Next generation Vehicular Ad Hoc Network (VANET) needs seamless connectivity with high level of quality of services (QoS) and high data rates services. The complexity of VANET raises concern about the QoS and the reli...
详细信息
作者:
Massa, SilviaTesta, StefaniaDIST
Department of Communication Computer and System Science University of Genoa Genoa Italy DIP
Department of Industrial Engineering University of Genoa Genoa Italy
Traditionally, benchmarking has been described as a practice that promotes imitation. However, according to a more recent approach, this paper suggests that benchmarking, looking outside the firm boundaries and enabli...
详细信息
Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. A...
详细信息
IEEE 802.16e standard for mobile Worldwide Interoperability for Microwave Access (WiMAX), defines the implementation of hard handover. The standard covers the physical and MAC layer. To apply the layer 3 (L3) handover...
详细信息
ISBN:
(纸本)9781424455324
IEEE 802.16e standard for mobile Worldwide Interoperability for Microwave Access (WiMAX), defines the implementation of hard handover. The standard covers the physical and MAC layer. To apply the layer 3 (L3) handover protocol over the existing IEEE 802.16e layer 2 (L2) handover scheme, the fast mobile IPv6 was used by many researches, but long latency is main challenge for real-time applications. In this paper, to solve latency problem, an integrated scheme is proposed that it combines cross layer design and cross function optimization. The integrated scheme, bases on a pre-establish tunnels concept is dealt both, L2 handover in 802.16e and L3 handover in fast mobile IPv6 to effectively blend the relative messages of L2 and L3. The proposed scheme is compare with the scheme what standardized in IETF network working group (RFC5270). Analytic results prove that the proposed scheme can reduce not only handover latency but also packet losses.
This paper presents a room access monitoring system, which integrates computer and microcontroller MOTOROLA MC68HC1 1A8. Assembly language is used to program the microcontroller and Visual Basic 6 (VB) is used to deve...
详细信息
This paper presents the validation of optimized GPR mixture model based on the microwave nondestructive free space method in order to determine the density of road pavement. Density is an important parameter to determ...
详细信息
Preventive maintenance in the transformer is performed through a dif-ferential relay protection system,and it protects the transformer from internal and external ***,the Current Transformer(CT)in the differential prot...
详细信息
Preventive maintenance in the transformer is performed through a dif-ferential relay protection system,and it protects the transformer from internal and external ***,the Current Transformer(CT)in the differential protec-tion system mal-operates during inrush *** saturates due to magnetizing inrush currents and causes false tripping of the differential ***,iden-tification of tripping in protection relay either due to inrush current or internal faults needs to be *** the above problem,continuous monitoring of transformer breather and CT terminals with thermal camera helps detect the trip-ping in relay due to inrush or internal *** transformer’s internal fault leads to high breathing process in the transformer breather,never for inrush *** inrush currents,CT temperature is *** monitoring of breather and CT of the transformer through thermal imaging and radiometric pix-els detect the causes of CT saturation and differentiates *** wavelet threshold image analytics(HWT-IA)based radiometric pixels analysis of the transformer breather and CT after de-noising provides an accurate result of about 95%for identification of the false tripping of differential protection system of transformer.
Healthcare solutions through the introduction of wearable healthcare devices are benefitting from Internet of Things technology. Though these small form-factor wearable devices promise great benefits, guaranteeing lon...
详细信息
Psychological vital assessments are required for monitoring health conditions and observing body reactions toward diseases and medications. Wearable sensors play a vital role in sensing body vitals and presenting them...
详细信息
Fingerprint authentication is the most sophisticated method of all biometric techniques and has been thoroughly verified through various applications. Fingerprint matching has been done using several fingerprint recog...
详细信息
暂无评论