The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Emergency and disaster operation require the computing devices in the zone to operate smoothly and uninterruptedly i.e. they must have the capacity to tolerate faults in the disaster. The mobile computing during the disaster faces challenges such as network or service unavailability, mobile device hardware failure and user incapacity to compute. This paper proposes a novel method to address this issue...
For unpredictable manner of mobile ad hoc network (manet), due to mobility of nodes in network, the shortest path is not necessarily the better path. If we do not consider the stability of routing path, then wireless links may be easily broken. Hence it is important to find a route that endures a longer time. Recently, efforts in this field have dealt the parameters battery power or trust of a node...
The convergence of heterogeneous networks is the trend of future network development. However, many “bottlenecks” exit in the convergence such as high delay, high energy consumption, low communication rate, etc. In order to overcome these “bottlenecks” and to satisfy the requirements of heterogeneous network convergence, handoff decision-making for heterogeneous network becomes necessary. For the...
With the world coming into the information age, computer basis course has become the public basic course which must be set up in colleges and universities and the increasing popularization of computers makes the computer basis education in university facing with more and more higher request. That requires teachers to answer questions in time, but a teacher usually teaches hundreds of students. After...
For the purpose of enhancing the management level of the meter reading of power enterprises, web services based GPRS automatic meter reading system is put forward. In this paper, the characteristics of GPRS technology and Web Services technology are analyzed, and the architecture of web services based GPRS automatic meter reading system is designed. The front-end based on the GSM/GPRS network is implemented...
The aim of the paper is to propose a new algorithm for mobile call termination for roaming mode that reduces the call setup time for a call from a fixed wire line to a Mobile Station that is present in the same network as that of fixed line but is in roaming mode. Hence forth, fixed wire line is referred as fixed line. The method adopted includes introduction of new node into the GSM network, namely...
Protecting host computer against potential malicious mobile code is one of important question of mobile code security. Model Carrying Code consider producer and consumer all together, gives theoretical framework center around behavioral model of program, which can guarantee safe execution of untrusted code. However, it faces several difficulties when applied to the most ubiquitous mobile code platform...
The traditional TDOA location and measurement technology estimates the MS (Mobile Station) location using the difference of time that spent by signal beam reaching different BS (Base Station) from the same MS, which has an advantage of strong resistance to the NLOS additional errors but asks for extra channel overheads for measuring the time from a terminal to different base stations. In order to...
Motion estimation is a very important part of video compression. As a result of using precision of motion vector in H.264 encoder, the computational cost increases rapidly, and motion estimation is the most time-consuming stage. In this paper, based on the UMHexagonS algorithm, an optimized algorithm is proposed based on the dynamic search window selection, big hexagon and small hexagon search mode...
Under the background of large-scale addition of new base stations in CDMA networks, co-PN-offset interferences and adjacent PN-offset interferences are much prone to happen. In this paper, the great significance of PN offset optimization are discussed, three existing methods are described, and a new automatically implemented strategy of PN offset optimization, which is also competent for reasonable...
Recently, distributed video coding (DVC) has attracted much more attention with advances in low-complexity encoder and flexible architecture, which could be effectively applied in mobile video communication and video surveillance network. But the gap with the conventional video codecs is still large. One of the key factors is the quality of side information as it directly affects the system's rate...
Cryptographic algorithms play a big role in providing data security against malicious attacks. However, they are computationally intensive applications and consume large amount of CPU time. In mobile devices network security is very important, and different type of cryptographic algorithm is used to prevent malisons attack on the transmitted data. This work provides comparison between block and stream...
In wireless video monitoring system, collaboration and information sharing among monitoring nodes are of great significance to fully mining potential of the monitoring system. It is important to improve its efficiency and reduce the total power consumption, so as to extend its service life. In this paper, by introducing Mobile Agent into wireless video surveillance system, a Mobile Agent based multi-node...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.