1000 resultados para mobile intranet


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple distributed power control algorithm for communication systems with mobile users and unknown time-varying link gains is proposed. We prove that the proposed algorithm is exponentially converging. Furthermore, we show that the algorithm significantly outperforms the well-known Foschini and Miljanic algorithm in the case of quickly moving mobile users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time  embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile phones offer a new marketing channel, but socially there are concerns about their intrusiveness. Marketers need to understand the social etiquettes governing their use in order to exploit their value. In addition, the use of mobiles whilst driving is the cause of car accidents and is illegal in some parts of the world. A study of 893 United States, Australian and Chinese tertiary students showed that there was widespread but not universal agreement that usage was inappropriate in places of worship, classrooms and libraries or while driving a car. Australian and Chinese students were more tolerant of mobile usage than Americans in most situations, apart from use while driving. The study showed a conflict between actual driving behaviour and views on the desirability of using mobiles while driving. The persistence of talking while driving should be a concern to those who promote road safety. Use of SMS was more broadly tolerated in class and in picture theatres than was speaking on a mobile phone. The use of inbound and outbound telemarketing is limited by the social etiquettes discovered. Further research into tolerable mobile behaviour in various public and private spaces is required in order to make best use of this marketing medium.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electronic negotiation (e-negotiation) is a major activity in e-Commerce applications. Agent-based e-negotiation has recently received increasing attention. However, agent-based electronic negotiation suffers from a number of security attacks. In this paper, we present a mobile agent-based e-commerce framework. We also propose a security protocol that protects the information exchanged between the mobile agents during e- negotiations. We reason the correctness of the proposed security protocol in the presence of various security threats. The reasoning shows that the protocol maintains privacy, non- repudiation, authenticity, anonymity, and strong integrity of exchanged information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Teleoperation has been used in many applications, allowing a human operator to remotely control a robotic system in order to perform a particular task. Recently haptic teleoperation has focused mainly on improving performance in remote manipulation tasks, however the haptic approach offers similar advantages for teleoperative control of the motion of a mobile robot. This paper describes a prototype system designed to facilitate haptic teleoperation of an all-terrain, articulated track mobile robot. This system utilizes a multi-modal user interface intended to improve operator immersion, reduce operator overload and improve teleoperative task performance. The system architecture facilitates implementation of an application-specific haptic augmentation algorithm in order to improve operator performance in challenging real-world tasks. The contributions of this work can be categorized as the custom mobile platform, teleoperator interface and haptic augmentation strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current penetration of mobile phones in Australia is 92% and it records one of the world’s highest rates of ownership among children under 18. The paper reviews the literature on mobile phones and Australian children and examines the various discourses dominating the public debates; the systematic frames used in these discourses; and whose interests are served in the process. The frames discussed fall under the optimistic (gains); pessimistic (losses, costs or harms); pluralistic (technology per se is neutral but how it is used matters); historical development (skills learnt and the importance of using mobiles); futuristic predictions (promises and dangers for the future); current uses (connectivity, convergence and interactivity); and the techno-realist view (as a mixed blessing) views of technology. Taking the critical perspective and borrowing from Joshua Meyrowitz, the paper illustrates how mobile phones have eroded parental power over how, when, where and with whom their children communicate, surpassing adult supervision, intervention or knowledge, while at the same time, becoming a ‘digital leash’ for parents to re-establish their control an d an ‘umbilical cord’ for their off spring to remain connect! ed with parents, at all times.