The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the human physiological sensor communication needs of transmitting information rapidly and gathering data to the information node conveniently, the mobile's feature of communication fast and use easily is used as the gathering node for forwarding data and applying data. The study on the implementation methods of wireless sensor data interface and the open-frame of the software are carried...
This paper presents the geometry-based stochastic model for V2V channels in highway scenario. The channel multipath components are divided into several taps by utilizing the method of tapped delay line structure, and the Doppler properties of each tap are analyzed. The time-variant characteristics as well as their influences on power spectrum density, Doppler shift and root mean square delay spread...
This paper describes a customer satisfaction assessment model in mobile telecommunication service industry based on a fuzzy analytic hierarchy process approach. An empirical research is explored in three enterprises in Shijiazhuang. The assessment results show that as a whole the China Mobile's customer satisfaction index evolved to a much higher level, and followed by China Unicom and China Telecom,...
With the rapid development of the application of mobile Internet and wireless data communications technology, m-commerce has a solid foundation for widely application. However, m-commerce depends on the poor security wireless communication network, and then the key factor in m-commerce is security. In this paper, WAP content provider self-provided WAP gateway solutions and gateway navigation type...
Future wireless communication networks will face the dual challenge of supporting large traffic volumes while providing reliable service for heterogeneous traffic types. In order to meet the ever increasing traffic demand, heterogeneous relay network is introduced as an enabling technology for the fourth generation (4G) mobile broadband networks. In this paper, we will investigate optimal power and...
The wireless mobile network is a dynamic environment. The characteristics of the wireless mobile communication include limited channel bandwidth, high BER, dynamic change over time, unstable channel quality, mobile node, competition of multiple users to share the channel, and the users' wireless signal interference from other nodes of the shared channel. These characteristics of wireless communication...
The integration of cellular and wireless local area networks (WLAN) has drawn much attention due to their complementary characteristics. Cellular supports wider coverage and better capability to mobile user but with lower bandwidth whereas WLAN have higher bandwidth and lower cost but is effective only in small areas. Based on the combination of users' mobility and network load, this paper proposes...
Road assets' condition has a critical impact on road safety and efficiency. It is a big challenge to accurately and efficiently monitor and manage road assets. This paper proposes a mobile surveying system that is cost efficient and robust to acquire and manage road assets information in highly dynamic environments like highways and urban streets, where the data collection has previously been laborious...
The rapid development in mobile commerce not only offers opportunities for business, but also makes higher security demands in the process of e-commerce transactions. It's true that authentication is the key point to ensure mobile commerce safety. This paper analyzes the existing problems in current mobile commerce authentication and proposes a strategy to a unified mobile commerce authentication...
Mobile Commerce is the new development of e-commerce which takes on strong potential for its convenient, efficient and omnipresent characters. This paper analyses the security hole of traditional application model based on SMS, and designs a novel security model of mobile commerce. This model utilizes SMS-gateway and CMPP proxy module joined with server security to carry out the data communication...
This paper proposes a simple elliptical track model in order to solve the display problem of three-dimensional graphics, which is aroused by limited resources for mobile terminal. According to the design idea of user interface with three-dimensional effects, the difference from positive and negative view is formed by the points on the elliptical model. The three-dimensional effects for switching interfaces...
A monolithic polar transmitter (TX) subsystem that includes a CMOS Envelope Tracking (ET) amplifier and a RF SiGe BiCMOS power amplifier (PA) for mobile WiMAX applications is presented. Several versions of the ET amplifiers are designed and their power consumption and bandwidth considerations are discussed. Consequently, the entire polar TX system performances and design trade-offs are presented and...
With the development of network technology and the extensive use of e-commerce, the traditional e-commerce processes and its supported technology were faced with challenges. As a new distributed computing model, Mobile Agent technology has many personal advantages and features such as reducing network load, without continuous network connections and easy to support services, having been hailed as...
The probabilistic roadmap method (PRM) has been widely used in the field of robot path planning and based on it, a great number of variants have been developed addressing for different purposes, e.g. the lazy PRM method, the dynamic roadmap (DRM) method, and the dynamic bridge builder method (DBB). In this paper, PRM is extended as well-a hierarchical roadmap based rapid path planner is presented,...
There are many challenges of using all kinds of handheld devices as learning tools, that can connect to the Remote Learning System by cable or wireless network and then browser the downloaded course contents. First of all, network connection, especially wireless link, is usually not persistent and wireless coverage is often limited. In this case, the handheld learning devices become useless and the...
Mobile navigation service is one of the most important location based services. With the rapid advances in enabling technologies for ubiquitous computing, more and more active or passive devices/sensors are augmented in the indoor environment, indoor environment has become smarter. This paper proposes that by introducing the notions of smart environment and ambient intelligent, a ubiquitous indoor...
The paper introduces the push-based way and pull-based way of broadcasting technologies of mobile database and the model of index, and also describes common index in the field of mobile broadcast. Based on the merits of bitmap index and hash index, it acquires a combined index which were evaluated by the experiments.
In this article, an analytic hierarchy process (AHP) approach is described and applied to a fuzzy synthetic evaluation on customer loyalty of commercial banking industries. Results of the AHP show that the customer loyalty coefficient of certain commercial banking enterprise is within the "very promising" range. In addition, the results also show that repeat purchase intention, referral...
Privacy protection is particularly challenging in location based services (LBS). On one hand, service providers want to authenticate legitimate users. On the other hand, mobile users would prefer not to expose any information which enables anyone, including service providers, to get some clue regarding their whereabouts. To resolve this dilemma, we propose an anonymous authentication protocol to protect...
The trend of future communication network is the All-IP network, which brings huge opportunities for mobile P2P network. The distributed computing mode of P2P technology replaces the centralized control mode in traditional telecommunication system, so it makes traditional communication network billing control come across a lot of difficulties. We propose a flow oriented billing model for mobile P2P...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.