The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
3D-images' depth and aspects are reconstructed by the human eye-brain system by appropriately combining the Left and Right components of such images.. The method for multiplexing Left and Right images in stereoscopic images requires double quantity of information and more bandwidth: with Right (Q amount of information) and Left (Q amount of information), 3D image will require 2*Q amount of information...
Dual carrier is a feature introduced in HSPA+ that allows scheduling a user on two carriers simultaneously. While this feature has been largely studied, and deployed, in the downlink and it has been proved that it provides significant capacity gains, its performance in the uplink is still to be investigated. This paper fills this gap by estimating the radio capacity improvement provided by dual-carrier...
A key step in the development of an adaptive immune response to vaccines is the binding of peptides to molecules of the Major Histocompatibility Complex (MHC) for presentation to T lymphocytes, which are thereby activated. Several algorithms have been proposed for such binding predictions, but are limited to a small number of MHC molecules and present imperfect prediction power. We are undertaking...
We present in this paper the RAMPE/INFOMOVILLE system-an interactive man-machine-interface for the assistance, information, orientation and security of persons having visual or/and auditive handicap in public transports. We desrcibe this system, its components and operation. The current version doesn't include a localization solution to guide the visually impaired person and assist him/her to reach...
QoS control and resource management in 802.11e WLANs to support real time and multimedia services remains an open problem. All the solutions that only aim to enhance the performance of the enhanced distributed channel access (EDCA) mechanism cannot resolve the performance degradation problem once the channel becomes saturated. Hence, an efficient admission control scheme in EDCA is a key to guarantee...
Extensive research addressing IEEE 802.11e enhanced distributed channel access (EDCA) performance analysis, by means of analytical models, exist in the literature. It started mainly with the famous Bianchi's model and still continues today as several aspects have not been covered yet. Unfortunately, the currently proposed models, even though numerous, do not reach the required accuracy due to the...
Extensive research addressing IEEE 802.11 distributed coordination function (DCF) and 802.11e enhanced distributed channel access (EDCA) performance analysis, by means of analytical models, exists in the literature. It started mainly with the famous Bianchi's model and still continues today as several aspects have not been yet covered. Indeed, the ultimate goal is to obtain the model that provides...
Next generation mobile networks are expected to provide service to intelligent terminals with different categories. To fully optimize wireless networks, we argue that applications demands should be taken into account given the current channel and network conditions. Knowledge has to be shared between layers to obtain the highest possible adaptivity. In this context, we propose and evaluate an adaptive...
In this paper, we propose a complete analytical model for the 802.11e enhanced distributed channel access (EDCA) under different traffic conditions; it outperforms almost all existing models. Based on the proposed model, the achievable throughput and access delay of each EDCA access category are given. Simulation is performed to demonstrate that our model provides a high degree of accuracy.
Anonymous authentication is a means of authorizing a user without revealing his/her identification. Mobile technologies such as radiofrequency identification (RFID) tags, PDAs and mobile phone systems are increasingly being deployed in pervasive computing. These mobile devices have raised public concern regarding violation of privacy, anonymity and information confidentiality. Considering these concerns,...
This paper covers sensor networks, their different applications and problems encountered and in particular the routing problem which constitutes a major constraint in sensor networks today. The modified directional source aware routing protocol (DSAP) is presented. The goals intended were to build on the work already started on the modified DSAP algorithm for routing in a WSN network, try to find...
This paper focuses on sensor networks and specifically the routing part. Some enhancements were introduced to the directional source aware routing protocol (DSAP). This new algorithm, called MDSAP (modified DSAP), is simulated using TinyOs and compared to the standard DSAP protocol. MDSAP is used for building one complete structure that handles both fixed and mobile users. Some of the resulting concepts...
In order to improve the vehicle tracking quality in the cities and especially in urban area, the following article handles the correspondence between real and virtual images to find the closest virtual image to the real one. Real image are extracted from cameras equipped by a GPS system, together installed in the vehicle. Virtual images are extracted using a GPS from a database managed by 3D geographical...
The increasing progress in wireless mobile communication has attracted an important amount of attention on the security issue. To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session key. So far, several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area...
To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session key. So far, several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a secure authenticated key agreement (EC-SAKA) protocol based on elliptic curve cryptography...
Several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a new secure authenticated key agreement (SAKA) protocol that provides secure mutual authentication, key establishment and key confirmation over an untrusted network. The new protocol achieves many of the required security and performance...
Several analytical models have been developed for both 802.11 distributed coordinated function (DCF) and 802.11e enhanced distributed channel access (EDCA). However, none of these models considers the 802.11e Contention Free Burst (CFB) mode which allows a given station to transmit more than one frame for each access to the channel. In spite of its influence on the global performance and its role...
This paper presents the RAMPE system intended to assist and help blinds and visual-impaired people in public transportation. This system relies on a network which must provide open connection and access protocol for the user. The network architecture of this system is described along with the different protocols in use, their limitations and the possible enhancements. The simulation of the RAMPE application...
This paper presents the different problems encountered in sensor networks today, precisely the problem of routing. The directional source aware routing protocol (DSAP) is described along with its principle and is simulated using the network simulator OMNET++ useful for debugging, illustration purposes or performance evaluation, and providing a collection of tools that help modifying or implementing...
This paper presents the simulation of the RAMPE system that assists and helps the blinds in public transportation. First the RAMPE system and the network protocols used in this system are described along with their limitations and possible enhancements. Then we describe the simulation of RAMPE using the network simulator OMNeT++ useful for debugging, illustration purposes, performance evaluation,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.