Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The method of key sharing between a mobile unit and a base station through a wireless MIMO-based fading channel is investigated. The description of a key distribution protocol is given. The expression to estimate the correct key bit agreement based on the use of guard interval is proved. Statistical properties of the key string are tested using the NIST criteria. Impossibility of key string eavesdropping...
The growing popularity of powerful mobile devices such as smart phones and tablet devices has resulted in the exponential growth of demand for video applications. However, due to the intensive computation of the video decoding process, mobile video applications require frequent embedded memory access, which consumes a large amount of power and limits battery life. Various low-voltage memory techniques...
An Android app has been developed to assist in the education of individuals in a science, technology, engineering, and mathematics (STEM) course of study. The Android Reflection Application provides students a means to determine distances to objects while allowing them the ability to manipulate signal envelopes, signal shapes, signal types, and frequency constraints. The convenient and intuitive graphical...
The Direction of Arrival (DOA) algorithms can estimate the incident angles of all the received signals impinging on the array. These algorithms give the DOAs of all the relevant signals of the user sources and interference sources. However, they are not capable of distinguish and identify which one is the direction of the desired user. In this paper, we propose to use a reference signal which is known...
Location-aware mobile sensors have fundamentally changed the ways radiation levels are detected and tracked. These changes have raised many exciting research questions related to nuclear forensics. This paper investigates the relationship between a mobile sensors' velocity and radiation counts. The study compares the correlations of the sensors' velocity and measurment radiation counts with a source...
The goal of this paper is to understand the patterns of mobile traffic consumption and reveal the correlations between human activities and mobile traffic patterns in the urban environment. This task is nontrivial in terms of three challenges: the complexity of mobile traffic consumption in large urban scale, the disturbance of abnormal events, and lack of prior knowledge about urban traffic patterns...
As the number of units in underwater sensor arrays grow, low-cost localization becomes increasingly important to maintain network scalability. Methods using ambient ocean noise are promising solutions because they do not require external infrastructure, nor expensive on-board sensors. Here we extend past work in stationary array element localization from correlations of ambient noise to a mobile sensor...
At present, many mobile video perception studies are intended to describe the degree of correlation between the influencing indicators, but most of them are based on the experience of experts, so the results are imperfect comparatively. In this paper, a mobile video perception assessment model based on the improved analytic hierarchy process (IAHP) is proposed by mapping the key quality indicators...
The wireless channel behaves markedly different depending on whether a line-of-sight (LOS) between transmitter and receiver exists or not. State-of-the-art wireless channel models for mobile communications, such as, IST WINNER-II and the 3GPP 3D channel model specified in TR 36.873, define distinct macro- and microscopic fading parameters for LOS and non-LOS (NLOS) situations. Whether a user is in...
We analyze a coupled dataset collecting the mobile phone communication and bank transactions history of a large number of individuals living in Mexico. After mapping the social structure and introducing indicators of socioeconomic status, demographic features, and purchasing habits of individuals we show that typical consumption patterns are strongly correlated with identified socioeconomic classes...
To cope with the severe energy challenges caused by incessant mobile network expansion, the multi-RAT cooperation energy-saving system (MCES) was developed to effectively improve the energy efficiency of mobile networks. MCES interacts with the radio access network in a real-time manner and can support multiple vendors' 2G/3G/4G RAN equipment. Therefore, amount of data have ushered in the application...
Security-sensitive behaviors in Android applications (apps for short) may or may not be malicious. We propose that a fundamental difference between malicious and benign behaviors is that their corresponding user intentions are different, i.e., whether there is an association between the app behavior and user intention. The user knows and wants this behavior to happen. Based on this discovery, we first...
With the continuous development of mobile Internet, the damage due to mobile security incidents is motivating system and security application to adopt protective mechanisms. Recent research has begun to focus on the correlation between personality traits and security-related behavior such as email phishing response. In practical instances of this security domain knowledge, acquiring the user's personality...
In the 21st Century, China's mobile communications has a huge space for development. The emergence of independent of the 4th generation mobile communication technology provides an unprecedented opportunity for the development of China's mobile communications. As the world's largest telecom operator, China Mobile Communications Corporation has become the leader of promoting China's 4th generation mobile...
Today, how to accurately predict the quality of experience (QoE) of the networking service is a very important issue for the network operator to optimize the service. However, due to the complex multi-dimensional characteristics of QoE, QoE estimation is extremely challenging. With utilizing the advantages of quality of service (QoS) in evaluating the networking performance, we exploit QoS/QoE correlation...
With the proliferation of smart phones, mobile applications (APPs) are increasingly being used for mobile work and entertainment. In order to satisfy people's various demands, there are enormous mobile applications being delivered through different mobile application markets. This brings markets owners huge opportunities and tough challenges simultaneously. It is very difficult to find proper APPs...
The brand industry sharing economy is a hot topic in academic sector. However, service providers who share their cars, houses with others remain unnoticed. This paper aims to investigate the service providers' perceived satisfaction and its influencing factors in sharing economy. Research samples were online mobile ride hail drivers in a China's cab-hailing app company. Drawn from previous literature...
A three-dimensional (3D) channel model for multiple-input multiple-output (MIMO) mobile communication system including field patterns of mutually uncoupled separated antennas is proposed. The model utilizes both geometrical and stochastic properties of propagation environment to describe fading correlation and simulate channel coefficients behavior over space and time. This approach gives more degrees...
Smartphones and other mobile devices are today pervasive across the globe. As an interesting side effect of the surge in mobile communications, mobile network operators can now easily collect a wealth of high-resolution data on the habits of large user populations. The information extracted from mobile network traffic data is very relevant in the context of population mapping: it provides a tool for...
Recently, the mobile devices are well integrated with Internet and widely used by normal users and organizations which employ Bring Your Own Device technology. On the other hand, the mobile devices are less protected in comparison to computers. Therefore, the mobile devices and networks have now become attractive targets for attackers. Amongst several types of mobile threats, the mobile HTTP Botnets...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.