The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Voice traffic termination fraud, often referred to as Subscriber Identity Module box (SIMbox) fraud, is a common illegal practice on mobile networks. As a result, cellular operators around the globe lose billions annually. Moreover, SIMboxes compromise the cellular network infrastructure by overloading local base stations serving these devices. This paper analyzes the fraudulent traffic from SIMboxes...
Multirate multicast improves user quality but complicates network optimization. This paper introduces a novel control scheme to dynamically optimize multirate multicast. We present MMT, an adaptive policy which combines differential backlog scheduling and intelligent packet dropping, both based on local information. MMT is shown to maximize network throughput by adapting to changing conditions such...
For wireless networks, coverage with different restrictions that can capture the practical requirements have received great research interests. We will study several restricted coverage problems. The first problem is about K-coverage, i.e., how to deploy wireless nodes such that each target is covered by at least K wireless nodes. We study the problem restricted to linear-A"-coverage where there...
In this paper, we develop a hierarchical Bayesian game framework for automated dynamic offset selection. Users compete to maximize their throughput by picking the best locally serving radio access network (RAN) with respect to their own measurement, their demand and a partial statistical channel state information (CSI) of other users. In particular, we investigate the properties of a Stackelberg game,...
In this paper, the problem of uplink user association in small cell networks, which involves interactions between users, small cell base stations, and macro-cell stations, having often conflicting objectives, is considered. The problem is formulated as a college admissions game with transfers in which a number of colleges, i.e., small cell and macro-cell stations seek to recruit a number of students,...
This article presents the implementation of an Electroencephalogram — EEG system less susceptible to electromagnetic interference — EMI. The amplification, filtering and A/D conversion are placed directly over each electrode. Due to the local amplification and conversion, the system becomes more resilient to EMI and consequently the results are trustier. It was developed a central chip or hub that...
People of different religions from all over the world perform the Pilgrimage ritual at least once in their life time. During such event millions of visitors every year gather in their holy places and they all move from one site to another throughout few days. Such a massive gathering, where people are walking shoulder by shoulder, has been an on-going challenge to Governments who strive to make this...
Wireless sensor network (WSN) are mobile adhoc networks in which sensors have limited resources and communication capabilities. Creating pair-wise secure links between resource constrained (battery, bandwidth, large geographical area) sensor nodes is a major challenge. In this paper, Blom key management scheme is exhaustively studied on different parameter and finally a comparatively analysis is done.
In this paper, the concept for a radio frequency identification (RFID) enabled student workbook is discussed and a prototype system developed. The workbook is a question-answer notebook in traditional paper format in which hand written solutions to student assignments are written. An embedded RFID tag in the workbook is then used for the student to store his/her solution to the attempted assignment...
The acquired images in real time scenario are mixed in most cases. The separation of these mixed images is very critical since the number of components mixed and the pattern of mixing are unknown. With these unknown parameters, BSS (Blind Source Separation) plays a vital role in separation of the image mixtures. ICA, one of the widely used techniques of BSS provides better separation by finding the...
Wireless Sensor Networks have received fabulous attention in recent years because of the growth of sensor device as well as wireless communication technologies. These networks are typically deployed in remote environment and the nodes are deployed with non-rechargeable batteries, so that the network lifetime is of crucial importance to a WSN. Cluster-Head node election in each round can severely reduce...
In human brain, either in the state of wakefulness or sleeping, different frequency changes are observable in the spectrum of measured electric signals of the brain. Regarding the frequency components of these signals that occur as a consequence of this electric activity, different brain waves can be distinguished. The electric impulse alternations that generated during the operation of neurons can...
To reach the high depths of knowledge and expertise which are required nowadays, scientists focus their attention on minute areas of study. However, the most complex problems faced by scientists still need the application of different disciplines to tackle them, which creates a necessity for multi-disciplinary collaboration. Cryptology is naturally multidisciplinary field, drawing techniques from...
We are now witnessing the beginning of Ubiquitous Computing era with the success of several start up to find early adopters among the general public for their home automation solutions through crow funding campaigns. We believe that in the near future, more and more people will come out with new ideas in relation with ubiquitous computing to make our daily life more and more easy. However, most of...
The growth of wireless technology and tablet PC in this era is creating a great impact on our lives. Some early efforts have been made to combine and utilize both of these technologies in advancement of hospitality industry. Nowadays, the majority of restaurants are still operating in an old fashioned way, by using pen and paper to register the orders of customers. The problem using "traditional...
This paper presents a series of labs in where the performance of practical WLAN technology is evaluated by using PCATTCP software. The experiments can be summarized as follows: Measurement of the throughput as a function of the number of users and network configuration, offered load (sharing efficiency/ fairness). Comparison between the throughput of TCP protocol, and the throughput of UDP Protocol...
In order to build an electricity information collection system with the satisfied communication performance in the smart grid, it is essential to evaluate the communication performance for low-voltage power line carrier communication (PLC), RS485 communication and short range wireless communication used widely in the electricity information collection system. A communication performance test platform...
An integrative remote testing system of gyro was designed and implemented, subject to requirements such as fine real-time performance, high precision, high reliability, etc. The system is developed for physical simulation of remote wireless data acquisition for altitude information in aircraft navigation & control system and engineering application. In the testing system, rotary table was...
In recent years, the technology is playing an increasing role in the health care provided to patients, the proposed prevention to the population and the dedicated services for dependent persons due to an illness or a disability. This technology is derived from multidisciplinary fields, combining the research laboratories in Mathematics, Science and Information, Communication Technologies and so on…...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.