The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the hybrid network of Device-to-Device (D2D) and cellular communications, reducing the co-channel interference is always hotpot problem, in which the interference involves either the co-channel among D2D terminals or between cellular and D2D links. Lower co-channel interference can improve the link spectrum efficiency effectively. This paper focus on discussing the D2D communications under the...
This paper presents Multiple Radio Access Technologies(M-RATs) cooperative model for Device- to-Device (D2D) communications, which depends on both the licensed and unlicensed spectrum. The notion of cooperation factor is introduced to capture and analyze the threshold constraint in cooperation scenes. This paper also derives the coverage probability and link spectrum efficiency in typical RAT, which...
As the rapid growth of the data traffic, the mobile cellular network is under unprecedented operation pressure. Various of small cells with relay technologies have been proposed to bypass increased data with the status of the limited base station so far. Therefore, vehicular small cell gradually are attracting the attention of the researchers. In this paper, we discuss the communication model of the...
Software, especially with the developing of web technology, is changing traditional enterprise production and business style rapidly. This paper describes the concepts and relationships of Web Service and Enterprise Application Integration (EAI), and depicts how to apply these technologies into practice by analyzing the EAI architecture and characteristics of Web Service. With demonstration of a specific...
This paper describes the security of hospital information system with particular requirements on electric patient record format and application scenarios, and proposes an enhanced role-based access control (ERBAC) mechanism based on the principle of fine granularity through decomposing the access privilege of sources to finer granularities. Through the study on the social relationships of the individual...
The security of Body Sensor Network (BSN) has become a vital concern, as the massive development of BSN applications in healthcare. A family of biometrics based security methods has been proposed in the last several years, where the bio-information derived from physiological signals is used as entity identifiers (EIs) for multiple security purposes, including node recognition and keying material protection...
AKA protocol is widely used for mutual authentication process of 3G communication system. The generation and the strength of cipher key during this process are the key problems about security. Some mathematic tools could be used to improve this performance of these features like Lorenz equations, which are a class of three-dimensional ordinary differential equations similar to the iterative equation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.