The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Creative Professionals have traditionally worked primarily in desktop applications such as Photoshop. Today, the creative process also occurs on mobile devices and places a greater emphasis on remixing elements of others' work. Traditional digital media file formats are poorly suited for this environment. Digital Composite Technology (DCX) is a framework for the creation of digital media in a mobile-first,...
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes...
With the rapid growth of Internet services, remote user authentication becomes an important issue for the security of accessing the remote server's sources. Since Das et al. (2006) first proposed a novel ID-based remote user authentication scheme using bilinear pairings, the password-based remote user authentication schemes using bilinear pairings with smart cards are proposed successively to enhance...
Because of its salient features such as ease of deployment, Proxy Mobile IPv6 (PMIPv6) is a promising solution for mobility management and is attracting considerable attention among the telecommunication and Internet communities. To the best of our knowledge, however, it is still an open issue how to build a scalable PMIPv6 domain so that a PMIPv6 domain is able to support as many mobile nodes (MNs)...
In this paper, we propose a banyan-tree topology for the railway wireless mesh network (WMN), which could normally stretch up to hundreds and thousands kilometer along the railway. Theoretical analysis and numerical studies show that the proposed banyan-tree topology is appropriate for the implementation of multi-hop WMN along the railway with improved network robust, and is feasible to deploy because...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.