Computer Science, Hardware & Architecture

Article Computer Science, Hardware & Architecture

A flexible algorithm to offload DAG applications for edge computing

Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa

Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Energy and relevance-aware adaptive monitoring method for wireless sensor nodes with hard energy constraints

David Arnaiz, Francesc Moll, Eduard Alarcon, Xavier Vilajosana

Summary: This paper proposes an energy and relevance-aware monitoring method that optimizes the behavior of sensor nodes based on self-awareness principles. By balancing relevance and power consumption, and coordinating two adaptive schemes, this method can achieve the target battery life while improving monitoring accuracy.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property

Abderrahmane Nitaj, Willy Susilo, Joseph Tonien

Summary: This paper investigates a specific family of enhanced substitution boxes for the Advanced Encryption Standard. These modified S-boxes have the maximal periodicity property, with each input having the maximum orbit length of 256. The parameters for achieving this maximal periodicity property are completely determined. The new enhanced S-boxes also exhibit improved bit avalanche property.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi

Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method

Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li

Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Analysis of memristive maps with asymmetry

Viet-Thanh Pham, Andrei Velichko, Van Van Huynh, Antonio Vincenzo Radogna, Giuseppe Grassi, Salah Mahmoud Boulaaras, Shaher Momani

Summary: This paper presents a model of a memristive map that utilizes the nonlinearity of memristors to generate complex behavior. The proposed model allows for adjustments in the number of fixed points and symmetry through modifications to the control component. Experimental results demonstrate the feasibility and potential of the model in chaos-based applications.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks

Songshi Dou, Li Qi, Zehua Guo

Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Multilevel-based algorithm for hyperspectral image interpretation

Shi Qiu, Huping Ye, Xiaohan Liao, Benyue Zhang, Miao Zhang, Zimu Zeng

Summary: This paper proposes a multilevel-based algorithm for hyperspectral image interpretation, which achieves semantic segmentation through multidimensional information fusion, and introduces a context interpretation module to improve detection performance.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

QoS-based resource allocation for uplink NOMA networks

Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie

Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

User financial credit analysis for blockchain regulation

Zhiyao Tong, Yiyi Hu, Chi Jiang, Yin Zhang

Summary: The rise of illicit activities involving blockchain digital currencies has become a growing concern. In order to prevent illegal activities, this study combines financial risk control with machine learning to identify and predict the risks of users with poor credit. Experimental results demonstrate high performance in user financial credit analysis.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

Enabling containerized Central Unit live migration in 5G radio access network: An experimental study

Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli

Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

An efficient construction of S-box based on the fractional-order Rabinovich-Fabrikant chaotic system

Saeed Ullah, Xinge Liu, Adil Waheed, Shuailei Zhang

Summary: This paper proposes a new method, based on a chaotic system, for constructing an initial S-box, as well as a novel key-based permutation technique to construct the final S-box. The results show that the S-boxes obtained using this method are stronger and have demonstrated good performance in secure communication and image encryption applications.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

Abuse-resistant deniable encryption

Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen

Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

An Identity-Based Encryption with Equality Test scheme for healthcare social apps

Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang

Summary: This paper introduces public key encryption with equality test (PKEET) and identity-based encryption with equality test (IBEET) to address the problem of determining whether two ciphertexts contain the same message encrypted with different public keys, without decryption. The proposed IBEET scheme resists offline message recovery attacks (OMRA) and does not require the dual-tester setting or group mechanism. Security is demonstrated through mathematical assumptions, and experiment results show the efficiency of the scheme. From a usability perspective, the paper explains why the scheme is more suitable for healthcare social Apps compared to other OMRA-resistant schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station

Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar

Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks

Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier

Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A bandwidth enhancement method of VTA based on paralleled memory access design

Xuhui Wang, Jun Cheng, Fan Chang, Lei Zhu, Han Chang, Kuizhi Mei

Summary: This study proposes an enhanced VTA architecture, which achieves parallel loading of feature maps and weight data by redesigning and optimizing the VTA memory access microarchitecture, fully utilizing bandwidth resources. The experimental results demonstrate significant performance improvement of the proposed architecture, with higher speedup and power efficiency compared to other full-stack accelerator designs.

INTEGRATION-THE VLSI JOURNAL (2024)

Article Computer Science, Hardware & Architecture

End-to-end active queue management with Named-Data Networking

Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio

Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Crop type recognition of VGI road-side images via hierarchy structure based on semantic segmentation model Deeplabv3+

YingHong Tian, Kun Zhang, Xingbo Hu, Yue Lu

Summary: The application of artificial intelligence in agricultural crop type recognition is important. This study proposes a hierarchical semantic segmentation structure based on Deeplabv3+ to recognize crop types. By combining remote sensing and volunteered geographic information, the model achieves fine recognition of crops in multiple stages. Experimental results show that this method performs well in crop type recognition for VGI images.

DISPLAYS (2024)

Article Computer Science, Hardware & Architecture

Modelling and design of asynchronous receptive circuit for cone pathways

Payal Shah, Satvik Sawant, Reena Sonkusare, Surendra S. Rathod

Summary: This paper proposes an asynchronous receptive circuit for cone cells, which mimics the behavior of different cells in the retinal pathway and achieves a similar biological behavior. The circuit is event-based and can detect wavelengths in the visible spectrum.

INTEGRATION-THE VLSI JOURNAL (2024)