AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:


· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 17 ·

Pricing Schemes for Emerging Telecommunication Market

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Due to the technological advances in the mobile telecommunication networks and the Internet, existing business models must to be changed for the new telecommunication market. The old business and pricing models, based on the QoS or QoE, do not work well with the new generation networks. In fact, today different technologies can provide same services with the same level of QoS or QoE. Service pricing models based on American Option and the Cross-Entropy estimation algorithms, can help to define innovative pricing scheme for the new generation network. ····· 1036119513

An Architecture and Mechanism for Congestion Control Data Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today is the era of multimedia applications such as audio or video transmission. Multimedia traffic can be classified according to bandwidth, latency and Quality of Service. For multimedia applications, there is strong need of higher transmission capacity and higher bandwidth, which leads the need of high speed network based architecture at the forefront of several current technology based networks. Due to the unpredictable fluctuations and burstiness of traffic flows within high speed network congestion can occur frequently and TCP will perform poorly in future high speed network. In this paper, we purposed the solution for the problem of frequent congestion occurrence in high speed network and it s model that has learning capability on the basis of round trip time, node s outlink capacity and average queue size and passes a signal to the sender to change its sending rate accordingly. Therefore, congestion occurrence in high speed network can be resolved. ····· 1036119492

Recovery in Mobile and Ad hoc networks

für 53.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The book will focus on the fundamental principles and models underlying all aspects of mobile and ad hoc computing. It will address the principles underlying the theory, algorithms, and systems aspects of mobile and ad hoc computing. The manner of presentation of the algorithms is very clear, explaining the main ideas and the intuition with figures and simple explanations. The algorithms are followed by rogorous proofs for better understanding. The selection of chapter themes is broad and comprehensive,and the book covers all important topics in depth. The selection of algorithms for both mobile networks and ad hoc networks has been done carefully to elucidate new and important techniques of algorithm design. ····· 1036119420

Design of a Real-Time Tracking System using packet transfer delay

für 49.41€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
There is an ever increasing need for real time tracking of equipment in every sector of the economy as the world evolves into a more fast pace environment in technology, manufacturing and servicing industries. The tracking system was first incorporated into the aviation industry to track flights which made it easier for flow of traffic and to identify air planes plying the air space, in the freight business metal containers are marked with invincible metal paints which eases logistics in the sea port. The technology has become more popular in recent times as the concept has evolved into a more miniature form supermarkets and stores use metallic strips to secure goods from theft, this is considered as a form of tracking, In the industry sector tracking of mobile equipment is of great importance as they can be easily misplaced or stolen, also used in telecommunication to track mobile phones. Radio Frequency identifiers are placed on peoples these day and their location can be tracked on a GPS. The purpose of this work is to design and evaluate a Real Time Tracking System that can be implemented in a hospital to locate important medical equipment within the building. ····· 1036119406

Design, Implementation and Evaluation of an energy RPL routing metric

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The Internet of Things is the new paradigm arise in the last years, based on the idea that everyday object can connect to the Internet and exchanging information with other objects and people. This is possible thanks to the Smart Objects. which are the base of IoT: they are small wireless devices equipped with a tiny sensor, and generally are battery powered. The Internet Engineering Task Force (IETF) formed a new Working Group named Routing Over Low power and Lossy networks (ROLL) to standardize an IPv6-based routing protocol for IP smart object networks the result was the IPv6 Routing Protocol for Low power and lossy networks (RPL). To increase lifetime of the devices and then to reduce the energy consumption, radio transceiver must be turned off as long as possible thus, a duty cycling mechanism has to be used. In this work we use Contiki, an operating system designed for smart objects applications, and the RPL implementation on it, to design a RPL routing metric with nodes with different duty cycle values, based on the energy consumption of the nodes. The purpose is to study and evaluate it, and comparing it with ETX, the default routing metric implemented in Contiki. ····· 1036119386

High Speed NetFPGA Router

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
When it comes to Network Communications, the most important aspect of all, is the speed of your router. High-speed end devices are readily available, breakneck mediums are also available (like optical fiber), but what about the Routers They always seem to be a bottleneck in the performance of a network. NetFPGA Router is the best solution to this issue. It can deliver 10 to 20 times faster processing speed than the ordinary routers available in market. And the fascinating part is that it is cost-efficient too. This book explains in detail how to implement routing algorithms such as IPv4 and OSPF on NetFPGA platform. It also covers basic concepts of routing that are necessary to understand NetFPGA Router. The book is based on an award-winning project in `COMPPEC 2011` (Computer Project Exhibition and Competition, Pakistan). ····· 1036119227

