In this paper, architecture of a Real-Time Cellular Neural Network (CNN) Processor (RTCNNP-v2) is given and the implementation results are discussed. The proposed architecture has a fully pipelined structure, capable of processing full-HD 1080p@60 (1920 × 1080 resolution at 60 Hz frame rate, 124.4 MHz visible pixel rate) video streams, which is implemented on both…
Adaptive TTCM Aided Near-Instantaneously Dynamic Network Coding for Cooperative Cognitive Radio Networks
An Adaptive Dynamic Network Coding (ADNC) scheme conceived for Cooperative Cognitive Radio (CCR) is proposed for devising a novel ADNC-CCR system. The system is designed for supporting communications between multiple Primary Users (PUs) and a common Base Station (BS), where the independent source information is transmitted from the PUs to the BS with the aid…
Near-Optimal Scheme for Cognitive Radio Networks With Heterogeneous Mobile Secondary Users
In this paper, we study the throughput and delay scaling laws for cognitive radio network with static primary users and heterogeneous mobile secondary users coexist in the unit planar region for both without base-station case and with base-station case. The primary network consists of n randomly and uniformly distributed static primary users with higher priority…
Energy Efficient Self-Sustaining Wireless Neighborhood Area Network Design for Smart Grid
Neighborhood area network (NAN) is one of the most important sections in smart grid communications. It connects residential customers as part of a two-way communication infrastructure responsible for transmitting power grid sensing and measuring status, as well as the control messages. In this paper, we propose a cost-effective, flexible, and sustainable NAN design using wireless…
Dynamic Sequence Number Thresholding protocol for detection of blackhole attack in Wireless Sensor Network
The Wireless Sensor Network (WSN) is a distributed wireless micro-electronic-mechanical system which is deployed in hostile environment, has inherent insecure communication medium and resource constraints. This makes security of Wireless Sensor Network challenging. The blackhole attack is a security threat which manipulates sequence number to degrade the performance of the WSN by increasing packet loss.…
Study on the Characteristics of Network Traffic Based on STFT
Aiming at a practical industrial network control system, this paper makes an analysis of types of data, their traffic and directions under different working conditions, and a selection of a link of maximum traffic as a typical one. The method of passive measurement is used to obtain the packets of different protocols passing through the…
Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks
Device-to-device (D2D) communication is a vital component for the next generation cellular network to bring hop gains, improve spectral reuse, and enhance system capacity. These benefits depend on efficiently solving several technical problems, among which resource allocation that shares spectrum resources between cellular users and D2D pairs is critically challenging. We propose a social-aware D2D…
Energy harvesting small cell networks: feasibility, deployment, and operation
Small cell networks have attracted a great deal of attention in recent years due to their potential to meet the exponential growth of mobile data traffic, and the increasing demand for better quality of service and user experience in mobile applications. Nevertheless, wide deployment of small cell networks has not happened yet because of the…
Exact Convex Relaxation of Optimal Power Flow in Radial Networks
The optimal power flow (OPF) problem determines a network operating point that minimizes a certain objective such as generation cost or power loss. It is nonconvex. We prove that a global optimum of OPF can be obtained by solving a second-order cone program, under a mild condition after shrinking the OPF feasible set slightly, for…
A Network-Assisted Approach for RAT Selection in Heterogeneous Cellular Networks
When several radio access technologies (e.g., HSPA, LTE, WiFi, and WiMAX) cover the same region, deciding to which one mobiles connect is known as the Radio Access Technology (RAT) selection problem. To reduce network signaling and processing load, decisions are generally delegated to mobile users. Mobile users aim to selfishly maximize their utility. However, as…