首页 > 最新文献

Int. J. Handheld Comput. Res.最新文献

英文 中文
Coherent Passive Backscatter Communications Using Ambient Transmitters 使用环境发射机的相干无源后向散射通信
Pub Date : 2014-04-01 DOI: 10.4018/ijhcr.2014040102
W. Barott, Kevin M. Scott
A communications method is presented based on the backscatter modulation of incident radio frequency signals using low-complexity tags. The incident signals arise from digital television stations used as illuminators of opportunity. A receiver detects the tag using coherent processing algorithms similar to those used in passive radar, extending the detection range over published noncoherent techniques. This method enables shared use of the UHF television band for low-data-rate applications. While analyses suggest that rates exceeding 1 kbps might be achievable at 1 km range, experimental results demonstrate the challenges in designing and implementing such a system.
提出了一种基于低复杂度标签对入射射频信号进行反向散射调制的通信方法。事故信号来自数字电视台,用作机会的照明器。接收器使用类似于无源雷达中使用的相干处理算法检测标签,在已发布的非相干技术上扩展了检测范围。这种方法可以为低数据速率应用共享使用UHF电视频段。虽然分析表明,在1公里范围内可以实现超过1kbps的速率,但实验结果表明,在设计和实施这种系统时存在挑战。
{"title":"Coherent Passive Backscatter Communications Using Ambient Transmitters","authors":"W. Barott, Kevin M. Scott","doi":"10.4018/ijhcr.2014040102","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040102","url":null,"abstract":"A communications method is presented based on the backscatter modulation of incident radio frequency signals using low-complexity tags. The incident signals arise from digital television stations used as illuminators of opportunity. A receiver detects the tag using coherent processing algorithms similar to those used in passive radar, extending the detection range over published noncoherent techniques. This method enables shared use of the UHF television band for low-data-rate applications. While analyses suggest that rates exceeding 1 kbps might be achievable at 1 km range, experimental results demonstrate the challenges in designing and implementing such a system.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Illustration of Centralized Command and Control for Flocking Behavior 群集行为的集中指挥与控制实例
Pub Date : 2014-04-01 DOI: 10.4018/ijhcr.2014040101
Sami Oweis, S. Ganesan, K. Cheok
Flocking is a term that describes the behavior of a group of birds a "flock" in flight, or the swarming behavior of insects. This paper presents detailed information about how to use the flocking techniques to control a group of embedded controlled systems-''Boids''-such as ground systems robotic vehicles/ swarm robots. Each one of these systems collectively moves inside/outside of a building to reach a target. The flocking behavior is implemented on a server-based control, which processes each of the boids' properties e.g. position, speed & target. Subsequently, the server will assign the appropriate move to a specific boid. The calculated information will be used locally to control and direct the movements/flocking for each boid in the group. A simulation technique and detailed flow chart is presented. In addition to Reynolds three original rules for flocking, two other rules-targeting obstacle avoidance-are presented-. Our result shows that the obstacles' avoiding rule was utilized to ensure that the flock didn't collide with obstacles in each of the boids' paths.
群集是一个描述一群鸟的行为的术语,“鸟群”在飞行中,或者昆虫的群集行为。本文详细介绍了如何使用群集技术来控制一组嵌入式受控系统-“Boids”-如地面系统,机器人车辆/群机器人。这些系统中的每一个都在建筑物内外移动,以达到目标。群集行为是在基于服务器的控件上实现的,该控件处理每个boids的属性,例如位置,速度和目标。随后,服务器将把适当的移动分配给特定的节点。计算出的信息将在本地用于控制和指导组中每个实体的移动/群集。给出了仿真技术和详细流程图。除了雷诺兹的三个原始规则外,还提出了另外两个规则——目标避障规则。结果表明,利用避障规则可以保证鸟群在每条路径上不与障碍物发生碰撞。
{"title":"Illustration of Centralized Command and Control for Flocking Behavior","authors":"Sami Oweis, S. Ganesan, K. Cheok","doi":"10.4018/ijhcr.2014040101","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040101","url":null,"abstract":"Flocking is a term that describes the behavior of a group of birds a \"flock\" in flight, or the swarming behavior of insects. This paper presents detailed information about how to use the flocking techniques to control a group of embedded controlled systems-''Boids''-such as ground systems robotic vehicles/ swarm robots. Each one of these systems collectively moves inside/outside of a building to reach a target. The flocking behavior is implemented on a server-based control, which processes each of the boids' properties e.g. position, speed & target. Subsequently, the server will assign the appropriate move to a specific boid. The calculated information will be used locally to control and direct the movements/flocking for each boid in the group. A simulation technique and detailed flow chart is presented. In addition to Reynolds three original rules for flocking, two other rules-targeting obstacle avoidance-are presented-. Our result shows that the obstacles' avoiding rule was utilized to ensure that the flock didn't collide with obstacles in each of the boids' paths.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Piecewise Linear Time-Varying Model for Modeling the Charging and Discharging Processes of a Lithium-Ion Battery 锂离子电池充放电过程的分段线性时变模型
Pub Date : 2014-04-01 DOI: 10.4018/ijhcr.2014040106
Arab AlSharif, M. Das
A piecewise linear, time-varying model for modeling the charging and discharging processes of Li-ion batteries is introduced in this paper. Such a model consists of a group of piecewise linear model segments, whose parameters are adapted online over time. Thus, the combined overall model is capable of modeling nonlinear time-varying processes, such as a Li-ion battery charging and discharging processes, quite well. Modeling results of both simulated test data and actual test data gathered from a high-power automotive-grade Li-ion cell are presented. The close matches between actual and model-predicted behaviors demonstrate the effectiveness of the proposed modeling approach and indicate the potential usefulness of such models for a battery management system.