Coded Modulation for Power-Line Communication Channel

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Developments in digital communications occur at a very rapid pace. High-speed communications operate preferably in fixed connection through fiber optic means. Since this type of communication is quite costly to implement even in developed countries, the power-line infrastructure - through which every household is connected to the power grid at low voltages - could be used as a communication medium since it uses an existing infrastructure. The quality of the transmission over power lines depends amongst others, on the noise level at the receiver and the attenuation of the electrical signal at different frequencies. The higher the noise level, the harder it is to detect the received signal. The use of spectral shaping and distance-preserving mappings techniques to design new codes and then combine them with certain modulation schemes produce a new class of codes with better error correction capability and better spectrum shape. These codes can make use of the Viterbi decoding algorithm in a very harsh environment like the power-line communication channel. ····· 1036119171

Outlier and Event Detection in Harsh Environments

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The applications of wireless sensor networks in harsh environments, an aspect which has not been given extensive treatment in the literature is considered in this work. Typical examples of harsh environments are urban areas and underground mines. Among the numerous monitoring applications of wireless sensor networks this work focuses on outlier detection and event detection in harsh environments. An outlier detection technique for harsh environments should be energy efficient and able to incorporate multivariate input data type, spatiotemporal and attribute correlations, identification of an outlier as an event or error, outlier degree, outlier score, in-susceptibility to dynamic topology, non-stationarity and inhomogeneity of the environment. The objective of this work is to provide a brief analysis of the state-of-the-art outlier/event detection techniques in the context of harsh environments and build on these techniques to incorporate most of the mentioned characteristics. ····· 1036119012

Internet Protocol Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
When using Link-State Protocols in IP networks, forwarding loops can occur transiently when the routers adapt their forwarding tables as a response to a topological change. In this Book, we present a mechanism that lets the network converge to its optimal forwarding state without risking any transient loops and the related packet loss. The mechanism is based on an ordering of the updates of the forwarding tables of the routers. Our solution can be used in the case of a planned change in the state of a set of links and in the case of unpredictable changes when combined with a local protection scheme. The supported topology changes are link transitions from up to down, down to up, and updates of link metrics. Typically we have chosen a Network consisting of routers. Link costs are generated randomly for simulation. Dijkstra s algorithm has been employed for computing shortest paths. Routing tables are computed dynamically. Link failures are simulated. Avoiding transient loops in each case is demonstrated, by constructing a Reverse Shortest Path Tree using Spanning Tree Algorithm of the Graph. ····· 1036118854

Security in Mobile Ad-hoc Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Mobile Ad-hoc Network (MANET) is a new type of communication network, which can be used for data communication between groups of mobile nodes using wireless channels. The energy constraints, poor protection of nodes in a hostile environment, and the vulnerability of security schemes have been identified as challenges for MANETs. The wireless MANETs face a larger security problem than conventional wired and wireless networks. As per recent research trends, Clustering based approach enables mobile node management, security, fault tolerance, network key management and routing in MANETs. Implementation of a secured routing protocol among the nodes of a MANET, while keeping intact the benefits of clustering, is a challenging task. In this dissertation work, we have proposed an approach for secure communication in MANETs using the concept of Clustering. The proposed approach is intended to get benefit of security by means of clustering. This dissertation researches existing routing protocols, clustering based security solutions, examines an existing clustering model, and then proposes a scheme for secure data communication. ····· 1036118841

The Performance of WiFi Offload in LTE Networks

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Currently, cellular networks are overloaded with mobile data traffic due to the rapid growth of mobile broadband subscriptions. The combination of Smartphones such as iPhones, netbooks and 3G/4G mobile networks are rapidly growing in very large numbers and as a result, this has created an exceptional demand for ubiquitous connectivity and quality of rich digital content and applications. To meet the requirements of future data-rich applications and terminals with improved multimedia, future wireless networks are expected to combine multiple access technologies and as a result mobile broadband operators are including WLANs like WiFi as an alternative access network technology. This enables solutions to offload traffic from the primary access technology to the WiFi access when applicable so as to provide extra capacity and improve overall performance. By offloading, it means that using alternative network technologies for delivering data originally targeted for e.g. cellular networks when it becomes saturated or when it exceeds its capability. In this work novel offloading algorithms are proposed and implemented, that decides when to move flow(s) between LTE and WiFi access networks. ····· 1036118830

