The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
Delay Tolerant Networks (DTNs) are intermittently connected mobile networks, in which a fully connected path from source to destination does not exist. Therefore in these networks, message delivery relies on opportunistic routing where nodes use store-carry-and-forward paradigm to route the messages. However, effective forwarding based on a limited knowledge of contact behavior of nodes is challenging...
Code Division Multiple Access (CDMA) is the most popular wireless access technology in modern mobile communication. Design of CDMA spreading codes has grown sufficient interest amongst the researchers over the last few decades. CDMA code family is generally categorized into two groups, namely orthogonal and nonorthogonal or near-orthogonal which have established their application in synchronous (downlink)...
With the growth of bandwidth adaptive applications in wireless and mobile networks with different QoS requirements, there is an urgent need for an adaptive bandwidth management scheme which makes use of the flexible bandwidth requirements of these new traffic classes. In this paper, a Call Admission Control (CAC) strategy is proposed based on full consideration of the adaptivity of multimedia services...
When mobile sensors are initially deployed, some sensors may be located far away from the region of interest and due to the sensor's limited sensing of range, some sensors may not be able to participate in the coverage task. This paper proposes a new algorithm on the coverage problem for mobile sensor networks which guarantees all sensors to participate in the coverage task. The algorithm is a combination...
Currently, almost all Spanish Universities offer their students access to a virtual campus consisting essentially of one or more e-learning platforms, which contain the educational material of most of the subjects taught at the university. Although the aim of these e-learning platforms is the learning in virtual format, mainly they are used by the teachers to supplement the lectures (b-learning)....
Delay tolerant network, because of the unreliability of the link, and the limit of the network resources, needs to select the appropriate data forwarding algorithm to ensure efficient message forwarding and delivery. According to DTN properties, this article first establishes the DTN two-layered mobility model. Then it introduces node's location, direction of movement and other important parameters...
Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely adopted especially by young adults. However, Bluetooth-enabled networks have similar security weaknesses as any other digital networks. Instilling security awareness and implementing preventive measures, responsibilities of both the device manufacturers...
Based on the system theories, this paper analyzes the trunking communication system in CERS (City Emergency Response System) by using of the technology of multi-living agent and the function of the trunking communication system in CERS, then the author proposes to build the trunking communication system in CERS by using multi-living agent method; finally the paper analyzes the basic structure and...
The mobile networks must have an ability to maintain an acceptable level of service during network failures to provide high resilience against service failures. This paper presents an eccentric fault tolerant path grouping scheme that can achieve mobility independent Quality of Service (QoS) guaranteed services in Generalized Multiprotocol Label Switching (GMPLS) based wavelength-switched optical...
In the context of mobile communication and connectivity system evolution, new transmitter architectures should be studied in order to design nomadic multiradio low consumption transceiver. In term of efficiency, the most important element is the amplifier. In order to obtain high efficiency performance, it is possible to use several architectures associated with switched amplifier. In this paper,...
This paper studies mobility strategies to control positions of mobile robots in a mobile sensor network in order to maximize lifetime of the network. With communication and mobility energy costs modeled, the problem is formulated into a nonlinear non-convex optimization problem, then reformulated into a convex optimization problem. The separable property of the system is then exploited by Lagrangian...
Based on the analysis and introduction of blind source separation, it analyzes the signal sorting of the maximum kurtosis natural logarithm, compares the signal model forms of the narrowband blind beam forming and instantaneous hybrid model of blind source separation and those of the broadband blind beam forming and convolutive hybrid model of blind source separation, and obtains the conclusion that...
Frequent partitions, intermittent connectivity and message delivery delay are the commonly observed characteristics of disruption tolerant networks (DTNs). These networks often operate over extended periods since they are regularly deployed in harsh and constrained environments. Efficient energy conservation is therefore necessary to prolong network lifetime. Most DTNs nodes depend on mobility to...
To improve intelligence level of the rural 400V power distribution grid, a new scheme of smart power distribution management is introduced. Smart power distribution cabinets handled by ARM-LINUX based intelligent systems are employed, which have mobile (GPRS/CDMA/3G) networking capability to communicate with the local power dispatch center, so that each cabinet can transfer grid parameters and other...
In order to construct the highway networks, the road tunnels become an inevitable deign to accommodate physical environment elements (e.g., mountains and rivers) in the world. For the recent constructed tunnels, the communication system within the tunnel is planed and designed ahead of time. However, the cost to build and maintain a complete communication system for existing tunnels may not be a cost...
In wireless sensor networks, many studies on data dissemination to individual mobile sinks traditionally rely on a strategy that consists of a virtual infrastructure to serve current location of the mobile sinks and a per-sink foot-print chaining mechanism to support local mobility after location update. To adapt the strategy for supporting mobile sink groups, it may be simply considered to exploit...
Node failures in Wireless Sensor Networks composed by static sensor nodes are common due to the nature of the sensor devices and the usually harsh environments in which they are deployed. Node failures can diminish the performance of the network as a whole, thus affecting its functionality in delivering the desired services. For instance, significant regions can become uncovered due to failure of...
Interference reduction is vital for being able to effectively communicate with mobile users in rugged terrain and mountainous regions.12 It is proposed to outfit a high flying airborne node with a Code Division Multiple Access (CDMA) base station in order to provide line of sight communications and continual coverage to the remote users. One approach to increasing capacity and coverage zones for the...
We have developed a new version of a pervasive system for monitoring and recording subjective pain experiences. The most important service the system offers to its users is real-time delivery of reported pain values from patients to nurses. Pain experiences are expressed on a six-value scale from "no pain" to "worst possible pain". The system was tested in four sessions with 23...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.