本文介绍了一种分段线性时变锂离子电池充放电过程模型。这种模型由一组分段线性模型段组成,这些模型段的参数随时间在线调整。因此,组合整体模型能够很好地模拟非线性时变过程,如锂离子电池的充放电过程。给出了大功率汽车级锂离子电池的模拟试验数据和实际试验数据的建模结果。实际行为和模型预测行为之间的紧密匹配证明了所提出的建模方法的有效性,并表明这种模型对电池管理系统的潜在有用性。
{"title":"A Piecewise Linear Time-Varying Model for Modeling the Charging and Discharging Processes of a Lithium-Ion Battery","authors":"Arab AlSharif, M. Das","doi":"10.4018/ijhcr.2014040106","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040106","url":null,"abstract":"A piecewise linear, time-varying model for modeling the charging and discharging processes of Li-ion batteries is introduced in this paper. Such a model consists of a group of piecewise linear model segments, whose parameters are adapted online over time. Thus, the combined overall model is capable of modeling nonlinear time-varying processes, such as a Li-ion battery charging and discharging processes, quite well. Modeling results of both simulated test data and actual test data gathered from a high-power automotive-grade Li-ion cell are presented. The close matches between actual and model-predicted behaviors demonstrate the effectiveness of the proposed modeling approach and indicate the potential usefulness of such models for a battery management system.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130032249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Heuristic Based User Interface Evaluation of Mobile Money Application: A Case Study 基于启发式的移动支付应用用户界面评价:一个案例研究
Pub Date : 2014-04-01 DOI: 10.4018/ijhcr.2014040105
B. Kumar, Shamina Hussein
Mobile money is creating entirely new opportunity for mobile devices and provides functionalities similar to e-commerce. The nature of these devices pose two major limitations that are small screen size and lack of input capability, which makes designing applications for mobile devices a challenging task. It is important that the user interface is user-friendly and help users easily obtain their desired results. This study applied heuristic evaluation to examine the interface of SMS based mobile money application provided by vodafone called M-Paisa in Fiji. User interface evaluation of this application based on seven heuristic involving fifteen experts is described. The results show that there are minor usability problems with M-Paisa interfaces and we provide our recommendations to address them. Findings of this research can be applied to develop a set of guidelines to support the future design of effective interfaces for other mobile money applications.