Optimized Security Protocol for Wireless Sensor Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Wireless Sensor Networks (WSN) are difficult to deploy. Limited energy, bandwidth, hardware and lack of security make WSN implementation difficult. Conventional security mechanisms cannot be applied because of the inherent processing and communicational constraints that exist in WSN. This book focuses on the design, implementation and analysis of an Optimized Security Protocol (OSP) that fulfills the requirements of confidentiality, authentication and integrity in WSN. OSP fulfils requirements of high level security without compromising resources. OSP architecture is based on the further optimization of computations in the Rabbit stream cipher and reduction in communication overhead to save sensor s life time. The OSP has been implemented using power of TinyOS coupled with NesC. In order to evaluate the system, several experiments have been carried out with respect to encryption/ decryption of various data blocks. Evaluation of OSP has been done by conducting a comprehensive efficiency analysis of the OSP architecture. Furthermore, the results of execution time and memory footprint for OSP have been compared to its cryptographic counterparts. ····· 1036118698

QoS Analyses for UMTS Cellular Network

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The aim of this book is to analyze and discuss critically the Quality of Service (QoS) of UMTS (Universal Mobile Telecommunication Systems) network. UMTS is a third generation (3G) technology that can be established based on GSM technology. UMTS provides high data rate than GSM technology and supports various applications over internet including VoIP, video call etc. This book reveals not only UMTS technology but also details on Quality of Service(QoS) in UMTS. This work is more concern about the factors that affects the Quality of Service, not focus more on improvement techniques of Quality of Service of UMTS network. Here all the related topics for supporting this work have been presented both theoretically and practically. For practical work OPNET as a simulation tool has been used and it has been applied to different types of UMTS network based on different scenarios.There are various attributes that affects the UMTS network and it is really difficult to find out which one is most effective. That is why several experiments have been done here to find out those attributes and their effects. The details of those experiments have also been discussed here in the last few chapters. ····· 1036118456

Deployment of a Secure VoIP System

für 35.91€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Here, I describe the basic principles and operation of a VoIP system, the current scenario of the implementation site and what necessary changes are to be made to execute the implementation. I have described, in one chapter all the protocols working in a telephone and a VoIP network and I provide an extensive study of security risks, vulnerabilities, threats which are common while communicating over the internet in another chapter. I showed the probable network topology breaking it down separately for each part of the entire system i.e for the PABX telephone network end and for the IP network end and finally the complete topology of the converged VoIP system along with security solution integrated with it for a university campus. ····· 1036118334

Efficient and Scalable Distributed Shared Memory System

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This thesis presents the design and implementation of our novel hybrid software DSM system. We call our system hybrid home-based EAC (HHEAC) since the system implements our novel exclusive access consistency model (EAC) based on the hybrid protocol of the homeless and home-based protocols. HHEAC guarantees only that shared variables inside a critical section are up to date before the accesses. Other shared variables outside a critical section are guaranteed to be up to date after the next barrier synchronisation. Our home-based DSM implementation is different from the previous implementations in that a home node does not receive any diffs from non-home nodes until the next barrier synchronisation. It is also different in that during a lock synchronisation required diffs are prefetched before the critical section, which reduces not only data traffic but also page faults inside the critical section. We also present a diff integration technique that can further unnecessary data traffic during lock synchronisation. This technique is especially effective in reducing data traffic for migratory applications. ····· 1036118299

Authentication Mechanism for P2P Networks

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Security within network architectures is mainly a question about trust. The security solutions must be well organized so all participating entities will have faith in the security solutions. It includes solutions with cryptology to establish secure network communications and file systems. The security issues are especially important in peer-to-peer systems. It is because these systems are decentralized and no central administrator is responsible for the security issues. Providing authentication mechanism and managing the task is not a simple task.This book is a contribution to the new authentication mechanism and heartful thanks to the peoples who have contributed their special attention in completing this work. ····· 1036118161

