... limitation of the model A remedy could be based on the principles of [25], where the rate function is elaborated by the introduction of a correlation between the SINR at the moment of choosing ... can be understood as a smart extension of snapshotbased tools with a time axis and with abstract, semianalytical models of RRM and QoS It allows self-tuning of parameters during the simulations ... c} Those aspects will be addressed in this work based on the principles introduced in [13] Although the focus of this work is on the introduction of the simulation framework, we will also give...
Ngày tải lên: 21/06/2014, 11:20
... “Performance evaluation of a Bluetooth -based WLAN adopting a polling protocol under realistic channel conditions,” International Journal of Wireless Information Networks on Mobile Ad Hoc Networks (MANETs): ... distance of 10 m, this results in a coherence time of about 12 seconds at Km/h Note that the coherence time of the fast fading can be an order of magnitude smaller than the coherence time of the ... error outage (PEO) Note that PEO represents a form of quality of service (QoS) -based outage probability when the QoS of interest is the PEP instead of the BEP usually considered for digital wireless...
Ngày tải lên: 22/06/2014, 22:20
Localization of Internet-based Mobile Robot.PDF
... Remote Control of Robots Over IP Networks. " M Betke, L Gurvits, "Mobile robot localization using landmarks", IEEE IEEE International Conference on Robotics and Manipulator," Proceedings of the 2007 ... number of network model of the robot is given by: parameters such as the time delay, the data loss Let Z, be the sampling period, a,.(k) and on(k) be the measurements of rotational speed of the ... of link; C is the speed of light; /,R is the routing speed of the i/' node; t:(k) is the delay caused by the i'i node's load; M is the amount of data; bi is the bandwidth of the i'' link; dnts...
Ngày tải lên: 24/06/2015, 08:17
Tài liệu Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs) ppt
... 4381 Security of BGP/MPLS IP VPNs February 2006 Security Requirements of VPN Networks Both service providers offering any type of VPN services and customers using them have specific demands for security ... additional security mechanisms such as IPsec over the MPLS infrastructure This document analyses only the security features of BGP/MPLS IP VPNs, not the security of routing protocols in general IPsec ... source of such a potential DoS attack Without dynamic routing between CEs and PEs, the security is equivalent to the security of ATM or Frame Relay networks 3.4 Label Spoofing Similar to IP spoofing...
Ngày tải lên: 14/02/2014, 16:20
The study of TCP performance in IEEE 802 11 based mobile ad hoc networks
... THE STUDY OF TCP PERFORMANCE IN IEEE 802.11 BASED MOBILE AD HOC NETWORKS LI XIA (B Sc., Nan Jing University, PRC ) A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF ELECTRICAL ... Improvement for route breakages in mobile networks 46 3.14 Improvement for throughput in mobile networks 48 vi 4.1 An example of fast-recovery process for TCP Reno ... routing protocols over mobile ad hoc networks are quite promising Several possible extensions of our research are addressed at the end of this thesis xi Abbreviations MANET Mobile Ad Hoc NETwork...
Ngày tải lên: 13/09/2015, 21:25
Tài liệu Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM docx
... accept the level of security that Frame-Relay and ATM offer as layer VPNs, however they might have concerns about the level of security that an MPLS based VPN offers The goal of this paper is ... forwarded based on the IP destination address, but rather based on labels that are pre-pended by the PE routers Similar to IP spoofing attacks, where an attacker replaces the source or destination IP ... site increasing the number of VCs to a total of n*(n-1)/2 where n = number of sites That increase in the number of VCs required also greatly increases the complexity of the network and the routing...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Wireless and Mobile Networks Security ppt
... purpose of this chapter is to recall the context of this book, which deals with the security of wireless and mobile networks Section 1.2 presents a state of the art of mobile cellular networks ... wireless and mobile networks It offers an up-to-date state of the art on existing security solutions in the market or prototype and research security solutions of wireless and mobile networks It ... WiMAX, WiMobile and WiRan, and the IP- based mobility communication such as Mobile IP or IMS Even if security solutions always need to be improved, the deployment of these wireless and mobile networks...
Ngày tải lên: 16/02/2014, 15:20
Tài liệu Event-based Social Networks: Linking the Online and Offline Social Worlds ppt
... concluded that participants in Meetup social events have social structures instead of just strangers meeting strangers Similar to event -based social networks, location -based social networks also contains ... involved EVENT -BASED SOCIAL NETWORKS In this section, motivated by popular event -based social services, we define event -based social networks and describe how to construct the networks from collected ... defined as ← 8PM Event -based Social Networks Definition Based on the event -based social services described above, we formulate a new type of social network, called an eventbased social network (EBSN)...
