The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stereo-electroencephalographic (SEEG) depth electrodes were used to record neural activity from deep brain structures in this study. By localizing all the electrodes into the individual brain, we found that areas that are inside of central sulcus occurred obvious hand-movement-related modulation when the subjects were performing different hand motion tasks. Then, an asynchronous brain-computer interface...
With the rapid development of wireless communication technology and mobile devices, network traffic on smart mobile devices has increased gradually. VoIP is a well-known and mature technology and communication anywhere is emerging as an important application that requires an entirely different way of thinking about communications. In practice VoIP system one kind of issue that vitally impacts the...
Nowadays networking is secure because we encrypt the confidential messages with the underlying assumption that adversaries in the network are computationally bounded. For traditional routing or network coding, routers know the contents of the packets they receive. Networking is not secure any more if there are eavesdroppers with infinite computational power at routers. Our concern is whether we can...
One of the most important benefits of virtualization is Virtual Machine (VM) migration. While the performance of live VM migration is well explored, the security aspects have received very little attention. The extension of trusted computing to virtual systems using vTPMs allows applications in the VM to use the vTPM for secure storage and reporting platform integrity. In this paper, we propose an...
In many applications, the query mechanism would co-exist with the data collection at the same time. If these two mechanisms can be combined, the query could utilize some information from the data collection and get benefits on the robustness and stability. We propose a query mechanism which can find the path without any additional beacons or packets and get information from the process of data collection...
Integration of sensors, embedded operating systems, wireless networking technology, wireless sensor networks, is a new information gathering and processing technologies, in environmental monitoring has a very good application and advantages. This paper introduced a method model based on ZigBee-technology. Depending on specific situation in environment, LEACH communication protocol was chosen. The...
In this paper, we study the RFID tag-reader mutual authentication scheme. A hardware design of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards is proposed. The proposed RFID tag-reader mutual authentication protocol was simulated using Modelsim XE II and synthesized using Altera's Quartus II software. The system has been successfully verified in hardware using an Altera...
This paper firstly introduces the mesh structure of IEEE 802.16, explains the three-way handshaking mechanism under the mesh structure, then questions the conflict problem existing in the previous protocols, and proposes a method to improve the three-way handshaking mechanism. According to simulation results, it performs well, not only shorten end to end delay, but also increase throughput.
The limited ability of conceptual layers to exploit the nature of mobile communications has led to cross-layer solutions that allow optimal operations for heterogeneous wireless network services. This study proposes a cross-layer-based quality-of-service (QoS) architecture that includes the QoS engine and the cross-layer algorithm. The QoS engine is composed of the QoS daemon, QoS agent and control...
This paper introduces the development of the existing SNMP, and the disadvantage of the current SNMP system. After that introduces the SNMP system that is designing and developing, the system can simultaneously support snmpv1. snmpv2c, snmpv3, and can be used in a mixed environment of ipv4/ipv6. This system in light of other similar system uses the LEAPS algorithm to judge the state of network, and...
Relay technology can improve the coverage and capacity of wireless system, but it causes long transmission delay and network congestion. In addition, the movement of MS or RS, and radio resource contention can result in wireless path broken or connection broken. Traditional TCP can not differentiate the packet loss reasons in mobile multi-hop relay network that may be due to congestion, link error,...
Almost everyone today has his or her mobile phone and Bluetooth has already become a standard inclusion on most mobile phones, laptops and PDAs. Data transfer through Bluetooth among the handheld devices is common and popular. Bluetooth establishes links in a more convenient manner to facilitate sharing data between devices. It motivates us to apply this technology to hypermarket advertising. In this...
Sander and Tschudin proposed mobile code protection scheme - evaluation of encrypted functions implemented by homomorphisms based on exponentiation and Goldwasser Micali, but no homomorphisms enable to hide the skeleton and equal coefficient information of a polynomial. To solve the problems, an idea of approximate decryption and a new revised ElGamal are proposed in this paper. Three new public-key...
In this paper, a localization system based on wireless sensor networks (WSN) is proposed for facilities of underground trackless mine. Today how to monitor Facilities of underground trackless mine effectively in security is the topic which needs to solve. As the development of science and technology, GPS has been widely used in many areas. However, as a result of the surface shielding effect, the...
Sensor network reprogramming is a challenging problem and code dissemination is one of the important part in this subject. This paper proposes a novel TDMA-based code dissemination protocol which can greatly reduce the redundant message receptions and collisions in the dissemination process. We divide a program image into pages and page dissemination is in pipeline to reduce latency and achieve easy...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
In VoIP networks, SIP encourages the convergence of telephony and Web-based services. The Web phone has become an attractive tool for developing VoIP services. In this paper, we use open source software to build VoIP platform providing the Web phone, voice, video, IM, and prepaid services. A billing system and Web pages are also developed for the administrator providing the administrative functions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.