B3G (Beyond Third Generation) network consists of access networks to provide heterogeneous network services for mobile users. In this paper, we propose a hierarchical policy-based architecture model and the policy pro...
详细信息
B3G (Beyond Third Generation) network consists of access networks to provide heterogeneous network services for mobile users. In this paper, we propose a hierarchical policy-based architecture model and the policy procedures based on access networks connected with B3G networks. We also present a dynamic traffic management scheme which uses DiffServ mechanism and SLA for the management of end-to-end QoS in access networks. At the end of this paper, we will analyze the performance of the proposed schemes through computer simulation.
This paper presents a development history of a wearable, scalable vibrotactile stimulus delivery system. This history has followed a path from desktop-based, fully wired systems, through hybrid approaches consisting o...
详细信息
One useful application of wireless networks is for secure group communication, which can be achieved by running a group key agreement (GKA) protocol. One well-known method of providing authentication in GKA protocols ...
详细信息
ISBN:
(纸本)9781424400546
One useful application of wireless networks is for secure group communication, which can be achieved by running a group key agreement (GKA) protocol. One well-known method of providing authentication in GKA protocols is through the use of digital signatures. Traditional certificate-based signature schemes require users to receive and verify digital certificates before verifying the signatures but this process is not required in ID-based signature schemes. In this paper, we present an energy-efficient ID-based authenticated GKA protocol and four energy-efficient ID-based authenticated dynamic protocols, namely join, leave, merge and partition protocol, to handle dynamic group membership events, which are frequent in wireless networks. We provide complexity and energy cost analysis of our protocols and show that our protocols are more energy-efficient and suitable for wireless networks.
In this paper, we present preliminary work we have done on designing the TactaPack, a wearable sensor/actuator device that uses a Bluetooth wireless connection to return sensor data to a host, and to receive commands ...
详细信息
In this paper, we present preliminary work we have done on designing the TactaPack, a wearable sensor/actuator device that uses a Bluetooth wireless connection to return sensor data to a host, and to receive commands to initiate expressive vibrotactile stimuli. We present our work in the context of a physical therapy application designed to provide more autonomy for patients when performing rehabilitative exercises. This assistive technology has the potential to reduce injuries during therapy due to improper patient joint movement, and decrease the workload of physical therapists, thereby reducing healthcare costs. Though still in the early stages of design, we believe the TactaPack can be used to produce systems that are less cumbersome than current, wired solutions, and simplify the creation of high-level applications by offloading from the CPU to the device the process of sensing, testing against threshold values, and actuation.
This paper presents an efficient fuzzy cognitive modeling which can handle granulation, organisation and causation. This cognitive modeling technique consists of multiple levels where the lowest level includes details...
详细信息
This paper presents an efficient fuzzy cognitive modeling which can handle granulation, organisation and causation. This cognitive modeling technique consists of multiple levels where the lowest level includes details required to make a decision or to transfer to the next stage. This fuzzy cognitive modeling will enhance the usability of fuzzy theory in modeling complex systems as well as facilitating complex decision making process based on ill structured or missing information or data.
This paper presents a comparative study between two groups from different cultural contexts, Sweden and Brazil, when choosing among risky prospects. The study explores whether there are differences in choice behaviour...
详细信息
This paper presents a comparative study between two groups from different cultural contexts, Sweden and Brazil, when choosing among risky prospects. The study explores whether there are differences in choice behaviours when the uncertainty in the prospects is expressed as interval estimates instead of the traditional use of point estimates, as well as when prospects are displayed with and without expected monetary values. Both groups display similar choice behaviours when they choose among prospects where uncertainty is expressed as point vs. interval estimates, whereas the Brazilian respondents are more affected by EMV information. The results indicate that the employment of intervals to represent uncertainty can be beneficial and could facilitate the elicitation part in the use and development of decision analytical tools. Furthermore, there is a need for more flexible tools, more adapted to a prescriptive approach, since people from different cultural contexts seem to differ in their choice behaviours.
Hierarchical Fuzzy Signatures are generalizations of the Vector Valued Fuzzy Set concept introduced in the 1970s. A crucial question in the Fuzzy Signature context is what kinds of aggregations are applicable for comb...
详细信息
Hierarchical Fuzzy Signatures are generalizations of the Vector Valued Fuzzy Set concept introduced in the 1970s. A crucial question in the Fuzzy Signature context is what kinds of aggregations are applicable for combining data with partly different substructures. Our earlier work introduced the Weighted Relevance Aggregation method to enhance the accuracy of the final results of calculations based on Hierarchical Fuzzy Signature Structures. In this paper, we further generalise the weights and the aggregation into a new operator called Weighted Relevance Aggregation Operator (WRAO). WRAO enhances the adaptability of the fuzzy signature model to different applications and simplifies the learning of fuzzy signature models from data. We also show the methodology of learning these aggregation operators from data.
This paper addresses the problem of stability for two-dimensional systems with delays in the state. To solve this problem, the Lyapunov second method is used. The resulting condition is written in terms of linear matr...
详细信息
This paper addresses the problem of stability for two-dimensional systems with delays in the state. To solve this problem, the Lyapunov second method is used. The resulting condition is written in terms of linear matrix inequalities and it is dependent on the size of delays. This fact allows us to reduce the conservatism in the stability analysis of two-dimensional systems with state delays. A simulation example is given to illustrate the theoretical developments
Electromagnetic theory is now a universal tool used in a wide variety of leading-edge applications such as nano-technology and environmental monitoring. Under the Technical Committee on Electromagnetic Theory (EMT), t...
详细信息
Electromagnetic theory is now a universal tool used in a wide variety of leading-edge applications such as nano-technology and environmental monitoring. Under the Technical Committee on Electromagnetic Theory (EMT), three investigating committees are now running to investigate particular subjects;namely, nanometer-electromagnetic waves and X-ray fields technology, natural electromagnetic phenomena and electromagnetic theory, and computational electromagnetics. Recent trends in these fields are briefly overviewed.
暂无评论