The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In some environment, randomly deployed sensor nodes could not satisfy the requirements of wireless sensor network. Therefore, it is necessary to use mobile sensor nodes in some special conditions. And after moving nodes are deployed randomly, they could be relocated according to the real-time situation of network coverage degree. This paper proposes a hexagonal grid-based sensor deployment algorithm,...
With the rapid development of m-commerce, predicting user's navigation and making the service recommendation become more and more important. Most researches focus on predicting user's navigation using context history and user preferences. But, the influence of the attributes of a service has been ignored. Simultaneously, some attributes are variable, so the recommendations are changeable. Therefore,...
This article undertakes the most important parts of hardware platform of our Biotelemetric system. It describes the way of use of standard devices from commercial manufacturers, such as embedded PCs, PDAs and wireless ECG unit BlueECG communicating via bluetooth. Suggests major problems and disadvantages of their use and offers possible solutions in the form of construction of our own purpose-built...
Fast handover protocol provides seamless handover in mobile IPv6 networks by reducing handover latency. One assumption in fast handover is that the MN (Mobile Node) or the network could know or predict the new AR (Access Router) before data transport from the previous AR to the MN is disrupted. In order to achieve this capability, the complexity of predicting the new AR and the diversity of the wireless...
In mobile computing environments, the limited bandwidth of wireless communications, the weak capability of mobile computing equipments and the valuable power make it difficult for mobile devices to be maintained with the network all the time. Cache technique caches part of data in the clients to reduce the query of database server, so it solves the problem to some extent. Research on cache strategy...
Dissemination techniques may be used to enable users to get the needed data efficiently. In this paper, I describe an architecture designed to provide a flexible access to data in a multi-channel dissemination-based network. I show how a suitable system fits in the overall telecommunication network. In addition, I show the consistency of the system design and provide analytical study for the space...
Differential evolution has emerged as one of the fast, robust, and efficient global optimization approach of current interest. In this paper, an application of differential evolution to the location management problem in mobile computing is described. To improve the convergence rate and the quality of solutions of the differential evolution algorithm, an effective population initialization strategy...
To explore the benefit of advertising instant and location-aware commercials that can not be effectively promoted by traditional medium like TV program and Internet, we propose in this paper a solution for disseminating instant advertisements to users within the area of interest through a mobile peer-to-peer network. This is a new application scenario, and we devise an opportunistic gossiping model...
Recent development has a tremendous growth in the ad-hoc wireless networks. Ad-hoc wireless networks are dynamic topology networks organized by a collection of mobile nodes that utilize multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure. Ad-hoc wireless networks are very useful in emergency operations, collaborative and distributed computing and military...
Wireless Sensor Networks (WSNs) must be able to operate under very dynamic conditions and, in most cases, in an unattended mode leading to an autonomous network. This scenario becomes more complex when we consider that there will be probably sensor networks that comprise tens to hundreds of thousands sensor nodes. The design of algorithms for WSNs must consider the hardware limitations of sensor nodes,...
In this paper we study the problem of jointly performing scheduling and congestion control in mobile ad-hoc networks so that network queues remain bounded and the resulting flow rates satisfy an associated network utility maximization problem. In recent years a number of papers have presented theoretical solutions to this problem that are based on combining differential-backlog scheduling algorithms...
We study the novel hierarchical architecture of Mobile Backbone Networks. In such networks, a set of mobile backbone nodes (MBNs) are deployed to provide an end-to-end communications capability for the regular nodes (RNs). In this work, we address the joint problem of placing a fixed number K MBNs in the plane, and assigning each RN to exactly one MBN. We formulate and solve two problems under a general...
In the case of ad hoc wireless networks, a packet transmitted by a node is received by all nodes in the neighborhood and within RF range. One of the problems is to minimize the total number of forward transmissions for broadcasting. Though this problem is NP-complete some approximation approaches such as Gossip [4] and dominant pruning [9]have been proposed. We propose a new scheme for ad hoc networks...
Three applications in wireless networks where model-free stochastic learning is applicable, are discussed. The learning based optimization problems are formulated and simulation results are presented. Some open issues are also discussed.
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
The following topics are dealt with: wireless communications; embedded systems design; reconfiguration and optimization; trust management; design issues in mobile hand-held devices; power and energy awareness; context-aware and location-aware computing; access control; tools and application systems; sensor networks; RFID implementation; security and assurance; motion and tracking; reliability; risk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.