Server-based Curator for Museums

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
A number of people face difficulties in speech and hearing.Hearing Loss is unmeasurable.People with hearing loss are not completely deaf. Ordinarily they show varying degrees of hearing loss at varying frequencies in both ears.Although this fact is obvious,its implications are often overlooked for a variety of reasons that include a lack of interest in maximizing hearing by some people who are deaf,and often,a lack of understanding about modern technology that improves auditory skills.People who are hard of hearing require a volume increase of 15-25 dB in order to achieve the same level of understanding as people with normal hearing.This can be in settings like schools,museums,etc.I ve identified Museums as one such epicenter where people with hearing disability are forced to deal with external noise factors which further worsen their condition.The deaf and dumb find it difficult to communicate and collect information around them. These kind of people only understand standard sign languages(ASL).There was an urgent need to address this problem and hence one of the most efficient ways to achieve this has motivated me to design and develop the `Server-Based Curator for Museums`. ····· 1036118143

Sistemnye seti s pryamymi kanalami dlya mnogoprotsessornykh sistem

für 61.20€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
V knige rassmatrivayutsya sistemnye seti dlya mnogoprotsessornykh vychislitel`nykh sistem, kotorye obespechivayut parallel`nuyu beskonfliktnuyu peredachu dannykh mezhdu abonentami seti bez promezhutochnoy buferizatsii v uzlakh seti. Eti sistemnye seti obespechivayut minimal`nye vremena peredachi dannykh i mogut schitat`sya ideal`nymi sistemnymi setyami. Rassmatrivayutsya voprosy narashchivaniya takikh setey na lyuboe chislo abonentov i obespecheniya ikh protsessornoy i kanal`noy otkazoustoychivosti. Otsenivayutsya skhemnaya i kanal`naya slozhnost` ideal`nykh sistemnykh setey. Rassmatrivaetsya vozmozhnost` primeneniya ideal`nykh sistemnykh setey dlya postroeniya otkazoustoychivykh sistem real`nogo vremeni i dlya postroeniya mnogoyadernykh protsessorov na odnom kristalle. Rassmatrivayutsya vozmozhnosti primeneniya ideal`nykh sistemnykh setey kak udobnykh sostavnykh komponent v sistemnykh setyakh sovremennykh vysokoproizvoditel`nykh vychislitel`nykh sistem podobnykh Black Widow (Cray), Jemini (Cray) i Blue Water (IBM), kotorye pozvolyayut mnogokratno povyshat` ikh (setey) kharakteristiki pri minimal`nom povyshenii energopotrebleniya. ····· 103615258

Rasshirennyy yazyk razmetki XML

für 80.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Vyazilov E.D. Rasshirennyy yazyk razmetki XML: napravleniya ispol`zovaniya. Yazyk XML yavlyaetsya segodnya odnim iz naibolee populyarnykh yazykov dlya Internet -tekhnologiy. V poslednie gody intensivno razvivayutsya tekhnologii, osnovannye na rasshirennom yazyke razmetki XML, - sozdayutsya prilozheniya po dinamicheskomu dostupu k dannym cherez web stranitsu, poyavilis` vozmozhnosti dostupa k dannym ne tol`ko cherez personal`nyy komp`yuter, no i sotovyy telefon, karmannyy komp`yuter po provodnym i besprovodnym kanalam svyazi, v kotorykh takzhe ispol`zuetsya yazyk XML. V knige izlagayutsya osnovnye kontseptsii i spetsifikatsii XML. V knige rasskazano, kak primenyat` XML dlya obmena dannymi. Pokazany metody razmetki dokumenta na yazyke XML. Kniga predstavlyaet napravleniya ispol`zovaniya XML v Internet - tekhnologiyakh. Razrabotchiku Web-prilozheniy, proektirovshchiku i programmistu neobkhodimo znat`, chto predstavlyaet soboy yazyk XML, chto mozhno sdelat` s ego pomoshch`yu. Ill. 31. Tabl. 37. Bibl. 188. ····· 103615235

