Cognitive radio (CR) is the enabling technology for dynamic spectrum access, which may potentially mitigate the radio spectrum scarcity problem encountered in many countries. this paper is concerned with power allocat...
详细信息
In early 20th century when technology evolve, the performance of systems suffered from the problems of complexity, increasing cost of maintenance and software of hardware failure caused by unpredictable behavior and p...
详细信息
For this study a P300 BCI speller application framework served as a base to explore the operation for three different applications. Subjects exchanged messages in the networks of (i) Twitter (Twitter Inc.) and sociali...
详细信息
ISBN:
(纸本)9783642216626;9783642216633
For this study a P300 BCI speller application framework served as a base to explore the operation for three different applications. Subjects exchanged messages in the networks of (i) Twitter (Twitter Inc.) and socialized with other residents in Second Life (Linden Lab) and (ii) controlled a virtual smart home. Although the complexity of the various applications varied greatly, all three applications yielded similar results which are interesting for the general application of BCI for communication and control: (a) icons can be used together with characters in the interface masks and (b) more crucially, the BCI system does not need to be trained on each individual symbol and allows the use of icons for many different tasks without prior time consuming and boring training for each individual icon. Hence such a type of BCI system is more optimally suited for goal oriented control amongst currently available BCI systems.
the increasing demand for shared awareness in multi-platform sensor systems requires advanced wireless information sharing techniques. the analysis of these techniques requires information about communication resource...
详细信息
this paper summarises the research on cooperative traffic information systems based on vehicular ad hoc networks. Such systems are a promising concept for exchanging traffic information among vehicles. their applicati...
详细信息
this paper summarises the research on cooperative traffic information systems based on vehicular ad hoc networks. Such systems are a promising concept for exchanging traffic information among vehicles. their application enables reductions in fuel consumption, greenhouse gas emissions and travel time. three classes of such systems are studied: infrastructureless solutions based on inter-vehicle communication, infrastructure-based solutions relying on the peer-to-peer paradigm and infrastructure-based systems using client-server architectures. systems within each class are briefly introduced and their strengths and weaknesses are analysed.
Nearly one third of all documented vehicle collisions are reported at urban and rural intersections, and this number continues to rise in spite of technological innovations for vehicle safety. Most collision avoidance...
详细信息
Nearly one third of all documented vehicle collisions are reported at urban and rural intersections, and this number continues to rise in spite of technological innovations for vehicle safety. Most collision avoidance systems currently under investigation are based on road-vehicle or inter-vehicle communication. However, reliability remains an issue, as high mobility often leads to message collisions and link breakage. In this paper reliable, real-time intersection collision avoidance (ICA) system based solely on infrastructure communication is proposed. ICA utilizes telematics and wireless sensor networks (WSN) to monitor approaching traffic, detect possible collision, and then transfer information to drivers, warning them of high collision probability.
Social networking is become important component of our daily lives. People use them to share important personal data. However, most users do not fully realize the security implications of using social networks. Furthe...
详细信息
Social networking is become important component of our daily lives. People use them to share important personal data. However, most users do not fully realize the security implications of using social networks. Furthermore, social networks are vulnerable to many security attacks. One major threat remains the alteration of data in social networks. In this paper we review several techniques to protect the content of data in social networking.
In Mobile Ad-hoc networks (MANET), the nodes intercommunicate through single-hop and multi-hop paths in a peer-to-peer fashion. Intermediate nodes between two pairs of communication nodes act as routers. thus, the rou...
详细信息
In Mobile Ad-hoc networks (MANET), the nodes intercommunicate through single-hop and multi-hop paths in a peer-to-peer fashion. Intermediate nodes between two pairs of communication nodes act as routers. thus, the routing protocols play an important role for construction of MANET. though the research of the routing protocol for MANET is actively done, most performance evaluations are evaluated via simulation. In this research, we implemented the zone-based routing protocol called ZRP and EZRP to real machines and evaluated by real environment. In the evaluation results, we showed that EZRP which is our proposed protocol has better performance than ZRP.
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. these networks are inherently vulnerable to security attacks from malicious users. th...
详细信息
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. these networks are inherently vulnerable to security attacks from malicious users. therefore, providing distinct security for ad hoc networks becomes a primary concern and requires several challenges to be achieved. One main challenge is how to manage public keys' certificates among ad hoc nodes. this paper introduces a fast and secure clustering scheme by select candidate's nodes using voting method, this method is to select certificates management node which manages certificates on behave of other nodes in ad hoc network.
the development of today's wireless technology with its sophisticated devices and applications has attracted many users and becoming more important in their daily life. Ad hoc networks have emerged from this techn...
详细信息
the development of today's wireless technology with its sophisticated devices and applications has attracted many users and becoming more important in their daily life. Ad hoc networks have emerged from this technology to provide new services to mobile users. In contrast with conventional wireless networks, ad hoc networks are not connected to any stationary infrastructure. Furthermore, the mobility functions, such as routing, connection's decisions and security managements, are performed by the nodes themselves independently. therefore, the security problem for mobile ad hoc networks is becoming one of the major issues that need to be solved. the security of ad hoc networks is based on certification authority (CA) which issues and manages security certificates and public keys for message encryption. this paper introduces a new method of detecting unauthorized intrusion that is used by malicious user who issues a forged certificate to join a group of ad hoc network. this method also eliminates unnecessary certificates exchange among users' nodes to reduce traffic flow inside the network.
暂无评论