33,485 research outputs found
A scalable multi-core architecture with heterogeneous memory structures for Dynamic Neuromorphic Asynchronous Processors (DYNAPs)
Neuromorphic computing systems comprise networks of neurons that use
asynchronous events for both computation and communication. This type of
representation offers several advantages in terms of bandwidth and power
consumption in neuromorphic electronic systems. However, managing the traffic
of asynchronous events in large scale systems is a daunting task, both in terms
of circuit complexity and memory requirements. Here we present a novel routing
methodology that employs both hierarchical and mesh routing strategies and
combines heterogeneous memory structures for minimizing both memory
requirements and latency, while maximizing programming flexibility to support a
wide range of event-based neural network architectures, through parameter
configuration. We validated the proposed scheme in a prototype multi-core
neuromorphic processor chip that employs hybrid analog/digital circuits for
emulating synapse and neuron dynamics together with asynchronous digital
circuits for managing the address-event traffic. We present a theoretical
analysis of the proposed connectivity scheme, describe the methods and circuits
used to implement such scheme, and characterize the prototype chip. Finally, we
demonstrate the use of the neuromorphic processor with a convolutional neural
network for the real-time classification of visual symbols being flashed to a
dynamic vision sensor (DVS) at high speed.Comment: 17 pages, 14 figure
Wireless Video Transmission with Over-the-Air Packet Mixing
In this paper, we propose a system for wireless video transmission with a
wireless physical layer (PHY) that supports cooperative forwarding of
interfered/superimposed packets. Our system model considers multiple and
independent unicast transmissions between network nodes while a number of them
serve as relays of the interfered/superimposed signals. For this new PHY the
average transmission rate that each node can achieve is estimated first. Next,
we formulate a utility optimization framework for the video transmission
problem and we show that it can be simplified due to the features of the new
PHY. Simulation results reveal the system operating regions for which
superimposing wireless packets is a better choice than a typical cooperative
PHY.Comment: 2012 Packet Video Worksho
Optimisation of Mobile Communication Networks - OMCO NET
The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University.
The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing
Algebraic Network Coding Approach to Deterministic Wireless Relay Networks
The deterministic wireless relay network model, introduced by Avestimehr et
al., has been proposed for approximating Gaussian relay networks. This model,
known as the ADT network model, takes into account the broadcast nature of
wireless medium and interference. Avestimehr et al. showed that the Min-cut
Max-flow theorem holds in the ADT network.
In this paper, we show that the ADT network model can be described within the
algebraic network coding framework introduced by Koetter and Medard. We prove
that the ADT network problem can be captured by a single matrix, called the
"system matrix". We show that the min-cut of an ADT network is the rank of the
system matrix; thus, eliminating the need to optimize over exponential number
of cuts between two nodes to compute the min-cut of an ADT network.
We extend the capacity characterization for ADT networks to a more general
set of connections. Our algebraic approach not only provides the Min-cut
Max-flow theorem for a single unicast/multicast connection, but also extends to
non-multicast connections such as multiple multicast, disjoint multicast, and
two-level multicast. We also provide sufficiency conditions for achievability
in ADT networks for any general connection set. In addition, we show that the
random linear network coding, a randomized distributed algorithm for network
code construction, achieves capacity for the connections listed above.
Finally, we extend the ADT networks to those with random erasures and cycles
(thus, allowing bi-directional links). Note that ADT network was proposed for
approximating the wireless networks; however, ADT network is acyclic.
Furthermore, ADT network does not model the stochastic nature of the wireless
links. With our algebraic framework, we incorporate both cycles as well as
random failures into ADT network model.Comment: 9 pages, 12 figures, submitted to Allerton Conferenc
A New Approach to Coding in Content Based MANETs
In content-based mobile ad hoc networks (CB-MANETs), random linear network
coding (NC) can be used to reliably disseminate large files under intermittent
connectivity. Conventional NC involves random unrestricted coding at
intermediate nodes. This however is vulnerable to pollution attacks. To avoid
attacks, a brute force approach is to restrict the mixing at the source.
However, source restricted NC generally reduces the robustness of the code in
the face of errors, losses and mobility induced intermittence. CB-MANETs
introduce a new option. Caching is common in CB MANETs and a fully reassembled
cached file can be viewed as a new source. Thus, NC packets can be mixed at all
sources (including the originator and the intermediate caches) yet still
providing protection from pollution. The hypothesis we wish to test in this
paper is whether in CB-MANETs with sufficient caches of a file, the performance
(in terms of robustness) of the restricted coding equals that of unrestricted
coding.
In this paper, we examine and compare unrestricted coding to full cache
coding, source only coding, and no coding. As expected, we find that full cache
coding remains competitive with unrestricted coding while maintaining full
protection against pollution attacks
- …