首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The present paper is intended to discuss the satellite features which could lead to beneficial integration with IMT-Adv. The satellite roles are consistent with: (1) Navigation for Location Based Services (2) Earth observation for GIS-related applications/solutions and (3) Telecommunication. The development of the market is also boosted by the emerging synergies between navigation, communication and information technology in what is called “info-mobility”. The area of discussion is therefore quite wide and we can offer a survey trying to analyse only the aspect which are pertinent with the title of the paper. We therefore apologise if the reader cannot find all information he could be interested in, but we hope to have been capable to close just a bit of the enlarging gap between terrestrial and satellite interests.
Enrico SaggeseEmail:
  相似文献   

2.
Time‐Spread Multiple‐Access (TSMA) protocols are scheduled access protocols for mobile multi‐hop radio networks that guarantee deterministic access to the shared channel regardless of the possibility of radio interference. In scheduled access methods, time is considered to be slotted and time slots are cyclically organized into frames. In general, the shorter the frame, the more efficient the protocol. An Ω(log log n) lower bound is known on the minimum length of the frame of TSMA protocols in networks with n nodes. In this note we improve that lower bound by characterizing the multiple access to the radio channel as a combinatorial problem. The proposed characterization allows us to prove that no TSMA protocols can successfully schedule the transmissions of the nodes of a multi‐hop radio network in frames with less than log n time slots. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

3.
Users in OFDMA-based WiMAX are subject to Adaptive Modulation and Coding (AMC) which implies more robust and hence less frequency efficient modulation and coding for users experiencing bad radio conditions. When users are mobile, this implies lower throughput as they move away from the base station for instance. This may be acceptable for data users, but not for streaming ones which require a constant bit rate throughout the cell. We propose, in this work, a new QoS-oriented resource allocation strategy wherein streaming flows experiencing bad radio conditions are allocated more sub-carriers so as to keep their bit rate constant as they move around in the cell. The risk is however an increase in the dropping rate. To minimize the latter without increasing blocking too much, they are second subject to a state-dependent admission control scheme where the degree of acceptance depends on the density of the users in a given location. We develop an analytical model which allows us to derive some performance measures such as blocking and dropping probabilities. Our results quantify how these metrics vary with the load as well as the admission strategies.  相似文献   

4.
Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very secrecy of “secret” keys that cryptographers assume in designing secure protocols. In this article, we introduce a game-theoretic framework for modeling various computer security scenarios prevalent today, including targeted attacks. We are particularly interested in situations in which an attacker periodically compromises a system or critical resource completely, learns all its secret information and is not immediately detected by the system owner or defender. We propose a two-player game between an attacker and defender called FlipIt or The Game of “Stealthy Takeover.” In FlipIt, players compete to control a shared resource. Unlike most existing games, FlipIt allows players to move at any given time, taking control of the resource. The identity of the player controlling the resource, however, is not revealed until a player actually moves. To move, a player pays a certain move cost. The objective of each player is to control the resource a large fraction of time, while minimizing his total move cost. FlipIt provides a simple and elegant framework in which we can formally reason about the interaction between attackers and defenders in practical scenarios. In this article, we restrict ourselves to games in which one of the players (the defender) plays with a renewal strategy, one in which the intervals between consecutive moves are chosen independently and uniformly at random from a fixed probability distribution. We consider attacker strategies ranging in increasing sophistication from simple periodic strategies (with moves spaced at equal time intervals) to more complex adaptive strategies, in which moves are determined based on feedback received during the game. For different classes of strategies employed by the attacker, we determine strongly dominant strategies for both players (when they exist), strategies that achieve higher benefit than all other strategies in a particular class. When strongly dominant strategies do not exist, our goal is to characterize the residual game consisting of strategies that are not strongly dominated by other strategies. We also prove equivalence or strict inclusion of certain classes of strategies under different conditions. Our analysis of different FlipIt variants teaches cryptographers, system designers, and the community at large some valuable lessons:
  1. Systems should be designed under the assumption of repeated total compromise, including theft of cryptographic keys. FlipIt provides guidance on how to implement a cost-effective defensive strategy.
  2. Aggressive play by one player can motivate the opponent to drop out of the game (essentially not to play at all). Therefore, moving fast is a good defensive strategy, but it can only be implemented if move costs are low. We believe that virtualization has a huge potential in this respect.
  3. Close monitoring of one’s resources is beneficial in detecting potential attacks faster, gaining insight into attacker’s strategies, and scheduling defensive moves more effectively.
Interestingly, FlipIt finds applications in other security realms besides modeling of targeted attacks. Examples include cryptographic key rotation, password changing policies, refreshing virtual machines, and cloud auditing.  相似文献   