Ngày tải lên: 19/02/2014, 18:20
Báo cáo khoa học: Identification of small scale biochemical networks based on general type system perturbations pdf
... models of two small scale gene networks Following the conclusions, we present a detailed description of the method for least-squares identification of the Jacobian, and discuss the impact of the ... trade-off, in terms of effects of measurement uncertainty on the one hand and the effects of nonlinearities on the other hand, when choosing the size of parameter perturbations Impact of sampling ... and metabolic networks For metabolic networks, a good initial guess of the network structure is usually available from databases, such as KEGG [1], while the structures of gene networks usually...
Ngày tải lên: 07/03/2014, 17:20
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study ppt
... speeds of automobiles raise questions about the feasibility of eavesdropping In this section, we experimentally evaluate the range of TPMS communications and further evaluate the feasibility of tracking ... defibrillators: Software radio attacks and zero-power defenses In Proceedings of IEEE Symposium on Security and Privacy (2008), IEEE Computer Society, pp 129–142 OF T RANSPORTATION , B Number of vehicles ... NDERSON , D., S HACHAM , H., AND S AVAGE , S Experimental security analysis of a modern automobile In Proceedings of IEEE Symposium on Security and Privacy in Oakland (May 2010) [40] V ELUPILLAI...
Ngày tải lên: 23/03/2014, 10:20
Báo cáo " Security of information processing based on grid environment " pdf
... entry in RUIDB Framework of the proposed model In this section, we present the framework of the proposed security of information process model based on grid environment Based on the grid computing ... volume of data to send; (3) Change contents of plaintext; (4) Network transmission; where dd is the character skipped The length of symbol table N=1/2*(L-S-U) Huey-Ming-Lee et al / VNU Journal of ... Journal of Science, Natural Sciences and Technology 24 (2008) 170-178 175 EIPM User// Supervisor Information ERIC ESIC IEC IDC ESIC EPSIC EUIDB Supervisor Grid Node (S0) Fig Architecture of EIPM...
Ngày tải lên: 28/03/2014, 10:20
Báo cáo khoa học: "The Contribution of Stylistic Information to Content-based Mobile Spam Filtering" potx
... idea of counting word lengths to judge the authorship of texts, followed by Yule (1939) and Morton (1965) with the use of sentence lengths In this paper, we measure the overall byte length of SMS ... indicate the written style of texts for content -based mobile spam filtering We have also shown that the stylistic features are potentially useful in improving the performance of mobile spam filters This ... In Proceedings of COLING ’02, pages 1–7 T C Mendenhall 1887 The characteristic curves of composition Science, 9(214):237–246 A Q Morton 1965 The authorship of greek prose Journal of the Royal Statistical...
Ngày tải lên: 31/03/2014, 00:20
ip-based next-generation wireless networks systems, architectures and protocols
... of mobile services is illustrated in Figure 1.8 1.3 MOTIVATIONS FOR IP- BASED WIRELESS NETWORKS Wireless networks are evolving into IP- based mobile networks Is this worldwide march toward IP- based ... will support multiple types of radio access networks A broad range of mobile voice, data, and multimedia services will be provided over IP technologies to mobile users IP- based protocols will ... IP- based wireless networks offer a range of advantages over traditional circuitswitched wireless networks For example, IP- based networks are more suitable for supporting the rapidly growing mobile...
Ngày tải lên: 03/06/2014, 01:45
Báo cáo hóa học: "DRO: domain-based route optimization scheme for nested mobile networks" pdf
... Shin, HR You, Mobility management for All -IP mobile networks: mobile IPv6 vs proxy mobile IPv6 IEEE Wirel Commun 15(2), 36–45 (2008) 30 S Thomson, T Narten, IPv6 stateless address autoconfiguration, ... in Figures 17, 18, 19 and 20 networks [32], to indicate the ratio of the number of sessions per unit of time to the number of changes of location areas per unit of time for an MR The SMR is an ... protocol (DSR) for mobile ad hoc networks for IPv4, in IETF RFC 4728 (February 2007) Page 19 of 19 26 MC Chuang, JF Lee, DRO: domain -based route optimization scheme for nested mobile networks, in IEEE...
