989 resultados para MOBILE RADIO
Resumo:
JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.
Resumo:
Spectrum scarcity demands thinking new ways tomanage the distribution of radio frequency bands so that its use is more effective. The emerging technology that can enable this paradigm shift is the cognitive radio. Different models fororganizing and managing cognitive radios have emerged, all with specific strategic purposes. In this article we review the allocation spectrum patterns of cognitive radio networks andanalyse which are the common basis of each model.We expose the vulnerabilities and open challenges that still threaten the adoptionand exploitation of cognitive radios for open civil networks.
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
The conditions for the analysis of selected doping substances by UHPSFC-MS/MS were optimized to ensure suitable peak shapes and maximized MS responses. A representative mixture of 31 acidic and basic doping agents was analyzed, in both ESI+ and ESI- modes. The best compromise for all compounds in terms of MS sensitivity and chromatographic performance was obtained when adding 2% water and 10mM ammonium formate in the CO2/MeOH mobile phase. Beside mobile phase, the nature of the make-up solvent added for interfacing UHPSFC with MS was also evaluated. Ethanol was found to be the best candidate as it was able to compensate for the negative effect of 2% water addition in ESI- mode and provided a suitable MS response for all doping agents. Sensitivity of the optimized UHPSFC-MS/MS method was finally assessed and compared to the results obtained in conventional UHPLC-MS/MS. Sensitivity was improved by 5-100-fold in UHPSFC-MS/MS vs. UHPLC-MS/MS for 56% of compounds, while only one compound (bumetanide) offered a significantly higher MS response (4-fold) under UHPLC-MS/MS conditions. In the second paper of this series, the optimal conditions for UHPSFC-MS/MS analysis will be employed to screen >100 doping agents in urine matrix and results will be compared to those obtained by conventional UHPLC-MS/MS.
Resumo:
A particular property of the matched desiredimpulse response receiver is introduced in this paper, namely,the fact that full exploitation of the diversity is obtained withmultiple beamformers when the channel is spatially and timelydispersive. This particularity makes the receiver specially suitablefor mobile and underwater communications. The new structureprovides better performance than conventional and weightedVRAKE receivers, and a diversity gain with no needs of additionalradio frequency equipment. The baseband hardware neededfor this new receiver may be obtained through reconfigurabilityof the RAKE architectures available at the base station. Theproposed receiver is tested through simulations assuming UTRAfrequency-division-duplexing mode.
Resumo:
This article summarizes the main achievementsof the Multi-Element Transmit andReceive Antennas (METRA) Project, an ISTresearch and technological development project carried out between January 2000 and June 2001 by Universitat Politècnica de Catalunya, the Center for Personkommunikation of Aalborg University, Nokia Networks, Nokia Mobile Phones, and Vodafone Group Research and Development.The main objective of METRA was the performanceevaluation of multi-antenna terminals incombination with adaptive antennas at the basestation in UMTS communication systems. 1 AMIMO channel sounder was developed that providedrealistic multi-antenna channel measurements.Using these measured data, stochasticchannel models were developed and properly validated.These models were also evaluated inorder to estimate their corresponding channelcapacity. Different MIMO configurations andprocessing schemes were developed for both theFDD and TDD modes of UTRA, and their linkperformance was assessed. Performance evaluationwas completed by system simulations thatillustrated the benefits of MIMO configurationsto the network operator. Implementation cost vs.performance improvement was also covered bythe project, including the base station and terminalmanufacturer and network operator viewpoints.Finally, significant standards contributionswere generated by the project and presented to the pertinent 3GPP working groups.
Resumo:
In this paper, the theory of hidden Markov models (HMM) isapplied to the problem of blind (without training sequences) channel estimationand data detection. Within a HMM framework, the Baum–Welch(BW) identification algorithm is frequently used to find out maximum-likelihood (ML) estimates of the corresponding model. However, such a procedureassumes the model (i.e., the channel response) to be static throughoutthe observation sequence. By means of introducing a parametric model fortime-varying channel responses, a version of the algorithm, which is moreappropriate for mobile channels [time-dependent Baum-Welch (TDBW)] isderived. Aiming to compare algorithm behavior, a set of computer simulationsfor a GSM scenario is provided. Results indicate that, in comparisonto other Baum–Welch (BW) versions of the algorithm, the TDBW approachattains a remarkable enhancement in performance. For that purpose, onlya moderate increase in computational complexity is needed.
Resumo:
The impact of curative radiotherapy depends mainly on the total dose delivered homogenously in the targeted volume. Nevertheless, the dose delivery is limited by the tolerated dose of the surrounding healthy tissues. Two different side effects (acute and late) can occur during and after radiotherapy. Of particular interest are the radiation-induced sequelae due to their irreversibility and the potential impact on daily quality of life. In a population treated in one center with the same technique, it appears that individual radiosensitivity clearly exists. In the hypothesis that genetic is involved in this area of research, lymphocytes seem to be the tissue of choice due to easy accessibility. Recently, low percentage of CD4 and CD8 lymphocyte apoptosis were shown to be correlated with high grade of sequelae. In addition, recent data suggest that patients with severe radiation-induced late side effects possess four or more SNP in candidate genes (ATM, SOD2, TGFB1, XRCC1 et XRCC3) and low radiation-induced CD8 lymphocyte apoptosis in vitro.