移动支付为移动设备创造了全新的机会,并提供了类似于电子商务的功能。这些设备的特性造成了两个主要限制,即屏幕尺寸小和缺乏输入能力,这使得为移动设备设计应用程序成为一项具有挑战性的任务。重要的是,用户界面是用户友好的,并帮助用户轻松获得他们想要的结果。本研究采用启发式评价的方法,考察了沃达丰在斐济提供的基于短信的移动支付应用M-Paisa的界面。描述了基于15位专家参与的7种启发式方法对该应用程序的用户界面进行评估。结果表明,M-Paisa界面存在一些小的可用性问题,我们提供了解决这些问题的建议。本研究的结果可以应用于开发一套指导方针,以支持未来设计其他移动货币应用程序的有效界面。
{"title":"Heuristic Based User Interface Evaluation of Mobile Money Application: A Case Study","authors":"B. Kumar, Shamina Hussein","doi":"10.4018/ijhcr.2014040105","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040105","url":null,"abstract":"Mobile money is creating entirely new opportunity for mobile devices and provides functionalities similar to e-commerce. The nature of these devices pose two major limitations that are small screen size and lack of input capability, which makes designing applications for mobile devices a challenging task. It is important that the user interface is user-friendly and help users easily obtain their desired results. This study applied heuristic evaluation to examine the interface of SMS based mobile money application provided by vodafone called M-Paisa in Fiji. User interface evaluation of this application based on seven heuristic involving fifteen experts is described. The results show that there are minor usability problems with M-Paisa interfaces and we provide our recommendations to address them. Findings of this research can be applied to develop a set of guidelines to support the future design of effective interfaces for other mobile money applications.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Ubiquity and Context-Aware M-Learning Model: A Mobile Virtual Community Approach 无处不在和上下文感知移动学习模型:一种移动虚拟社区方法
Pub Date : 2014-01-01 DOI: 10.4018/ijhcr.2014010104
Mohammad M. Alnabhan
This paper presents a new adaptive m-learning model supporting collaborative and context-aware learning. A seamless integration between learners' location information and a set of associated learning context dimensions is used to facilitate the provision of pervasive and ubiquitous learning services. The new model adopts nearest search algorithm in order to group spatially related mobile learners, constructing learning-oriented virtual communities and achieving a collaborative learning experience. The presented model implements two virtual community construction modes, described as client-based and server-based collaboration modes. A preliminary evaluation methodology was conducted, measuring the successful implementation of the proposed new model, and confirming the establishment of the virtual community after considering a set of learning context dimensions; such as learning collaboration type, learning style and learners' location information. Results have confirmed that both collaboration modes were successful in establishing the virtual communities between mobile learners. However, the server-based mode was more scalable than client-based mode while handling the increased number of mobile peers, in which less response time was experienced and a smaller learning grid area was formed.
本文提出了一种新的自适应移动学习模型,支持协作和上下文感知学习。学习者的位置信息与一组相关的学习上下文维度之间的无缝集成用于促进提供无处不在的学习服务。该模型采用最近搜索算法,对空间相关的移动学习者进行分组,构建面向学习的虚拟社区,实现协同学习体验。该模型实现了基于客户端的协作模式和基于服务器的协作模式两种虚拟社区构建模式。采用初步评估方法,衡量所提出的新模型的成功实施,并在考虑一组学习情境维度后确认虚拟社区的建立;例如学习协作类型、学习风格和学习者的位置信息。结果表明,这两种协作模式都能成功地建立移动学习者之间的虚拟社区。然而,在处理移动对等体数量增加时,基于服务器的模式比基于客户端的模式更具可扩展性,响应时间更短,形成的学习网格区域更小。
{"title":"Ubiquity and Context-Aware M-Learning Model: A Mobile Virtual Community Approach","authors":"Mohammad M. Alnabhan","doi":"10.4018/ijhcr.2014010104","DOIUrl":"https://doi.org/10.4018/ijhcr.2014010104","url":null,"abstract":"This paper presents a new adaptive m-learning model supporting collaborative and context-aware learning. A seamless integration between learners' location information and a set of associated learning context dimensions is used to facilitate the provision of pervasive and ubiquitous learning services. The new model adopts nearest search algorithm in order to group spatially related mobile learners, constructing learning-oriented virtual communities and achieving a collaborative learning experience. The presented model implements two virtual community construction modes, described as client-based and server-based collaboration modes. A preliminary evaluation methodology was conducted, measuring the successful implementation of the proposed new model, and confirming the establishment of the virtual community after considering a set of learning context dimensions; such as learning collaboration type, learning style and learners' location information. Results have confirmed that both collaboration modes were successful in establishing the virtual communities between mobile learners. However, the server-based mode was more scalable than client-based mode while handling the increased number of mobile peers, in which less response time was experienced and a smaller learning grid area was formed.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Communication Frequency and Recency Context to Facilitate Mobile Contact List Retrieval 利用通信频率和最近时间上下文方便移动联系人列表检索
Pub Date : 2013-10-01 DOI: 10.4018/ijhcr.2013100104
A. Plessas, V. Stefanis, Andreas Komninos, J. Garofalakis
As mobile contact lists get bigger and bigger the cognitive load on the user increases while trying to retrieve the next contact to start a communication session. In this paper we focus on the task of retrieving a contact when the purpose is to start a phone call, examining mobile users' call logs and showing that it is possible to accurately predict the next contact to be called using relatively simple heuristics and algorithms that describe usage context. The authors present and discuss the results of the proposed method applied on a dataset collected from an experiment the authors organised involving 25 mobile users.