5.
The expected traffic safety and efficiency benefits that can be achieved through the development and deployment of vehicular ad-hoc networks has attracted a significant interest from the networking research community that is currently working on novel vehicular communication protocols. The time-critical nature of vehicular applications and their reliability constraints require a careful protocol design and dimensioning. To this aim, adequate and accurate models should be employed in any research study. One of the critical aspects of any wireless communications system is the radio channel propagation. This is particularly the case in vehicular networks due to their low antenna heights, the fast topology changes and the reliability and latency constraints of traffic safety applications. Despite the research efforts to model the vehicle-to-vehicle communications channel, many networking studies are currently simplifying and even neglecting the radio channel effects on the performance and operation of their protocols. As this work demonstrates, it is critical that realistic and accurate channel models are employed to adequately understand, design and optimize novel vehicular communications and networking protocols.  相似文献   

6.
In this paper we evaluate several routing protocols for mobile, wireless, ad hoc networks via packetlevel simulations. The ad hoc networks are multihop wireless networks with dynamically changing network connectivity owing to mobility. The protocol suite includes several routing protocols specifically designed for ad hoc routing, as well as more traditional protocols, such as link state and distance vector, used for dynamic networks. Performance is evaluated with respect to fraction of packets delivered, endtoend delay, and routing load for a given traffic and mobility model. Both small (30 nodes) and medium sized (60 nodes) networks are used. It is observed that the new generation of ondemand routing protocols use much lower routing load, especially with small number of peertopeer conversations. However, the traditional link state and distance vector protocols provide, in general, better packet delivery and endtoend delay performance.  相似文献   

7.
The specific anthropomorphic mannequin (SAM) phantom was designed to provide a conservative estimation of the actual peak spatial specific absorption rate (SAR) of the electromagnetic field radiated from mobile phones. However, most researches on the SAM phantom have been based on early phone models. Therefore, we numerically analyze the SAM phantom to determine whether it is sufficiently conservative for various types of mobile phone models. The peak spatial 1‐ and 10‐g averaged SAR values of the SAM phantom are numerically compared with those of four anatomical head models at different ages for 12 different mobile phone models (a total of 240 different configurations of mobile phones, head models, frequencies, positions, and sides of the head). The results demonstrate that the SAM phantom provides a conservative estimation of the SAR for only mobile phones with an antenna on top of the phone body and does not ensure such estimation for other types of phones, including those equipped with integrated antennas in the microphone position, which currently occupy the largest market share.  相似文献   

8.
《III》1997,10(1):18-22
The bright lights illuminating our world in a myriad of ways will increasingly be made of Group III nitride materials. Government and industry resources are rapidly being channelled into this upstart among a growing variety of “blue light” entries. As the giant opto manufacturers ramp-up into serious production mode, and the electronic device work starts looking progressively more production-worthy… and with GaN bulk growers emerging on the scene, perhaps it's time for a reality check.  相似文献   

9.
Today, the mobile phone industry witnesses important changes, shifting from a value chain to a burgeoning business ecosystem. This paper deals with the relationships that are at the very core of mobile OS ecosystems for IMTs (smartphones and PDA): Microsoft-OS, Symbian-OS, Palm-OS and RIM-OS over the period 1998–2006. Our study confirms that an ecosystem’s borders are unclear. More than half of our sample’ relationships are shared by at least two different ecosystems. The ecosystems we studied do not differ in terms of exclusive relationship which suggests that coopetitive strategies are particularly relevant in mobile platforms war.  相似文献   