Resumo:
Localization, which is the ability of a mobile robot to estimate its position within its environment, is a key capability for autonomous operation of any mobile robot. This thesis presents a system for indoor coarse and global localization of a mobile robot based on visual information. The system is based on image matching and uses SIFT features as natural landmarks. Features extracted from training images arestored in a database for use in localization later. During localization an image of the scene is captured using the on-board camera of the robot, features are extracted from the image and the best match is searched from the database. Feature matching is done using the k-d tree algorithm. Experimental results showed that localization accuracy increases with the number of training features used in the training database, while, on the other hand, increasing number of features tended to have a negative impact on the computational time. For some parts of the environment the error rate was relatively high due to a strong correlation of features taken from those places across the environment.
Resumo:
Cooperative transmission can be seen as a "virtual" MIMO system, where themultiple transmit antennas are in fact implemented distributed by the antennas both at the source and the relay terminal. Depending on the system design, diversity/multiplexing gainsare achievable. This design involves the definition of the type of retransmission (incrementalredundancy, repetition coding), the design of the distributed space-time codes, the errorcorrecting scheme, the operation of the relay (decode&forward or amplify&forward) and thenumber of antennas at each terminal. Proposed schemes are evaluated in different conditionsin combination with forward error correcting codes (FEC), both for linear and near-optimum(sphere decoder) receivers, for its possible implementation in downlink high speed packetservices of cellular networks. Results show the benefits of coded cooperation over directtransmission in terms of increased throughput. It is shown that multiplexing gains areobserved even if the mobile station features a single antenna, provided that cell wide reuse of the relay radio resource is possible.
Resumo:
Langattoman laajakaistaisen tietoliikennetekniikan kehittyminen on herättänyt kiinnostuksen sen ammattimaiseen hyödyntämiseen yleisen turvallisuuden ja kriisinhallinnan tarpeisiin. Hätätilanteissa usein olemassa olevat kiinteät tietoliikennejärjestelmät eivät ole ollenkaan käytettävissä tai niiden tarjoama kapasiteetti ei ole riittävä. Tästä syystä on noussut esiin tarve nopeasti toimintakuntoon saatettaville ja itsenäisille langattomille laajakaistaisille järjestelmille. Tässä diplomityössä on tarkoitus tutkia langattomia ad hoc monihyppy -verkkoja yleisen turvallisuuden tarpeiden pohjalta ja toteuttaa testialusta, jolla voidaan demonstroida sekä tutkia tällaisen järjestelmän toimintaa käytännössä. Työssä tutkitaan pisteestä pisteeseen sekä erityisesti pisteestä moneen pisteeseen suoritettavaa tietoliikennettä. Mittausten kohteena on testialustan tiedonsiirtonopeus, lähetysteho ja vastaanottimen herkkyys. Näitä tuloksia käytetään simulaattorin parametreina, jotta simulaattorin tulokset olisivat mahdollisimman aidot ja yhdenmukaiset testialustan kanssa. Sen jälkeen valitaan valikoima yleisen turvallisuuden vaatimusten mukaisia ohjelmia ja sovellusmalleja, joiden suorituskyky mitataan erilaisten reititysmenetelmien alaisena sekä testialustalla että simulaattorilla. Tuloksia arvioidaan ja vertaillaan. Multicast monihyppy -video päätettiin sovelluksista valita tutkimusten pääkohteeksi ja sitä sekä sen ominaisuuksia on tarkoitus myös oikeissa kenttäkokeissa.
Resumo:
The objective of this master's thesis is to evaluate the optimum performance of sixsectored hexagonal layout of WCDMA (UMTS) network and analyze the performance at the optimum point. The maximum coverage and the maximum capacity are the main concern of service providers and it is always a challenging task for them to achieve economically. Because the optimum configuration of a network corresponds to a configuration which minimizes the number of sites required to provide a target service probability in the planning area which in turn reduces the deployment cost. The optimum performance means the maximum cell area and themaximum cell capacity the network can provide at the maximum antenna height satisfying the target service probability. Hexagon layout has been proven as the best layout for the cell deployment. In this thesis work, two different configurations using six-sectored sites have been considered for the performance comparison. In first configuration, each antenna is directed towards each corner of hexagon, whereas in second configurationeach antenna is directed towards each side of hexagon. The net difference in the configurations is the 30 degree rotation of antenna direction. The only indoor users in a flat and smooth semi-urban environment area have been considered for the simulation purpose where the traffic distribution is 100 Erl/km2 with 12.2 kbps speech service having maximum mobile speed of 3 km/hr. The simulation results indicate that a similar performance can be achieved in both the configurations, that is, a maximum of 947 m cellrange at antenna height of 49.5 m can be achieved when the antennas are directed towards the corner of hexagon, whereas 943.3 m cell range atantenna height of 54 m can be achieved when the antennas are directed towards the side of hexagon. However, from the interference point of view the first configuration provides better results. The simulation results also show that the network is coverage limited in both the uplink and downlink direction at the optimum point.
Resumo:
Toiminnanohjausjärjestelmien käyttö on muuttanut metsäteollisuuden kunnossapidon työntekijän toimenkuvaa kunnossapidon perustoiminnoista itseohjautuvampaan tietojen käsittelyyn ja jalostamiseen. Työn tavoitteena oliselvittää mobiilin työtilausjärjestelmän vaikutuksia metsäteollisuuden kunnossapidon kenttätyössä. Mobiilin työtilausjärjestelmän käyttö metsäteollisuuden kunnossapidossa mahdollistaa tärkeän kunnossapitotiedon keräämisen ja tarkentamisen kentällä, jossa se usein on ajanmukaisinta ja tarkinta. Haasteellisinta on oikeanlaisen teknologian löytäminen ja standardoiminen kunnossapidon toimintaympäristöihin. Myös organisaation toimintoprosessien on oltava selkeät ennen kuin prosesseja voidaan tehostaa teknologisin keinoin.