Conception d`un crypto système pour la norme de compression H.264/AVC

für 55.71€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
La transmission de l`information exige un certain niveau de sécurité. Parmi les propriétés à assurer, nous citons la confidentialité, l`intégrité et l`authentification. Une solution pour garantir la sécurité des données transmises à travers les canaux publiques contre différents types d`attaques est la cryptographie. De nos jours, la téléphonie mobile est énormément utilisée pour l`échange de messages textes, images ou vidéo. Dans cette thèse, nous proposons la conception de nouveaux algorithmes de chiffrement/déchiffrement basée sur le chaos intégrant une des techniques de compression vidéo qui est la norme H.264 Advanced Video Coding (AVC). Cette norme peut offrir l`un des meilleurs taux de compression actuellement disponible sur le marché et présente des performances très sophistiquées en termes de flexibilité et d`efficacité de codage pour une large variété de types de réseaux et de domaines d`applications. Ce travail est dédié pour certains domaines d`applications du type temps réel comme la visioconférence, l`émission des programmes télévision par satellite et la télémédecine où le temps est un facteur capital. ····· 103614767

ZigBee RFID Sensor Networks

für 71.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
An information system for logistics application is always expected to answer four questions: Who, What, When and Where (4Ws). Wireless Sensor Networks (WSN) aim to provide remote monitoring, which is regarded as `When` and `What` Radio Frequency Identification (RFID) focuses on retrieving object identity, which is the answer of `Who`. As an extended concept of RFID, the Real-Time Localization Systems (RTLS) are required in certain applications in order to constantly update the answer of `Where`. As each of those technologies answers different but complementary parts of the 4Ws, hybrid systems that provide complete information by combining all of them could be promising in logistics management applications. This book aims to introduce a framework of network level architecture design for such hybrid systems in logistics resource management applications. The various architectures described in this book are designed to address different requirement levels in the hierarchy of needs, from single integration to hybrid system with RTLS. The research in this book is based on ZigBee/IEEE802.15.4, which is currently one of the most widely used specifications for WSN. ····· 103613813

Intrusion Detection System using datamining techniques

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the information security. The Intrusion detection system (IDS) is one that scans incoming data activities and attempt to detect the intrusions. The classification algorithms in IDS are used to categorize the well known large variety of intrusions. In recent years, data mining based IDS have executed good performance. Still challenges exist in the design and implementation of quality IDSs. The goal of this classification and clustering based IDS system is to decrease the False alarm rates and increase the accuracy. ····· 103613783

Handover between LTE and 3G Radio Access Technologies:

für 44.10€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Handover from LTE to 3G cellular networks is considered a high priority item to operators that seek to provide a seamless anywhere anytime mobile service to the subscribers. Interworking procedures between these two networks are ensured in the 3GPP standardization, which the vendors must comply with in their implementation. Services such as video streaming and voice over IP however set stringent requirements for the handover performance. Handover delay should be unnoticeable and handover failures minimized. In order to reach these requirements, this feature needs to go through a development process on the vendor side that consists of thorough functionality, performance and fault correction testing. Test engineers then need to be well aware of the required standards as well as the requirements for quality of service to successfully develop the feature of Inter Radio Access Technology handover from LTE to 3G. ····· 103613732

Quality of Service in Heterogeneous Mobile and Wireless Networks

für 44.01€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Multi-access mobile devices and overlapping mobile and wireless network deployments have emerged as a reality in the converged telecommunications world. In heterogeneous wireless and mobile environment it is highly important to provide QoS support and seamless handovers between different radio access networks, something that is particularly needed for real-time services. Therefore, this book provides performance analysis of packet scheduling algorithms for cellular mobile networks and for WiMAX. Also, it provides QoS analysis of vertical handover for VoIP and video traffic in a heterogeneous wireless environment. Further, the book proposes improvements for vertical handover decision algorithms regarding the QoS provisioning in mobile and wireless heterogeneous networks, accompanied with numerical analysis and radio access technology selection algorithm. Finally, it gives important discussions and conclusions for improving the QoS in heterogeneous mobile and wireless networks. Hence, this book is useful for all professionals in mobile and wireless networking and to everyone else who is interested in this field of science. ····· 103613575

· 1 · ::::: · 10 ·· 11 ·· 12 ·· 13 ·· 14 ·· 15 ·· 16 · ::::: · 17 ·