The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the ubiquitous Internet applications brought by widespread popularity of smart device, an exhaustive understanding of user behavior is becoming essential for Internet Service Providers (ISPs) to implement network management and resource optimization. Existing researches on mobile user behavior principally focus on studying people's application interests and mobility properties, especially characterizing...
Robust object tracking is a challenging computer vision problem due to dynamic changes in object pose, illumination, appearance and occlusions. Tracking objects between frames requires accurate matching of their features. We investigate real time matching of mobile object features for frame to frame tracking. This paper presents a new feature matching approach between objects for tracking that incorporates...
Efficient energy planning is a key feature for the future smart cities. The real-time optimization of the energy distribution and storage is the real added value for smart grid and cities. However, the available energy providers' infrastructures are not able to estimate and predict real-time fluctuation of the energy demand and are not scalable enough to integrate, with low cost and effort, hardware...
Keeping in mind technological trends and student behaviour, higher educational institutes are adopting major changes in content delivery. The objective is to keep students engaged in the courses that they learn, which in turn would help them perform better academically. This paper describes students' online engagement in terms of their learning, participation and academic performance after teaching...
Wi-Fi offloading is one of the most effective approaches to relieve the cellular radio access from part of the burgeoning mobile demand. To date, Wi-Fi offloading has been mainly leveraged in limited contexts, such as home, office or campus environments. In this paper, we investigate the scaling properties of Wi-Fi offloading, by studying how it would perform on a much larger scope than those considered...
In India cellular communication scenario, the term MNP or Mobile Number Portability is becoming more popular. The mobile operators are forced to adapt the Herbert Spencers theory on Survival of the fittest. MNP allows the customer to transfer their existing number from one mobile network provider to another. Thus, if a customer is dissatisfied by the services provided by a mobile operator the customer...
The need for secured communication between computationally weak wireless devices has driven the development of novel key generation protocols. Various schemes for extracting symmetric cryptographic keys out of wireless channel properties have been proposed during recent years, making the generation protocol more and more efficient for individual applications. However, often these schemes were evaluated...
This paper applies stochastic geometry to model the distribution of downlink transmit power in macro base stations in mobile networks. Using data from cellular 3G deployments in the UK, we find, through hypothesis tests, that the maximum transmit powers of base stations in urban environments are independent of both the local density of base stations and the transmit power of adjacent base stations...
Data hiding schemes using complete complementary codes have been developed for image and audio signals. It has been shown that a high payload and a low bit-error-rate can be achieved by such data hiding strategies because of the ideal auto-and cross-correlation properties of complete complementary codes. The authors have proposed an emergency broadcasting system based on the data hiding scheme using...
this paper focuses on the study of electric field spatial variability in the context of mobile telephony base stations exposure. Electric field is computed using a Uniform Theory of Diffraction (UTD) based simulation technique suitable for large urban areas. Two complementary approaches of spatial variability are proposed here. One based upon spatial autocorrelation and the other one on statistical...
Channel randomness can be exploited to generate secret keys. However, to ensure secrecy, it is necessary that the channel response of any eavesdropping party remain sufficiently de-correlated with that of the legitimate users'. In this paper, we investigate whether such de-correlation occurs for a body area network (BAN) operating in an indoor environment at 2.45 GHz. The hypothetical BAN configuration...
The paper presents methodology for analyzing compliance of Impulse Radio Ultra-Wideband (IR-UWB) communications systems with regulatory limits specified by US Federal Communications Commission (FCC). First, discrete spectral component that reduce Effective Isotropic Radiated Power (EIRP) in IR-UWB spectrum are analyzed in an exemplary IRUWB system. After that, a minimal Pulse Repetition Frequency...
This study employed the correlation coefficients analysis of time sequence, spectrogram, and auto-regression model of signals which were the lung sounds of subject end, and distant end where the sound was transmitted by mobile-to-mobile communication. The results presented that the correlation coefficients of time sequence, spectrogram, 4-order coefficients of auto-regression model were 0.36, 0.69,...
Obtaining the certain knowledge is becoming increasingly difficult with information expansion. While massive data accumulated on the e-learning platform usually weren't utilized. This paper provides a knowledge recommendation solution by taking advantage of the usual e-learning platform's massive data to build a blending network. The blending network, namely social knowledge network, takes the learners...
In recent years, the prevalence of voice disorders has been increasing dramatically, mainly due to unhealthy lifestyles and voice abuse. An impairment in the ability to produce the sound of the voice is indicated by the medical term Dysphonia. This disorder impacts on the quality of life of the population in general, but especially of professional voice users, like teachers or singers, for whom dysphonia...
The field of mobile learning is in the process of rapid growth. While we can easily identify characteristics, which separate mobile learning from other forms of learning, a review of the academic field yielded few accepted standards, frameworks and systems, which application developers can reference when building applications. The focus of this paper is to continue the research into quality assessment...
Mobile marketing is a relatively easy and inexpensive way to promote products. This paper evaluates influential factors that motivate consumers in responding to mobile marketing with the consideration of context receiving time and location. A mobile marketing context model, with Technology acceptance model (TAM) and Commitment-trust Theory being adopted, is developed to facilitate purchasing intention...
Uganda's maternal mortality ratio persists at 435/100,000 live births. Progress towards the country's target ratio of 131/100,000 live births, as derived from Millennium Development Goal five remains slow. Mobile phones usage by women and midwives has created opportunities for improving maternal and child healthcare. Despite the promise of mobile health on clinical outcomes, the adoption of mobile...
There are well-known attack techniques that threaten current apps stores. However, the complexity of these environments and their high rate of variability have prevented any effective analysis aimed at mitigating the effects of these threats. In this paper, the analysis performed over one of these techniques, Shuabang, is introduced. The completion of this analysis has been supported by a new tool...
Here we present and develop a receiver capable of capturing two RF channels at the same time with a single RF front end and only one IF stage. The idea is to use a low IF digital image rejection receiver that can separate two adjacent RF channels with a negligible cochannel's image interference. We analyze two procedures of compensating, in the IF range, any gain and phase misadjustment generated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.