The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose and investigate a simple, low-complexity and deterministic cooperative protocol that exploits Network Coding (NC) within a wireless network. The scenario under investigation is for Long Term Evaluation Advanced (LTE-A) downlink communication system network, where a source of data sends k stream of packets to a Pico relay which forwards them to two Femto relays via fiber optic...
In next-generation wireless networks, provisioning of IP-based network architecture and seamless transmission services are very important issues for mobile nodes. For this reason, a mobility management mechanism to support global roaming is highly regarded. These technologies bring a broader life by using a global roaming account through the connection of multiple devices or technology to mobile users;...
As mobile devices and wireless network access are becoming more pervasive, people are more likely to access and share files any time and any place. A variety of distributed file systems have been developed to support file sharing and distribution. But the problems such as high complexity, low flexibility, low data integrity, management difficulties, low security, and high susceptibility to network...
The most prevalent grid security standard, grid security infrastructure uses an authentication protocol based on public key infrastructure (PKI). Certificateless public key cryptography (CL-PKC) overcomes PKI certificate management problems and is well aligned with grid computing demands. Security and efficiency are the main grid authentication protocol objectives. Practical, efficient CL-PKC-based...
Based on S3C6410 (with ARM11 architecture) and embedded Linux operating system, this paper successfully implements a real-time digital video monitoring system. Test results show that displayed videos are fluent with low packet loss rate, and the system supports online broadcast for multiple clients.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.