The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IP Multimedia Subsystem (IMS) is well known for its combination of the capability of universal coverage of mobile network and rich application development environment of IP network. IMS has been welcomed by both industry and academic society, becoming the first choice of the Next Generation Network (NGN) technologies. This paper describes the design and implementation of three IMS teaching lab experiments,...
It becomes more and more troublesome when losing PCs or smartphones becomes a normal case and a convenient anti-theft and tracking technique is unavailable. In this paper, a new model is proposed. PC and smartphone will form a loop so that they can track each other, preventing burglary in a relatively easy way. A face recognition and image matching model is also discussed below to promote accuracy...
The paper is mainly about positioning and navigation of mobile terminal, and provides a solution of the combination of A-GPS and LF (Location Fingerprint) technology. The solution takes advantages of GPS positioning and CELL-ID positioning, which keep the accuracy and convenience of current technologies and promote coverage for users. Also, energy saving is in detail discussed. By the prediction of...
In the problem of rational secret sharing, each player, who prefers to be the only one to learn the secret, acts rationally rather than merely honestly or maliciously in the traditional cryptographic settings. The core issue of rational secret sharing is to construct a mechanism so that all rational participants have incentive to provide their shares in the reconstruction phase. However, lack of enough...
Tree Augmented Naïve Bayes Network (TAN) classifier has shown excellent performance in Machine Learning and Data Mining in spite of the assumption of one- dependence of attributes. This paper proposes a new approach of classification under the possibilistic network (PN) framework with TAN, named tree augmented naïve possibilistic network classifier (TANPC), which combines the advantages of the PN...
In this paper, we propose a cross-layer optimization approach that exploits retransmission diversity in wireless CDMA communications. Conventionally, data packets that are not correctly detected are usually dropped. These dropped packets can be used to help data packet detection. By exploiting all the retransmitted packets, data packets can be correctly detected with higher probability. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.