10.
Smartphone use by adolescents is increasingly attracting the interest of social scientists, parents, and educational stakeholders (teachers, educators, educational policy makers), generally in a negative context. There are, however, many myths surrounding the issue, resulting from the reproduction of stereotypes about the psychosocial functioning of adolescents in cyberspace, as well as inadequately constructed research tools that measure how new media are used. This text is an attempt to show the phenomenon of problematic Internet use through the prism of screen time measured using real data from smartphones. The research was conducted in first half of 2022 among adolescents aged 13–19 in Bosnia and Herzegovina (N = 1185, mean age = 15.47 with standard deviation = 1.84). The research was implemented using a triangulation of tools such as the Smartphone Addiction Scale (SAS Scale), Software Installed on the Smartphone (SIS Scale), The Bergen Social Media Addiction Scale (BSMAS), and the Screen Time Scale (STS). From the data collected, it was noted that: 1) Screen time correlates weakly with problematic smartphone use and social networking; 2)The average period of smartphone use in the study group is 3 h49 minutes per day, of which 37 min are related to web browsing, while 2 h22 minutes are related to social networking; 3) A quarter of adolescents use a smartphone more than 5.5 h per day, of which more than 2 h15 minutes is screen time related to social media; 4) Approximately half of the respondents use smartphones slightly more than 2 h per day; 5) Girls use smartphones for longer than boys; 6) Place of residence (city or countryside) does not affect screen time; 7) Screen time is related to a medium degree to the type of software installed on the smartphone; 8) There is a need to refine the measurement methodology of screen time and to abandon self-declaration in this area.  相似文献   

11.
12.
How much time is needed for wideband spectrum sensing?   总被引:4,自引:0,他引:4  
In this paper, we consider a wideband cognitive radio network (CRN) which can simultaneously sense multiple narrowband channels and thus aggregate the perceived available channels for transmission. We study the problem of designing the optimal spectrum sensing time and power allocation schemes so as to maximize the average achievable throughput of the CRN subject to the constraints of probability of detection and the total transmit power. The optimal sensing time and power allocation strategies are developed under two different total power constraints, namely, instantaneous power constraint and average power constraint. Finally, numerical results show that, under both cases, for a CRN with three 6MHz channels, if the frame duration is 100ms and the target probability of detection is 90% for the worst case signal-to-noise ratio of primary users being ?12dB, ?15dB and ?20dB, respectively, the optimal sensing time is around 6ms and it is almost insensitive to the total transmit power.  相似文献   

13.
Cloud-based robotics systems leverage a wide range of Information Technologies (IT) to offer tangible benefits like cost reduction, powerful computational capabilities, data offloading, etc. However, the centralized nature of cloud computing is not well-suited for a multitude of Operational Technologies (OT) nowadays used in robotics systems that require strict real-time guarantees and security. Edge computing and fog computing are complementary approaches that aim at mitigating some of these challenges by providing computing capabilities closer to the users. The goal of this work is hence threefold: i) to analyze the current edge computing and fog computing landscape in the context of robotics systems, ii) to experimentally evaluate an end-to-end robotics system based on solutions proposed in the literature, and iii) to experimentally identify current benefits and open challenges of edge computing and fog computing. Results show that, in the case of an exemplary delivery application comprising two mobile robots, the robot coordination and range can be improved by consuming real-time radio information available at the edge. However, our evaluation highlights that the existing software, wireless and virtualization technologies still require substantial evolution to fully support edge-based robotics systems.  相似文献   

14.
15.
This paper describes the design and analysis of a low‐power medium access control (MAC) protocol for wireless/mobile ATM networks. The protocol – denoted EC‐MAC (energy conserving medium access control) – is designed to support different traffic types with quality‐of‐service (QoS) provisions. The network is based on the infrastructure model where a base station (BS) serves all the mobiles currently in its cell. A reservation‐based approach is proposed, with appropriate scheduling of the requests from the mobiles. This strategy is utilized to accomplish the dual goals of reduced energy consumption and quality of service provision over wireless links. A priority round robin with dynamic reservation update and error compensation scheduling algorithm is used to schedule the transmission requests of the mobiles. Discrete‐event simulation has been used to study the performance of the protocol. A comparison of energy consumption of the EC‐MAC to a number of other protocols is provided. This comparison indicates the EC‐MAC has, in general, better energy consumption characteristics. Performance analysis of the proposed protocol with respect to different quality‐of‐service parameters using video, audio and data traffic models is provided. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   

