The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is based on the TTCN-3 terminal conformance test structure defined by ETSI (European Telecommunication Standards Institute). And a security module is provided for TD-LTE/TD-SCDMA inter-RAT test system which uses the test structure. The proposed security module realization mechanism can be applied to conformance test system implementation directly, consequently, this paper possesses quite...
This paper considers the network coded relay protocol utilized in the cellular systems. The time division multiple access (TDMA) based opportunistic network coded cooperation(TDMA-ONCC) scheme, whose central idea is to perform the opportunistic network coded cooperation based on the observed instantaneous channel qualities of source-to-relay and relay-to-destination links, is researched. Performances...
In combination with the current technologies related with smartphones and e-mail, an e-mail system based on Ophone and component technology is designed to construct security safeguard during sending and receiving of e-mail client software according to MOSS protocol and realize easy and quick receipt of e-mails by use of pre-fetching strategy thus to achieve the design and implementation of efficient...
The overhead caused by virtualization makes it difficult to apply VM in the applications which require high degrees of both performance isolation and efficiency, such as the high performance computing. In this paper, we present a lightweight virtual machine, named Solo. It simplifies the design of VMM greatly by making most privileged instructions bypass the VMM, except the I/O operations. Solo allows...
The reason for radio frequency identification usage is its potential for pervasive id tracking in logistic applications. It could objectively improve efficiency of items' identification due to contact-less detection. Several attempts have been made to implement e-payment and e-passport. Such system requires high security mechanism however they are not secure enough for personal data, in term of privacy...
We consider a multi-hop wireless sensor network in which a large number of sensor nodes are grouped into cooperative clusters. Multi-hop transmission is carried out between the source and the destination nodes by concatenating consecutive cluster-to-cluster hops. For each hop, both the transmit and the receive clusters can exploit node cooperation such that cooperative distributed multiple-input multiple-output...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.