The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the mobile-learning the reduced functionalities of the mobile devices must be integrated with the typologies of the services delivered to the student. By referring to the Remote Didactic Laboratory Laboratorio Didattico Remoto - LA.DI.RE. ldquoG. Savastanordquo the delivered services taken into account are: experiment visualization, experiment control, and experiment creation. In order to enable...
Free Space Optics (FSO) links provide usage of high bandwidth and the flexibility of wireless communication links. However, weather patterns like fog and heavy snow fall limit the availability of FSO. Another technology providing similar properties regarding offered data rates and flexibility of set up is Millimeter Wave Technology (mmW), operating at several tens of GHz. In this case, heavy rain...
Due the development of new wireless technologies and the advent of new mobile devices, new services and applications are necessary to supply the needs of the users of these devices. Video on-Demand (VoD) services have become one of these services. In this paper we present a P2P Mobile Video on-Demand (VoD) Protocol for mobile devices. Due to different possible communication interfaces that are available...
In recent years, increasing road safety has become one of the most critical issues in the European Commission policy. The ambitious target is to halve the number of fatal car accidents by 2010. Up to now, research efforts have been mainly focused on the idea of making cars safer and safer; now, the focus is to exploit new technologies in order to reduce probability of car accidents. This paper deals...
We propose a new decentralized signaling protocol based on multicast and anycast communications, that substitutes the centralized tracker required by classic BitTorrent implementation. The proposed solution allows to fully exploit the decentralized data sharing among BitTorrent peers, by maintaining all its benefits, without the need of the centralized tracker, the main point of failure of the BitTorrent...
In this paper impact of resource scheduling algorithms on the average user throughput, average cellpsilas capacity and the quality of provided services in the microcellular 4G environment has been analyzed. Well known scheduling algorithms such as Round Robin, MaxSNR and Fair Rate have been compared with the algorithms proposed for fading channels in [1]. A simple modification of the scheduling has...
A Mobile Ad-hoc Network is a kind of mobile wireless network which is self-configuring and decentralized without having a fix infrastructure. However, all the network activities will be done by the nodes themselves. In such networks, each node is both an end-system as well as a relay node to forward packets for other nodes. The assumption of cooperation of all the nodes in transmitting and routing...
Wireless Sensor Networks are being widely deployed for their inimitable characteristics. Besides benefiting through the features of scalability and coverage, these networks are prone to many security threats including Denial of Service (DoS) attacks. There are many aspects of security in sensor networks but our work focuses on key distribution and sharing protocols. We conduct a critical study of...
The main advantage of using specific routing algorithms like AODV-ST or OLSR in wireless mesh backbone networks is their optimized handling of throughput from border nodes to each other. However, currently used metrics tend to ignore load situations and thus result in overloaded clusters within the mesh network. Our work presents a novel approach for load-based routing. We developed load observation...
In this paper we investigate the behaviour of M-GeRaf, Multisink GeRaf, a data dissemination protocol for multisink wireless sensor network environments based on a geographic random forwarding routing approach. The protocol exploits the intrinsic broadcast nature of the wireless channel in order to allow a reliable and efficient data delivery to a set of data sink nodes in networks with an aggressive...
Various approaches based on different wireless technologies have been proposed for indoor localization; however RFID technology remained the key focus of research in recent years compared to other technologies available on the market. RFID localization solutions are based either on tag detection count or signal attenuation, yet their reliability are not consistent. In this paper, we propose a novel...
Traffic and channel-data rate combined with the stream oriented methodology can provide a scheme for offering optimized and guaranteed QoS. In this work a stream oriented modeled scheme is proposed based on each nodepsilas self-scheduling energy management. This scheme is taking into account the overall packet loss in order to form the optimal effective -for the end-to-end connection- throughput response...
We present framework of a channelized intercept receiver capable of detecting frequency hopped signals using a computationally efficient digital architecture. The signal is first digitized using a high speed, wide band, analog to digital convertor and all subsequent processing including channelization is done digitally. The channelized front end is designed using polyphase fast Fourier transform (FFT)...
The most critical part of a construction project is normally the construction elements that form the structure of the building. Concrete construction elements are often used as support structures and on the facade of the building, but they are vulnerable to manufacturing defects as well as being damaged on-site. Such defects can create a lot of additional costs to all parties involved in the project...
We study the problem of secure routing in wireless sensor networks where the sensors and the sink can move during the execution of remote monitoring applications and communication is not necessarily directed towards the sink. We present a new routing protocol that builds upon a collection of mechanisms so that the integrity and confidentiality of the information reported to the controlling authorities...
Localization and tracking of target is an important application of the wireless sensor network. In this paper, we propose to apply a classification algorithm to sensor network nodes aimed at target tracking. Localization and tracking is based on a distributed method that enables us to simplify the signal processing and makes a more robust system. Also we address to group sensors, each group or cluster...
In this paper we investigate an algorithm for the adaptive frequency hopping mechanism that is used by frequency dynamic systems to mitigate interference from other systems. With this algorithm we introduce several improvements in relation to the existing algorithms that are based on the approach of using Packet Error Rate as the means for channel classification. One is the use of a single criterion...
This paper covers the results of a practical study on applicability of passive UHF RFID tags for the needs of construction industry. This research is a response to a need to map and evaluate available solutions for RFID-based identification of particular construction elements, hollow welded steel beams. We present a comparison of performance of five different commercial RFID tags. The performance...
According Teslapsilas idea his magnifying transmitter has been designed not only to efficiently emit Hertzian waves, but also to transmit power at large distances. Analysis of Teslapsilas transmitter by using the wire antenna theory and reflection coefficient approximation is carried out in this work. The radiating part of the Teslapsilas transmitter is represented by an equivalent monopole antenna...
This paper proposes a string edit distance based test selection method to generate compact test sets for telecommunications software. Following the results of previous research, a trace in a test set is considered to be redundant if its edit distance from others is less than a given parameter. The algorithm first determines the minimum cardinality of the target test set in accordance with the provided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.