16.
17.
Ali  M. A.  Shami  A.  Assi  C.  Ye  Yinghua  Kurtz  Russ 《Photonic Network Communications》2001,3(1-2):7-21

Recent advances in optical networking technologies are setting the foundation for the next-generation data-centric networking paradigm, an “Optical Internet”. This work addresses one of the most challenging issues facing today's service providers and data vendors; how will the SONET/SDH-based legacy infrastructure currently in place make a graceful transition to the next generation networking paradigm?

A simplified, two-tiered architecture that requires two types of sub-systems will set the stage for a truly optical internet: service delivery platforms that enforce service policies; and transport platforms that intelligently deliver the necessary bandwidth to these service platforms. If IP can be mapped directly onto the WDM layer, some of the unnecessary network layers can be eliminated, opening up new possibilities for the potential of collapsing today's vertically layered network architecture into a horizontal model where all network elements work as peers to dynamically establish optical paths through the network. This paper presents a balanced view of the vision of the next-generation optical internet

The work presented here builds on the IETF multi-protocol lambda switching (MPλS) initiative and addresses the implementation issues of the path selection component of the traffic-engineering problem in a hybrid IP-centric DWDM-based optical network. An overview of the methodologies and associated algorithms for dynamic lightpath computation is presented. Specifically, we show how the complex problem of real-time provisioning of optical channels can be simplified by using a simple dynamic constraint-based routing and wavelength assignment (RWA) algorithm that compute solutions to three sub-problems: (a) routing; (b) constrained-based shortest-route selection; (c) wavelength assignment.

We present two different schemes for dynamic provisioning of the optical channels. The two schemes use the same dynamic lightpath computation approach proposed here, except that the third component, that is the wavelength assignment algorithm and its implementation, is different for each of the two schemes.

  相似文献   

18.
Virtual gifting and danmaku are important interactive behaviors in the course of game live streaming. Viewers send both gifts and danmaku enthusiastically while watching a game live stream. This study aimed to explore why viewers send danmaku or virtual gifts in the course of game live streaming. Five possible motivations and two types of behavioral patterns were identified. An online survey of game live streaming viewers in China was used to verify whether these motivations had an impact on their interactive behaviors. The results from 352 respondents showed that there were differences in the factors affecting danmaku and gifting interactions. Both the motivations and behavioral patterns had impacts on interactive behaviors such as virtual gifting and danmaku, but the nature of the impact differed.  相似文献   

19.
Millimetre wave (MMW) and THz wave (THz) applications are already employed in certain industrial and medical environments for non-destructive quality control, and medical imaging, diagnosis, and therapy, respectively. The aim of the present study is to investigate if published experimental studies (in vivo and in vitro) provide evidence for “non-thermal” biological effects of MMW and THz. Such effects would occur in absence of tissue heating and associated damage and are the ones that can be exploited for therapeutic medical use. The investigated studies provide some evidence for both MMW and THz that can influence biological systems in a manner that is not obviously driven by tissue heating. However, the number of relevant studies is very limited which severely limits the drawing of any far-reaching conclusions. Furthermore, the studies have not addressed specific interaction mechanisms and do not provide hints for future mechanistic studies. Also, the studies do not indicate any specific importance regarding power density levels, frequencies, or exposure duration. It is also unclear if any specific biological endpoints are especially sensitive. Any therapeutic potential of MMW or THz has to be evaluated based on future high-quality studies dealing with physical, bio-physical, and biological aspects that have specific health-related perspectives in mind.  相似文献   

20.
Computer vision: a source of models for biological visualprocesses?   总被引:1,自引:0,他引:1  
This paper reviews some basic computer vision techniques and speculates about their possible relevance to the modeling of human visual processes. Special emphasis is given to image segmentation techniques and how they relate to processes of perceptual organization, such as those embodied in the Gestalt "laws."  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号