The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This system is invented under the circumstance that security incidents frequently occurs when contemporary college students taking into outdoor activities. It is constructed based on the central idea of exploiting a safety management system on mobile terminal to further introduce the over all layout, different sorts of capacity and technology data base. The primary goal is to ensure the security of...
Extreme densification of base stations is imminent in the next generation of cellular networks to meet the exponentially increasing demand for mobile data traffic. In such ultra-dense networks (UDNs), the remarkably high inter-cell interference can reduce or even negate the densification gain. On the other hand, directional communications can significantly bring down the interference levels in UDNs...
In this paper, we provide a comprehensive analysis of the multi-antenna transmission in a K-tier downlink heterogeneous cellular network (HCN). We first propose a reliability-oriented mobile access policy with an access threshold, in which each user connects to the strongest base station in terms of the truncated long-term received power. Under this policy, we derive for a random user explicit analytical...
Driven by the proliferation of mobile applications, the conflict between data communication requirement and limited battery capacity is becoming sharp on modern smartphones. Offloading mobile traffic from cellular to WiFi is widely recognized as a viable solution to improve the energy efficiency. However, through extensive field experiments, we find WiFi offloading is not always energy efficient and...
Over ten more years of development, travel website has been the intuitive and effective information facility for an ever increasing share of individual and business travelers in China. Notably, with the fast scale expansion of domestic users and online suppliers, the e-tourism market has shown signs of monopolistic competition, which is featured by IT companies dominating instead of travel agencies...
Passing through ten more years of development, online travel agencies (OTAs) have grown up and attracted a big share of individual and business travelers, while travel websites have become the intuitive and effective information facility. However, with the fast scale expansion of domestic users and online suppliers, OTAs now have to face the fierce homogenized and price-oriented competition, which...
In wireless ad hoc network, broadcasting protocol is an effective exchange method. In this paper, based on OPNET network simulation software, hop limited broadcasting protocol is modeled and implemented, its performance is analyzed. Simulation results show that we can extend broadcasting range by increasing limited hop value.
This paper describes graphic-text files encryption in real-time mobile communication system. As the limited performance of mobile devices, the computing power can not be compared with the computer. Therefore, this paper uses a highly efficient and lightweight characteristics of X-IDEA encryption algorithm, which is the in proved IDEA algorithm, and modified to make it more suitable for secure transmission...
With the rapid development of high-speed railways all over the world, it is very promising to deliver public broadband access to passengers aboard high-speed trains. However, it has been a challenge to support high speed (e.g. above 350 km/h) mobile users with broadband communications, because of rapidly fading radio channels and Doppler frequency shift. This paper presents a review of network architectures...
The remote monitoring system of the robot is designed. Video image transmission and remote control are realized via the combination of wireless LAN and CDMA mobile communication network. In this paper, the acquisition and processing of image by DSP, the transmission of data by CDMA modem and the remote wireless control of the robot are described in detail.
With the development of the multi-robot coordination, the working efficiency of the multi-robot system is improved, and the tasks can be finished better. Multi-robot coordination is one of the important issues for the research of mobile robot. The research of formation control of multi-robot will improve the efficiency of the coordination of multi-robot. So the problem of multi-robot formation is...
Digital right management can be used on digital copyright protection, access to control, trust management and other areas. Right expression language is an important component of DRM system. The purpose of this paper is to research the application of ODRL. It gives the introduction of development of right expression language firstly, and describes in detail the development process of ODRL used in popular,...
Mobile ad-hoc networks (MANETs) are based on cooperative and trust characteristic of mobile nodes. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANETs are very vulnerable to various attacks. To enhance the security of MANETs, it is important to rate the trustworthiness of other...
A new model of SMS platform is proposed in this paper. Based on this model, with the techniques of the Bluetooth, socket, embedded operation, remote control, and database processing, a system is designed as an example. With this efficient model, the system can be mainly buildup by the hardware of mobile devices and networked computers. This SMS platform can be easily integrated with OAS (office automation...
Because of the distributed character of Mobile Ad hoc Networks, secret sharing is a ideal scheme for keeping system secret information. However, methods of detecting cheaters wholly in threshold secret sharing are few, so far. If another participant can join the t participants, t+1 participants in total, according to the scheme proposed in this paper, the existence of cheaters can be checked out only...
Comparing to wire networks, there are many different characteristics in wireless environments, which make TCP congestion control mechanism is not directly suitable for wireless networks and many improved TCP congestion control mechanisms have been presented. But these improved schemes are not considered the influences to TCP senderpsilas packet sending rate by the wireless link corruption. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.