Ngày tải lên: 21/06/2014, 00:20
Báo cáo hóa học: " Design of zone-based bandwidth management scheme in IEEE 802.16 multi-hop relay networks" doc
... next time of BS bandwidth allocation Intra-zone handoff and inter-zone handoff Moreover, by introduction the idea of zone, two types of handoff between RSs are defined, intra-zone handoff and inter-zone ... Jonsson, C Perkins, Mobile IPv4 regional registration IETF RFC 4857, June 2007 37 JY Chen, CC Yang, LS Yu, HH-MIP: an enhancement of mobile IP by home agent handover EURASIP J Wireless Commun ... World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2008, pp 1–8 27 S Ann, KG Lee, HS Kim, A path selection method in IEEE 802.16j mobile multi-hop relay networks in Proceedings of...
Ngày tải lên: 21/06/2014, 03:20
Báo cáo hóa học: " Research Article Impact of LQI-Based Routing Metrics on the Performance of a One-to-One Routing Protocol for IEEE 802.15.4 Multihop Networks" docx
... multiplying the packet delivery rates of each link, the principle behind this routing metric is to maximize the PDR However, the computation of the link cost leads to a loss of accuracy of the ... function of the LQI of the link The link cost is an estimate of the number of transmission attempts required for successful frame delivery in a link The path cost is the sum of the link costs of the ... routing metrics enable the calculation of the cost of a path, based on the LQI values of all links Therefore, we chose to evaluate the performance of these LQI -based routing metrics for NST-AODV...
Ngày tải lên: 21/06/2014, 11:20
báo cáo hóa học:" Performance assessment of IP over vehicular delay-tolerant networks through the VDTN@Lab testbed EURASIP Journal on Wireless Communications and Networking 2012, 2012:13 " pptx
... source-to-destination often does not exist The related literature offers several available approaches to solve the problem of providing communication in vehicular networks Vehicle ad hoc networks (VANETs) ... and analysis of disconnected vehicular networks It will implement the VDTN architecture and demonstrate the applicability of VDTNs in a variety of application scenarios Overview of the VDTN testbed ... assuming a scale of 1:50 (1 m in the laboratory testbed 18 represents 50 m in a real scenario), Mobile node moves at 48 km/h, mobile node at 40 km/h, mobile at 36 km/h, and mobile node at 24...
Ngày tải lên: 21/06/2014, 17:20
Báo cáo hóa học: " Research Article Cross-Layer Resource Scheduling for Video Traffic in the Downlink of OFDMA-Based Wireless 4G Networks" docx
... utilization of the resources and hence the performance of the network can be enhanced by making use of the multiuser diversity provided by the multiple access scheme being used Also, such networks ... time-frequency resource unit in OFDMA is denoted as a chunk It consists of a rectangular timefrequency area that comprises a number of subsequent OFDM symbols and a number of adjacent subcarriers Packets ... multicarrier OFDMA systems [12] The motivation behind this modification was to incorporate the design and performance requirements of the scheduler in 4G networks into the original scheme In such networks, ...
Ngày tải lên: 21/06/2014, 23:20
Báo cáo hóa học: " Research Article Interference Robust Transmission for the Downlink of an OFDM-Based Mobile Communications System" docx
... 3GPP LTE standard [1] The sampling rate of 1/Ts = 7.68 MHz, the number of 512 subcarriers, the OFDM subcarrier bandwidth of 15 kHz, and the number of OFDM symbols per block, respectively, conform ... Number of subcarriers System bandwidth B Code rates Rc Interleaving depth IB Channel model Maximum channel excess delay Number of interferers J OFDM sample spacing OFDM symbol duration Length of ... The aim of this section is to provide a fundamental understanding of the performance of the SAIC scheme by deriving the BEP and comparing it to that of corresponding QAM schemes The number of interferers...
Ngày tải lên: 22/06/2014, 06:20
Báo cáo hóa học: " Research Article Interference Robust Transmission for the Downlink of an OFDM-Based Mobile Communications " pptx
... 3GPP LTE standard [1] The sampling rate of 1/Ts = 7.68 MHz, the number of 512 subcarriers, the OFDM subcarrier bandwidth of 15 kHz, and the number of OFDM symbols per block, respectively, conform ... Number of subcarriers System bandwidth B Code rates Rc Interleaving depth IB Channel model Maximum channel excess delay Number of interferers J OFDM sample spacing OFDM symbol duration Length of ... The aim of this section is to provide a fundamental understanding of the performance of the SAIC scheme by deriving the BEP and comparing it to that of corresponding QAM schemes The number of interferers...
Ngày tải lên: 22/06/2014, 19:20