992 resultados para Communications system


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Acknowledgements The first author has been supported by a Georg Forster Research Fellowship granted by the Alexander von Humboldt Foundation, Germany

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a secure full-duplex VoIP and instant messaging system on a Pocket PC platform, allowing for session key transport using a public-key protocol and encrypted text or voice communication using a private-key algorithm. The full-duplex VoIP scheme presents good performance for long duration communication over LAN networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"November 1968."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A phased-array antenna with switched-beam elements used to combat interference in an indoor wireless communication system is described. The array uses I-bit phase shifters applied to its elements in order to point its main beam in a desired direction and internal switching of elements in order to form nulls towards interference. The array's capability of suppressing interference is verified by studying its radiation patterns and by performing interference-rejection experiments in an indoor multipath environment. (c) 2005 Wiley Periodicals, Inc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system