optimization. As examples of such application, we present a linear and a non

Exact Approach to Reliability of Wireless Mesh Networks with Directional Antennas

The paper is devoted to modeling and optimization of reliable wireless mesh networks that employ directional antennas. We introduce two mixed-integer programming formulations that allow to simultaneously characterize routing patterns and transmission schedules. The first model allows for maximizing the minimal flow in a network. The second model involves reliability constraints and aims at minimiz

Path loss modeling for vehicle-to-vehicle communications

Vehicle-to-vehicle (V2V) communications have received increasingattention lately, but there is a lack of reported results regarding important quantities such as path loss. This paper presents parameterized path loss models for V2V communications based on extensive sets of measurement data collected mainly under line-of-sight conditions in four different propagation environments: highway, rural, ur

Challenges in Flexible Safety-Critical Software Development -- An Industrial Qualitative Survey

Context. Development of safety-critical systems is mostly governed by process-heavy paradigms, while increasing demands on flexibility and agility also reach this domain. Objectives. We wanted to explore in more detail the industrial needs and challenges when facing this trend. Method. We launched a qualitative survey, interviewing engineers from four companies in four different industry domains.

Scaling up requirements engineering - exploring the challenges of increasing size and complexity in market-driven software development

[Context & motivation] Growing software companies with increasing product complexity face the issue of how to scale up their Requirements Engineering (RE) practices. In market-driven requirements engineering, release planning and scoping decisions are increasingly challenging as the size and complexity increases. [Problem] This paper presents initial results of an on-going exploratory, qualita

Changes in climate and weather extremes in the 21st century

Climate and weather extremes are sporadically recurring events that may have major local or regional impacts on the society and the environment. These events are typically related to unusually high or low temperature, prolonged dry or wet conditions, heavy precipitation, or extreme winds. Extreme events are part of the overall climate and weather alongside average conditions and variability, and t

Estimation-based ILC applied to a parallel kinematic robot

Estimation-based iterative learning control (ILC) is applied to a parallel kinematic manipulator known as the Gantry-Tau parallel robot. The system represents a control problem where measurements of the controlled variables are not available. The main idea is to use estimates of the controlled variables in the ILC algorithm, and in the paper this approach is evaluated experimentally on the Gantry-

Hardware architecture of IOTA pulse shaping filters for multicarrier systems

This paper presents a hardware architecture of pulse shaping filter used in multicarrier systems. The filter can be configured to be used for both transmitter and receiver with limited overhead. Generic implementation complexity analysis for a filter in a multicarrier system with N sub-carriers is presented, while the implemented architecture is for a system with 128 sub-carriers. The pulse shapin

Optimal Priority Assignment to Control Tasks

In embedded real-time systems, task priorities are often assigned to meet deadlines. However, in control tasks, a late completion of a task has no catastrophic consequence. Rather, it has a quantifiable impact in the control performance achieved by the task. In this paper, we address the problem of determining the optimal assignment of priorities and periods of sampled-data control tasks that run

Performance Evaluation of Time-Reversal on Measured 60 GHz Wireless Channels

Time-reversal (TR) signal processing has the potential to focus the transmitted signal at a desired receive (Rx) location in both space and time. At lower frequency bands, TR in conjunction with array antennas at transmit (Tx) or Rx has been shown to significantly improve its focusing performance relative to the case of single antennas at both link ends. This work for the first time investigates T

Fair Optimization and Networks: A Survey

Optimization models related to designing and operating complex systems are mainly focused on some efficiency metrics such as response time, queue length, throughput, and cost. However, in systems which serve many entities there is also a need for respecting fairness: each system entity ought to be provided with an adequate share of the system's services. Still, due to system operations-dependant c

Usage of Open Source in Commercial Software Product Development - Findings from a Focus Group Meeting

Open source components can be used as one type of software component in development of commercial software. In development using this type of component, potential open source components must first be identified, then specific components must be selected, and after that selected components should maybe be adapted before they are included in the developed product. A company using open source compone

Derivative backoff: The other saturation problem for PID controllers

tThe PID controller is by far the most common controller, and to ensure good behavior under all circumstances, a PID implementation must consider many practical aspects such as integrator windup,derivative kick, and bumpless parameter and mode changes. In this paper, an entirely new issue for the derivative part is introduced and has been named derivative backoff. It occurs when the process value

Declarative rewriting through circular nonterminal attributes

Reference attribute grammars (RAGs) provide a practical declarative means to implement programming language compilers and other tools. RAGs have previously been extended to support nonterminal attributes (also known as higher-order attributes), circular attributes, and context-dependent declarative rewrites of the abstract syntax tree. In this previous work, interdependencies between these extensi

A 90nm CMOS Digital PLL Based on Vernier-Gated-Ring-Oscillator Time-to-Digital Converter

This paper presents the design of a digital PLL which uses a high resolution Gated-Ring-Oscillator-Based Vernier Time-to-Digital Converter (TDC) for low noise RF application. The TDC uses two gated ring oscillators (GRO) acting as the delay lines in an improved Vernier TDC. The already small quantization noise of the standard Vernier TDC is further first-order shaped by the GRO operation. Addition

Automated Bug Assignment: Ensemble-based Machine Learning in Large Scale Industrial Contexts

Bug report assignment is an important part of software maintenance. In particular, incorrect assignments of bug reports to development teams can be very expensive in large software development projects. Several studies propose automating bug assignment techniques using machine learning in open source software contexts, but no study exists for large-scale proprietary projects in industry. The goal

Force Controlled Robotic Assembly without a Force Sensor

The traditional way of controlling an industrial robot is to program it to follow desired trajectories. This approach is sufficient as long as the accuracy of the robot and the calibration of the workcell is good enough. In robotic assembly these conditions are usually not fulfilled, because of uncertainties, e.g., variability in involved parts and objects not gripped accurately. Using force contr

On the probability of non-shared multipath clusters in cellular networks

In Space Division Multiple Access (SDMA) systems, users are separated based on their positions. The base-station (BS) signals typically reach the users through multipath clusters. The goal of this work is to find the probability that a randomly selected user will receive the signal from the BS via at least one nonshared (by any other user) multipath cluster. This probability, referred to as PSucce

A distributed MAC scheme to achieve QoS in ad hoc networks

Real-time applications introduce new requirements on wireless networks and impose quality thresholds on parameters like delay, jitter, throughput, and packet loss in order to run smoothly. This paper addresses this issue by presenting a MAC scheme that offers real-time applications the opportunity to reserve transmission time based on their QoS requirements for contention-free medium access. Our s