随着手机联系人列表变得越来越大,用户在试图检索下一个联系人以开始交流会话时的认知负荷也在增加。在本文中,我们专注于当目的是开始打电话时检索联系人的任务,检查移动用户的通话记录,并显示使用描述使用上下文的相对简单的启发式和算法来准确预测下一个要调用的联系人是可能的。作者介绍并讨论了将所提出的方法应用于从作者组织的涉及25个移动用户的实验中收集的数据集的结果。
{"title":"Using Communication Frequency and Recency Context to Facilitate Mobile Contact List Retrieval","authors":"A. Plessas, V. Stefanis, Andreas Komninos, J. Garofalakis","doi":"10.4018/ijhcr.2013100104","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100104","url":null,"abstract":"As mobile contact lists get bigger and bigger the cognitive load on the user increases while trying to retrieve the next contact to start a communication session. In this paper we focus on the task of retrieving a contact when the purpose is to start a phone call, examining mobile users' call logs and showing that it is possible to accurately predict the next contact to be called using relatively simple heuristics and algorithms that describe usage context. The authors present and discuss the results of the proposed method applied on a dataset collected from an experiment the authors organised involving 25 mobile users.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
LTE Cellular Network Planning for Urban Area 城市LTE蜂窝网络规划
Pub Date : 2013-10-01 DOI: 10.4018/ijhcr.2013100102
M. Ahamed, Zahirul Islam, S. Hossain, S. Faruque
Due to the advancement of telecommunication platform, users are now demanding new applications such as Online Gaming, mobile TV, Web 2.0, and to meet this requirement operators needed to design more flexible network. To fulfill the requirements, 3rd Generation Partnership Project 3GPP works on the Long Term Evolution LTE and propose a system which has larger bandwidths up to 20 MHz, low latency and packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink Magdalena, 2007; Motorola, 2007; Skold, 2009. Offering a greater coverage by providing higher data rates over wider areas and flexibility of use at existing and new frequency bands plan is a major challenge. In this paper, we are analyzing practical coverage scenario in an urban area i.e. Kolkata in terms of received signal levels, total noise, interference, throughput, and quality factor for downlink signal level.
由于电信平台的进步,用户对网络游戏、移动电视、Web 2.0等新的应用提出了更高的要求,为了满足这一需求,运营商需要设计更加灵活的网络。为了满足需求,第三代合作伙伴计划3GPP致力于长期演进LTE,并提出了一种具有高达20 MHz的更大带宽,低延迟和分组优化无线接入技术的系统,其下行链路峰值数据速率为100 Mbps,上行链路峰值数据速率为50 Mbps。摩托罗拉,2007;Skold教授,2009年。通过在更广泛的区域提供更高的数据速率来提供更大的覆盖范围,并在现有和新频段计划中灵活使用是一个主要挑战。在本文中,我们从接收信号电平、总噪声、干扰、吞吐量和下行信号电平的质量因子等方面分析了城市地区(即加尔各答)的实际覆盖场景。
{"title":"LTE Cellular Network Planning for Urban Area","authors":"M. Ahamed, Zahirul Islam, S. Hossain, S. Faruque","doi":"10.4018/ijhcr.2013100102","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100102","url":null,"abstract":"Due to the advancement of telecommunication platform, users are now demanding new applications such as Online Gaming, mobile TV, Web 2.0, and to meet this requirement operators needed to design more flexible network. To fulfill the requirements, 3rd Generation Partnership Project 3GPP works on the Long Term Evolution LTE and propose a system which has larger bandwidths up to 20 MHz, low latency and packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink Magdalena, 2007; Motorola, 2007; Skold, 2009. Offering a greater coverage by providing higher data rates over wider areas and flexibility of use at existing and new frequency bands plan is a major challenge. In this paper, we are analyzing practical coverage scenario in an urban area i.e. Kolkata in terms of received signal levels, total noise, interference, throughput, and quality factor for downlink signal level.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127235759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Interference Modeling and Analysis in Cognitive Radio Networks 认知无线电网络中的干扰建模与分析
Pub Date : 2013-10-01 DOI: 10.4018/ijhcr.2013100101
Yanxiao Zhao, B. Panigrahi, K. Sohraby, Wei Wang
Cognitive radio networks CRNs have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.
