The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Different with the sparseness of moving nodes in delay tolerant network (DTN), the mobile terminals with its short distance wireless interface can also be seen as mobile nodes, which were endowed as agents because of the social properties of their users. A self-organized agent picking (SOAP) network is established that the data with limited-copies can transfer across the SOAP network between random...
In mobile communication system, moving terminals have to switch to the network access points frequently due to the flexible mobility of Mobile Station (MS). How to provide an efficient low-cost and real-time service for MS is an important subject of mobility management. Different from the traditional static location management model, a novel dynamic model, based on prediction of users behavior, is...
A 0.2∼2.5 GHz broadband CMOS power amplifier (PA) for a wireless transceiver is designed using 180 nm CMOS process. Considering the difficulty of integration, this PA is divided into a high-band PA (1.2∼2.5 GHz) and a low-band one (0.2∼1.2 GHz). The high-band PA achieves all components integrated on-chip by using transformer-based matching network and the low-band one adopts off-chip matching network...
Multimedia security means protecting multimedia information and information systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording and destruction. The “Video Copy Detection” system is based on detecting video copies from a video sample to avoid copyright violations. Video fingerprinting is one of methods for video copy detection, including steps of video...
Recently, a network equivalence theory has been proposed by Koetter et al. to model the behavior of wireless and noisy wireline network components in terms of noiseless wireline models in combinatorial essence. Meanwhile the truncated deterministic model is proposed by Avestimehr et al. to approximate Gaussian relay network. In this paper, we utilize the deterministic approximation to model Multiple...
In this paper, an iterative multiple-symbol differential detection (MSDD) scheme for differential LDPC codes is considered over slow and fast Rayleigh fading channels. The metric computation algorithm and its simplified algorithm used to output soft information for MSDD are derived. Simulation results demonstrate that the bit error rate (BER) performance of the proposed system is close to that of...
Integration of sensors, embedded operating systems, wireless networking technology, wireless sensor networks, is a new information gathering and processing technologies, in environmental monitoring has a very good application and advantages. This paper introduced a method model based on ZigBee-technology. Depending on specific situation in environment, LEACH communication protocol was chosen. The...
Wireless sensor network is one of the top research topic in the embedded system right now. It design one kind of wireless sensor node, which use 8 bits MCU Atmega128 as control core and low consumption wireless communication module CC1100. Then it formulate communication protocol of wireless data transmission, constitute a communicate system of wireless network, also make some tests on data multihop...
In order to ensure that the food grain storage security, while the smallest energy consumption of monitoring system, designed to application in grain depot monitoring system by clustering technology of wireless sensor networks (WSN). Designed to MSP430 MCU and CC1100 RF chip modules at the core ultra-low power node, the use of hierarchical structure of the networks is divided into a number of clusters...
A new scheme called differential pulse position width modulation (DPPM+PWM) in wireless optical communication is discussed. Compared to pulse position modulation (PPM), it does not need symbol synchronization when receiving signals. And it effectively solves the problem of the narrow transmitting pulse width in both differential pulse position modulation (DPPM) and PPM. The symbol structure, the power...
In large scale mobile gaming environments, efficient mechanisms for state update is crucial to allow graceful real-time interaction of a large number of players, under limited wireless network bandwidth. By using the state updating threshold as a key parameter that bridges the resulting state inconsistency (or distortion) and the network traffic, we are able to model the fundamental traffic-distortion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.