The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the lower power requirement of code division multiple access (CDMA) than that of other multiple access, the CDMA technology is suitable to be used in low earth orbit (LEO) satellite communication system whose space power is limited due to the small size of satellite. The pilot channel of CDMA technology is very important for earth mobile station (EMS) in LEO system to recover carrier and code,...
With the rapid development of mobile Internet technology, mobile phones and other mobile terminal products have been widely popular. General public who are not the professional journalist produce more and more pictures, video and other media content anywhere and anytime so that the user-generated content plays an more important role in the news reporting, especially in emergencies. As not having a...
Multimedia application on mobile phone platform is a hot topic in Information Technology industry accompanying with the advances of technologies in Internet, smart operating system and wireless network. The development of streaming media technology boosts the audio and video application over the Internet. This paper describes a mobile video live streaming system with Wi-Fi/4G mobile phone to capture...
The increasingly extensive availability of location- acquisition technologies (such as GPS and GSM networks) and mobile computing techniques have generated a lot of spatial-temporal trajectory data which represents the mobility of diversification of moving objects such as people, vehicles, and animals. This brings new opportunities to understand the movement behaviors of moving objects in mobile social...
Wireless sensor networks are traditionally constrained by finite energy supply. Recent wireless charging technology enables possibility for timely replenishing consumed energy of dispersed sensors. This paper investigates on-demand wireless charging problem with multiple mobile chargers, which can sustain a large-scale wireless sensor network operation perpetually without knowing energy consumption...
Wireless sensor networks have been widely studied and find applications in military as well as civil contexts. Due to limited lifetime of sensor batteries, varied approaches to extend the lifetime are intensively investigated. Recently, wireless energy charging technologies, especially the magnetic resonant coupling, have been resorted to offer sufficient energy supply for individual sensors. Seeking...
Mobile app developers suffer a lot from the fragmentation of mobile platforms (e.g., needs to rewrite an app for a new platform). To alleviate this problem, cross-platform development techniques provide a cost-effective way (i.e., write-once-deploymany) to develop mobile applications. Such cross-platform techniques usually provide a set of relevant APIs to operate a native component (e.g., the accelerometer...
There are many new issues in human activity recognition using smart phone with built-in acceleration sensors, such as variations of the location and orientation of smart phone. This paper presents a smart phone position-independent activity recognition model based on frequency domain. First, we analyzed FFT curve of Resultant Acceleration in different mobile positions and different activities. The...
The wireless network gradually changes from voice service to broadband data access services and faces unprecedented growth in data traffic. The operator needs to prepare network upgrade road map in advance according to their own situation. TD-LTE is considered as providing the evolution path for TD-SCDMA. To reduce network CAPEX and OPEX, TD-LTE network is advisable to re-use TD-SCDMA site and share...
In order to grasp the changing situation of ground subsidence and surface collapse caused by underground mining in mining area, and improve the efficiency of field data collecting, this paper presented the architecture and functions of a Field Data Collecting Synchronously System (FDCSS). According to the FDCSS schema, mobile devices used Web Services to synchronous data with the server computer....
For sensor distribution of wireless sensor networks, a neural network fault-tolerant control strategy is proposed: first the control law in various fault conditions is designed using the method of system reconstruction, and then the control law features is learned based a neural network. After learning, the neural network as a controller system can be controlled. Simulation results show that: neural...
This paper discusses the necessary media processing functional requirements for new multimedia services in core networks, and proposes an open system architecture to addresses them. The system architecture provides efficient transcoding, rate adaptation, filtering, scaling and other functions needed for video communications, IPTV and 3DTV applications over networks.
Future mobile devices are expected to access different networks (such as 3rd generation network, WLAN, Bluetooth, Internet, and etc). Hence many sensitivity data are stored in them. How to protect the security of information and applications about mobile devices becomes an exigent problem. This paper proposes a secure authentication and authorization protocol for mobile devices. The protocol employs...
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANETs with hierarchy...
With the rapid development and the extensive application of Vehicle Ad Hoc Networks (VANET), the problem of ensuring the credibility of accessing VANET has gained more and more attentions. In the view of the characteristics that the rough set theory is good at handling uncertainly information, we proposed a new approach to access VANET based on rough set theory. We introduced the Mobile Trusted Module...
The source routing (DSR) protocol is a commonly applied protocol in ad hoc network. As the expansion of network, the efficiency of DSP protocol is on the decline due to the increasing network complexity and overhead. To enhance the performance of DSR, release network congestion, balance network energy and improve scalability, this paper has introduced modification to the outgoing package structure...
We propose in this paper a design of the proxy supporting nearest-neighbor queries. We also propose several algorithms to create and extend estimate valid regions. An estimate valid regions degradation algorithm and a cache replacement policy are proposed to reclaim cache space when the cache space is insufficient. To evaluate the performance of the proposed architecture and algorithms, several experiments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.