The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new algorithm to directly extract 3D road boundaries from mobile laser scanning (MLS) point clouds. The algorithm includes two stages: 1) non-ground point removal by a voxel-based elevation filter, and 2) 3D road surface extraction by curb-line detection based on energy minimization and graph cuts. The proposed algorithm was tested on a dataset acquired by a RIEGL VMX-450 MLS...
In secret sharing schemes, there is always a special participant called the dealer who controls the distribution of the secret S. It is so powerful that once the dealer is depraved, the whole system is to be paralyzed. In order to solve this problem, it is necessary to cancel the privilege of the dealer and realize completely fair secret sharing. In this paper, we make use of the excellent additivity...
The paper is mainly about positioning and navigation of mobile terminal, and provides a solution of the combination of A-GPS and LF (Location Fingerprint) technology. The solution takes advantages of GPS positioning and CELL-ID positioning, which keep the accuracy and convenience of current technologies and promote coverage for users. Also, energy saving is in detail discussed. By the prediction of...
The advances in wireless communications and mobile devices have resulted in a massive growth of the video services over mobile networks. In this article, we study the potential of peer-assisted video delivery in WiFi mobile networks aimed at reducing servers?? load. Our study is based on a real measurement of mobile video viewing logs from a leading Internet video provider for 14 days. We analyze...
Mobile video is becoming extremely popular, and P2P mobile video platforms are being considered for large-scale deployment in this context. However, the design and deployment of realistic P2P video systems have to consider specific characteristics of mobile networks. In this article, we look from the viewpoint of a large-scale commercial P2P mobile video provider system, PPTV, and describe the implementation...
In this paper, a new outer loop power control algorithm based on continuous fuzzy control is proposed. The output value, controlled by the fuzzy rules and the two input values which are processed with fuzzy method, is adopted as the adjustment step-size of SIRtar in the inner loop power control. The algorithm can calculate the best adjustment step-size to overcome the robust phenomenon of traditional...
This paper focuses on the issue of flow distribution for multimode mobile terminals in heterogeneous networks, and proposes a flow distribution algorithm based on priority and weight self-production mechanism. The algorithm utilizes the notion of "priority" , assigning higher priorities to more important sessions, therefore ensuring these sessions have the preferential utilization of the...
We divide the predictive FMIPV6 handover procedure into 5 phases. Among these phases, the link layer prediction, the predictive tunneling and sender preparation phases are mainly concerned, the latencies and the reasons for the latencies in the 3 phases are analyzed in an IEEE 802.11 test-bed. Based on the analysis, a cross-layer fast handover management mechanism is proposed and proved to be efficient...
In this paper, we propose a cross-layer optimization approach that exploits retransmission diversity in wireless CDMA communications. Conventionally, data packets that are not correctly detected are usually dropped. These dropped packets can be used to help data packet detection. By exploiting all the retransmitted packets, data packets can be correctly detected with higher probability. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.