The revolution of telecommunication mobile technology and the growing market of services and applications in the Internet have put more pressure on MNOs (Mobile Network Operators) in order to offer wireless and mobile...
详细信息
ISBN:
(纸本)9781467356121
The revolution of telecommunication mobile technology and the growing market of services and applications in the Internet have put more pressure on MNOs (Mobile Network Operators) in order to offer wireless and mobile broadband services. In SA (Saudi Arabia) there are 3 MNOs who have started in 2011 offering 4G services. In this paper we will give some description to 4G networks and make brief comparison of the performance of the three competing networks here in SA.
In this paper, Advanced High-Adaptive Image Coding (AHAIC) is proposed to increase compression performance for Frame Memory Reduction in LCD Overdrive. The AHAIC contains a new technique to improve the quality of deco...
详细信息
This paper develops a novel approach for multitarget tracking, called box-particle probability hypothesis density filter (box-PHD filter). The approach is able to track multiple targets and estimates the unknown numbe...
详细信息
This paper presents "DynFire," a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, ...
详细信息
This paper presents “DynFire,” a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, with par...
详细信息
This paper presents “DynFire,” a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, with particular focus on mobile users and users with restricted rights, such as subcontractors. The basic assumption behind DynFire is that, within a secured network domain separated from the Internet, we can establish a temporary binding between an IP address and a single user ID. Whenever a user connects to or disconnects from this secure network domain, firewalls are configured accordingly, using a centralized “Firewall Manager” and standardized signaling protocols.
This paper develops a novel approach for multi-target tracking, called box-particle intensity filter (box-iFilter). The approach is able to cope with unknown clutter, false alarms and estimates the unknown number of t...
详细信息
ISBN:
(纸本)9781849196246
This paper develops a novel approach for multi-target tracking, called box-particle intensity filter (box-iFilter). The approach is able to cope with unknown clutter, false alarms and estimates the unknown number of targets. Furthermore, it is capable of dealing with three sources of uncertainty: stochastic, set-theoretic and data association uncertainty. The box-iFilter reduces the number of particles significantly, which improves the runtime considerably. The low particle number enables this approach to be used for distributed computing. A box-particle is a random sample that occupies a small and controllable rectangular region of non-zero volume. Manipulation of boxes utilizes the methods from the field of interval analysis. Our studies suggest that the box-iFilter reaches an accuracy similar to a sequential Monte Carlo (SMC) iFilter but with much less computational costs.
The aviation community is currently working on the standardization of data communication systems for the future air traffic management. In this context, the International Civil Aviation Organization (ICAO) has initiat...
详细信息
ISBN:
(纸本)9781457713460
The aviation community is currently working on the standardization of data communication systems for the future air traffic management. In this context, the International Civil Aviation Organization (ICAO) has initiated a work on standardization of an IPv6-based aeronautical telecommunications network and on future radio access technologies, respectively. In this paper, we integrate L-Band Digital Aeronautical communications System Option 1 (L-DACS 1), which is one candidate for future radio access technologies, with realistic IPv6-based network layer functionality and analyze Deficit Round Robin (DRR) with fragmentation algorithm for the forward and return link in L-DACS 1. Our analysis mainly covers two application domains: file transfer and real-time services. We show that DRR with fragmentation scheduler provides good performance results in terms of throughput, delay, and bandwidth fairness.
In this paper, we propose Greedy with Path Optimization Routing (GPOR), a novel geographic routing protocol for wireless sensor networks. GPOR finds initial routing paths by following a greedy with recovery strategy, ...
详细信息
Link-16 is a tactical data link for providing information including tactical data link message necessary to a command and control unit. Even though current Link-16 transmits and receives only tactical data link messag...
详细信息
Motivated by certain recent problems in asynchronous communication, we introduce and study B(n, d, w), defined as the maximum number of length n binary sequences with minimum distance d, and such that each sequence ha...
详细信息
Motivated by certain recent problems in asynchronous communication, we introduce and study B(n, d, w), defined as the maximum number of length n binary sequences with minimum distance d, and such that each sequence has weight at least w. Specifically, we investigate the asymptotic exponential growth rate of B(n, d, w) with respect to n and with fixed ratios δ = d/n and ω = w/n. For ω ∈ [0, 1/2], this growth rate function b(δ, ω) is shown to be equal to a(δ), the asymptotic exponential growth rate of A(n, d)-the maximum number of length n binary sequences with minimum distance d. For ω ∈ (1/2, 1), we show that b(δ, ω) ≤ a(δ, ω) + f(ω), where a(δ, ω) denotes the asymptotic exponential growth rate of A(n, d, w), the maximum number of length n binary sequences with minimum distance d and constant weight w, and where f(w) is a certain function that satisfies 0 ω→1 f(ω) = lim ω→1/2 f(ω) = 0. Based on numerical evidence, we conjecture that b(δ, ω) is actually equal to a(δ, ω) for ω ∈ (1/2, 1). Finally, lower bounds on B(n, d, w) are obtained via explicit code constructions.
暂无评论