The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Handover is the core procedure for assuring mobility of the users in any mobile network and its success rate is a key indicator of user satisfaction. In the current mobile networks, handover optimisation is done manually on a long timescale. In this paper, we introduce inter-NodeB coordination system and the parameters of user behavior and history data to optimise handover. First, we collect the data...
Deployment and upgrade of a mobile network have always been challenging tasks. Very often they require human intervention because telecom networks are complex systems composed of different nodes that need to be compatible in order to communicate and provide network services. Therefore in current telecommunication systems a network expert must check all the requirements and compatibilities of the network...
The concept of mobile network is summarized in this paper. Requirements of dynamic routing protocol of this network are described. After analyzing the characteristics of mobile network, a new dynamic routing protocol (CSTR) for mobile networks is proposed. The rules for mapping between cell number and corresponding co-ordinates are fully given. Finally, the key points in the implementation of the...
A new dynamic routing protocol (CSTR) for mobile networks is proposed in this paper. The rules for mapping between cell number and corresponding co-ordinates are discussed. The routing protocol has been formulated with the help of a tree structure generated inter-alia. All possible routing paths could also be enumerated in a simple manner. This method is simpler than other techniques reported so far...
The problem of perfectly secure message transmission is to ensure that the adversary cannot obtain information about messages in the information theoretic sense. There are lots of studies about the interplay of network connectivity and perfectly secure message transmission under a Byzantine adversary that cannot corrupt at most t players. It is known that perfectly secure communication among any pair...
Recently, the open mobile alliance (OMA) has been set to define open DRM technologic specifications to protect copyrighted content against piracy, unauthorized use and distribution over mobile networks. This paper proposes an efficient OMA DRM v2.0 ROAP for protecting a rights object for a device. Our proposed ROAP can offer a more efficient DRM system for future mobile networks.
Data allocation can be used to improve data availability in distributed database environments. In such a system, a mechanism is required to distribute the data (allocate it) to the system nodes in the mobile or fixed network and to maintain the consistency of the data. The high increase for working in the disconnected mode leads to develop some models that handle the transactions during the connection,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.