认知无线网络(crn)已经受到了相当大的关注,并被视为未来无线网络的一个有前途的范例。它与传统无线网络的主要区别是,如果次要用户不会对主要用户造成有害干扰,则允许其访问该信道。crn的这一独特特征提出了一个重要而具有挑战性的问题,即如何准确估计次要用户对主用户的干扰?此外,频谱感知在crn中起着至关重要的作用。次要用户在发送之前必须感知信道。通常采用双状态感知模型,将信道分为繁忙状态和空闲状态。辅助用户只能在检测到通道处于空闲状态时使用通道。在本文中,我们解决了主接收端由于并发活跃的辅助用户而产生的干扰估计问题。利用频谱感知,一旦活跃用户进入其感知范围,备用用户就不会再发射。因此,同时干扰辅助用户的最大数量是有限制的,通常在1到4之间。这一重要结论大大简化了crn中的干扰建模。作者提出了所有可能同时干扰二次用户的情况。此外,作者还推导了每种情况的概率。进行了大量的仿真,结果验证了该方法的有效性和准确性。
{"title":"Interference Modeling and Analysis in Cognitive Radio Networks","authors":"Yanxiao Zhao, B. Panigrahi, K. Sohraby, Wei Wang","doi":"10.4018/ijhcr.2013100101","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100101","url":null,"abstract":"Cognitive radio networks CRNs have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains 供应链中安全物料流追踪与验证的RFID方案研究
Pub Date : 2013-10-01 DOI: 10.4018/ijhcr.2013100105
Yanjun Zuo
Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.
射频识别(RFID)是一种重要的无线通信和普适计算技术,用于自动物品识别和数据捕获。在本文中,我们提出了一种利用RFID固有的身份验证和数据记录功能来安全跟踪供应链中的物料流的方案。该方案不仅提供了整个供应链的整体路径跟踪和验证,还提供了供应链合作伙伴范围内的产品识别。部署RFID标签和读取器以确保只有授权的供应链合作伙伴才能以安全和私密的方式识别标记的物品。作者开发了标签阅读器认证协议,以确保RFID标签和阅读器的真实性。他们的方法避免了供应链服务器的单点故障——不需要每个供应链合作伙伴为每个物料流与服务器通信。因此,可以最大限度地降低由于网络故障或服务器不可用而导致系统中断的风险。
{"title":"Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains","authors":"Yanjun Zuo","doi":"10.4018/ijhcr.2013100105","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100105","url":null,"abstract":"Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115414217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GSM-Based Positioning Technique Using Relative Received Signal Strength 基于相对接收信号强度的gsm定位技术
Pub Date : 2013-10-01 DOI: 10.4018/ijhcr.2013100103
M. H. A. Meniem, A. Hamad, E. Shaaban
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. Database Correlation Method DCM is a positioning technology that based on a database of a premeasured location dependent variable such as Received Signal Strength RSS. DCM has shown superior in terms of accuracy. Absolute RSS values received from a base station change with time, but the relative RSS RRSS values which refer to the relations of the RSS values between different base stations are more stable. This study proposes and implements a robust RRSS GSM-based technique for both positioning and traffic estimation. The study was tested and analyzed in Egypt roads using realistic data and Android smart phones. The performance evaluation showed good results. Mean positioning accuracy was about 29m in urban areas and velocity estimation was about 1 km/h in rural areas.
在过去几年中,上下文感知应用程序获得了巨大的兴趣。随着手机成为无处不在的计算设备,手机定位已成为一个重要的研究问题。数据库关联法DCM是一种基于预先测量的位置因变量(如接收信号强度RSS)的数据库的定位技术。DCM在精度方面显示出优越性。从基站接收到的绝对RSS值随着时间的变化而变化,但相对RSS RRSS值更稳定,它表示不同基站之间的RSS值的关系。本研究提出并实现了一种基于gsm的鲁棒RRSS定位和流量估计技术。这项研究在埃及的道路上进行了测试和分析,使用的是真实的数据和安卓智能手机。性能评价结果良好。城市地区平均定位精度约为29m,农村地区速度估计约为1 km/h。
{"title":"GSM-Based Positioning Technique Using Relative Received Signal Strength","authors":"M. H. A. Meniem, A. Hamad, E. Shaaban","doi":"10.4018/ijhcr.2013100103","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100103","url":null,"abstract":"Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. Database Correlation Method DCM is a positioning technology that based on a database of a premeasured location dependent variable such as Received Signal Strength RSS. DCM has shown superior in terms of accuracy. Absolute RSS values received from a base station change with time, but the relative RSS RRSS values which refer to the relations of the RSS values between different base stations are more stable. This study proposes and implements a robust RRSS GSM-based technique for both positioning and traffic estimation. The study was tested and analyzed in Egypt roads using realistic data and Android smart phones. The performance evaluation showed good results. Mean positioning accuracy was about 29m in urban areas and velocity estimation was about 1 km/h in rural areas.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Int. J. Handheld Comput. Res.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1