The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In sight of the rapid revolutions of the information and wireless-transformation and telecommunication technologies since 2000s, most of people used to utilize the diversified computer, communication, consumer (3C) electronic devices, such as notebook, tablet PC and so on, to not only simultaneously surf and download the comprehensively public information and knowledge but also immediately share and...
Requirements Engineering (RE) and all its underlying activities, such as requirements identification, evolution, validation, communication, and management, are still the key factors in successful product development. Therefore, proper implementation of this process is necessary to obtain a quality product. A better understanding of the most challenging RE-related topics for practitioners will greatly...
Mobile marketing is a relatively easy and inexpensive way to promote products. This paper evaluates influential factors that motivate consumers in responding to mobile marketing with the consideration of context receiving time and location. A mobile marketing context model, with Technology acceptance model (TAM) and Commitment-trust Theory being adopted, is developed to facilitate purchasing intention...
One Time Password (OTP) authentication mechanism has higher security by one time padding. It is implemented simply, cost less and needed no third-party notarization, and so it is more suitable for limited environment in mobile commerce. A mobile identity authentication mechanism (MIAM) is presented based on OTP. The procedures of user registration and bidirectional authentication are designed in MIAM...
The process of analyzing available network forensics evidence to determine their meaning and significance can be very involved. It is often necessary to develop a timeline of significant events to obtain an overview of what occurred, to create relational diagrams showing which users are connected to which systems, or to correlate and analyze data to find noteworthy patterns of network traffic. However,...
In this paper, a new Rayleigh VANET model based on sum-of-sinusoids method (SoS) is presented. Some important statistical properties, such as variance of autocorrelation of the complex envelope and autocorrelation of the squared envelope are derived in detail. Furthermore, for above derived statistical properties, we give an detailed analysis about them by comparing their closeness between simulation...
The Nakagami fading can descript most of the fading channels in practice. This paper introduced a new simulation method for Nakagami Fading Channel, used it to simulate the first order and second order statistic properties of Nakagami fading channel, and proved the reliability of this method. Base on the simulation of the Rayleigh fading channel, this simulation method is a new exploration of the...
This study presents a conceptual model that combines perceived ease of use, perceived usefulness, familiarity, adoption intention and the actual consumers' adoption in order to predict user mobile transaction acceptance regarding mobile buying products and making reservations. The proposed model is empirically tested using data collected from a survey in Greece. The structural equation modeling is...
Because of inadequate study of customer behavior, it is difficult to develop targeted marketing strategies and business models, which also blocks its global development. And this lack of market perception has already become the barrier of its global development. Given the above situation, this article adopts Structural Equation Model to explore how to improve the competitiveness of 3G M-commerce market...
In this paper, second order statistics such as, Autocorrelation (ACF), Level crossing rate (LCR) and average fade duration (AFD) of an improved deterministic model is analyzed. Simulation results are presented by using different methods for the design of the parameters of the deterministic simulation model. Compared to the generalized method of exact Doppler spread (GMEDS), method of Lp-norm, and...
Currently, the main purpose in car-to-car networks is to improve communication performance. In order to prove this, we need a tool to evaluate statistical values such as the number of vehicles that have received the information, time of reception of the message, etc. In this study, we demonstrate how it is possible to simulate real scenarios with car-to-car technology and evaluate all traffic parameters...
In-vehicle communication networks are a complex and safety-critical system, in which system reliability is essential. Network tests and verification by means of behavioral simulations have been widely adopted by the O&Ms. Among a series of advantages, behavioral simulations allow the statistical analysis performance evaluation, which is important to assess the system reliability. Our objective...
Human opportunistic networks can facilitate wireless content dissemination while humans are on the move. In such a network, content is disseminated via nodes relaying and nodes mobility (human mobility). Thus it is essential to understand and model the real human mobility. We present a heterogeneous community-based random way-point (HC-RWP) mobility model that captures the four important properties...
We design and study recommendation algorithms for a fully decentralized scenario in which each item/node of a network recommends other items/nodes only on the basis of simple statistics on the behavior of users that visited the node in the past. We perform a theoretical and experimental study assessing that very simple heuristics can provide recommendations of good quality even in such a restrictive...
This paper studies the impact of intra-die random variability on low-power digital circuit designs, specifically, circuit timing failures due to intra-die variability. We identify a new low-Vdd statistical failure mode that is strongly supply-voltage dependent and also introduce a simple yet novel method for quantifying the effects of process variability on digital timing - a delay overlapping stage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.