The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies an efficient periodic and aperiodic task decomposition technique for real-time sensor networking platforms from two perspectives. First, wireless sensor networking platforms available in literature have not addressed the concept of real-time scheduling for hybrid task sets where both types of periodic and aperiodic tasks exist. Second, individual system components in real-time sensor...
We propose an efficient routing for wireless sensor networks, called pivot routing. Pivot routing establishes the data paths while query is propagated. Source node selects a data path and transmits data packets to the sink via pivot nodes. Because subsequent query and data packets are transmitted along pivot nodes, control message overhead decreases considerably. Network lifetime also increases since...
Due to the advance in development technology for mobile systems, the attacks on the embedded systems become sophiscated. Especially, tampering with the infomation of mobile devices by software or hardware attack may lead to a serious problem like leaking personal information. In order to protect the tampering attack, encryption technique for embedded information is proposed. However, when the specification...
The 4G mobile system is a collection of radio networks providing access to IP based services. It ensures seamless roaming and users are always connected to the best network providing QoS (Quality of Service) to the end user. The mechanism of switching to a different network is termed as vertical handoff. In this paper we propose a vertical handoff management architecture which ensures efficient utilization...
The paper presents the performance comparison between the triangle routing and the route optimization. The paper presents not only the analytical models to compare the performance but also the threshold value to decide whether the mobile node had better use the route optimization or not. The model provides the approximate guideline when a network administrator is to implement mobile IPv6 with the...
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by communicating nodes. Unluckily, due to resource constraints, the key agreement problem in wireless sensor networks becomes quite intricate. In this paper, we propose a new ID-based random key pre-distribution scheme that is comparable...
In this paper, we propose an adaptive mobile system that uses mobile grid computing to achieve infeasible work in mobile device. Recently, grid computing has gained significance for its ability to achieve certain goals by sharing the idle resources of computing devices, and thus overcoming the various constraints of the mobile computing environment. In the mobile environment, it is very important...
Passage retrieval is a base of answer extracting in Chinese question answering system.In order to improve the precision of the passage retrieval which includes answers, this paper analyze first existing passage retrieval methods,and point to their shortcomings, then put forward a new method of passage retrieval, in which factors are considered ,such as frequency of query words and query expansion...
Adaptive routing algorithms have been frequently suggested as a means of improving communication performance in parallel computer networks. These algorithms, unlike deterministic routing, can utilize network state information to exploit the presence of multiple paths. Before such schemes can be successfully incorporated in networks, it is necessary to have a clear understanding of the factors which...
This paper is a study related to phonemic analysis of Korean speech. For speech recognition, the best method is that speech should be recognized as phonemic unit. However, to segment speech into phonemic units is not well-applied because of various changes of phonation. Therefore, I in this study try to arrange a phonemic system of Korean speech and segment speech into phonemic units on the base of...
This paper proposes an efficient media synchronization framework for SVC video transport over IP networks. To support synchronization between SVC video and audio signals transported over IP networks, RTP/RTCP protocol suite is usually employed. To provide a framework for media synchronization, we suggest an efficient RTP packetization mode and propose a computationally simple RTCP packet processing...
In this study, a value framework for ubiquitous computing is developed and presented. Using ‘value focused thinking’ approach suggested by Keeney, twenty-two potential users of ubiquitous computing were interviewed and 435 statements describing values expected from ubiquitous technology were obtained from these interviews. Subsequent purification and redundancy removal reduces these 435 statements...
A lot of schemes have been proposed for the realization of u-city. Especially, most of the schemes are based on ubiquitous networks. For various u-city services to be available, mobile nodes can be employed in ubiquitous networks. However, an accurate positioning scheme is required for the practical usage of the mobile nodes in the ubiquitous networks. In this paper, an optimal diversity technique...
Most existing overlay multicast approaches avoid considering any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and makes the overlay topologies incompatible with the underlying network. To address these issues, we propose TOMOON as a novel overlay multicast approach, which exploits the cooperation between...
The system response time is one of the most critical user’s requirements. Therefore, a response time analysis must be done at the design stage. This paper proposes a response time analysis method based on ‘Fuzzy-Timing Petri net with choice probabilities (FTCP)’. FTCP is a modified version of timed net: A delay time associated with a transition is not a crisp number but a possibility distribution...
This paper designs and implements a taxi telematics service system, aiming at providing an efficient framework by means of a Linux cluster to host emerging telematics services that need intensive computing. Combined with global positioning system and radio communication technology, the taxi telematics service system traces the position of taxis, finds a time saving route between start and destination...
As a way of implementing multicast delivery, application-level multicast (ALM) is known for its various advantages including high flexibility and easy deployment. However, one of its key limitations in achieving reliability and quality-of-service (QoS) for streaming services is the hierarchical error propagation caused by its tree structure. As a solution to this error propagation problem, we propose...
This paper proposes a fast handoff scheme between PDSNs (Packet Data Serving Nodes) which provide packet services to a mobile node. The proposed handoff scheme does not require reestablishment of a PPP connection that may occur in the process of performing handoff between PDSNs. The handoff method between PDSNs requires that the PDSNs should receive subscribers’ information about mobile nodes from...
Recently, projects to construct an innovative brand-new city, termed a u-City (ubiquitous City), are being carried out in many countries. The u-City is a future-oriented city which combines ubiquitous information services with city. It has emerged as an alternative for improving the quality of life for human beings and reaching the balanced development among cities. Although a number of privacy problems...
RFID, Radio Frequency Identification, technology is a contactless automatic identification technology about which a lot of researches and developments are recently progressing. For this RFID technology to be widely spread, the problem of multiple tag identification, which a reader identifies a multiple number of tags in a very short time, has to be solved. So far, several anti-collision algorithms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.