Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient...Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.展开更多
The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a ve...The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a very much essential task. This paper presents a systematic review of different models used for software cost estimation which includes algorithmic methods, non-algorithmic methods and learning-oriented methods. The models considered in this review include both the traditional and the recent approaches for software cost estimation. The main objective of this paper is to provide an overview of software cost estimation models and summarize their strengths, weakness, accuracy, amount of data needed, and validation techniques used. Our findings show, in general, neural network based models outperforms other cost estimation techniques. However, no one technique fits every problem and we recommend practitioners to search for the model that best fit their needs.展开更多
When an electromagnetic signal transmits through a coaxial cable, it propagates at speed determined by the dielectrics of insulator between the cooper core wire and the metallic shield. However, we demonstrate here th...When an electromagnetic signal transmits through a coaxial cable, it propagates at speed determined by the dielectrics of insulator between the cooper core wire and the metallic shield. However, we demonstrate here that, once the shielding layer of the coaxial cable is cut into two parts leaving a small gap, while the copper core wire is still perfectly connected, a remarkable transmission delay immediately appears in the system. We have revealed by both computational simulation and experiments that, when the gap spacing between two parts of the shielding layer is small, this delay is mostly determined by the overall geometrical parameters of the conductive boundary which connects two parts of the cut shielding layer. A reduced analytic formula for the transmission delay related with geometrical parameters, which is based on an inductive model of the transmission system, matches well with the fitted formula of the simulated delay. This above structure is analog to the situation that an interconnect is between two inter-modules in a circuit. The results suggest that for high speed circuits and systems, parasitic inductance should be taken into full consideration, and compact conductive packaging is favorable for reducing transmission delay of inter-modules, therefore enhancing the performance of the system.展开更多
Diagnosability of a multiprocessor system is one important study topic.Cayley graph network Cay(Tn,Sn) generated by transposition trees Tnis one of the attractive underlying topologies for the multiprocessor system....Diagnosability of a multiprocessor system is one important study topic.Cayley graph network Cay(Tn,Sn) generated by transposition trees Tnis one of the attractive underlying topologies for the multiprocessor system.In this paper,it is proved that diagnosability of Cay(Tn,Sn) is n-1 under the comparison diagnosis model for n ≥ 4.展开更多
文摘Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.
文摘The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a very much essential task. This paper presents a systematic review of different models used for software cost estimation which includes algorithmic methods, non-algorithmic methods and learning-oriented methods. The models considered in this review include both the traditional and the recent approaches for software cost estimation. The main objective of this paper is to provide an overview of software cost estimation models and summarize their strengths, weakness, accuracy, amount of data needed, and validation techniques used. Our findings show, in general, neural network based models outperforms other cost estimation techniques. However, no one technique fits every problem and we recommend practitioners to search for the model that best fit their needs.
文摘When an electromagnetic signal transmits through a coaxial cable, it propagates at speed determined by the dielectrics of insulator between the cooper core wire and the metallic shield. However, we demonstrate here that, once the shielding layer of the coaxial cable is cut into two parts leaving a small gap, while the copper core wire is still perfectly connected, a remarkable transmission delay immediately appears in the system. We have revealed by both computational simulation and experiments that, when the gap spacing between two parts of the shielding layer is small, this delay is mostly determined by the overall geometrical parameters of the conductive boundary which connects two parts of the cut shielding layer. A reduced analytic formula for the transmission delay related with geometrical parameters, which is based on an inductive model of the transmission system, matches well with the fitted formula of the simulated delay. This above structure is analog to the situation that an interconnect is between two inter-modules in a circuit. The results suggest that for high speed circuits and systems, parasitic inductance should be taken into full consideration, and compact conductive packaging is favorable for reducing transmission delay of inter-modules, therefore enhancing the performance of the system.
基金supported by the National Natural Science Foundation of China(61370001,U1304601)
文摘Diagnosability of a multiprocessor system is one important study topic.Cayley graph network Cay(Tn,Sn) generated by transposition trees Tnis one of the attractive underlying topologies for the multiprocessor system.In this paper,it is proved that diagnosability of Cay(Tn,Sn) is n-1 under the comparison diagnosis model for n ≥ 4.