Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
1,777 result(s) for "WIRELESS APPLICATION PROTOCOL"
Sort by:
WAP Systems and Labeled Subshifts
The main object of this work is to present a powerful method of construction of subshifts which we use chiefly to construct WAP systems with various properties. Among many other applications of this so called labeled subshifts, we obtain examples of null as well as non-null WAP subshifts, WAP subshifts of arbitrary countable (Birkhoff) height, and completely scrambled WAP systems of arbitrary countable height. We also construct LE but not HAE subshifts, and recurrent non-tame subshifts
Extending IP to Low-Power, Wireless Personal Area Networks
Extending IP to low-power, wireless personal area networks (LoWPANs) was once considered impractical because these networks are highly constrained and must operate unattended for multiyear lifetimes on modest batteries. Many vendors embraced proprietary protocols, assuming that IP was too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings. However, 6LoWPAN radically alters the calculation by introducing an adaptation layer that enables efficient IPv6 communication over IEEE 802.15.4 LoWPAN links.
Study of Method to Booking e-tickets for Iraqi Stadiums using the Smartphone
Currently, manual system is being used for the matches booking is too old which need great time and efforts from both of the customers whom used to wait in long queues to get their tickets and the stadium staff whom also spend a lot of time trying to organize the booking process. In addition, cash payment with all of its disadvantages is accepted. The proposed mobile ticketing system will provide an easy way for users to booking their e-tickets for their favorite matches from anywhere and anytime, only it needs to a personal computer or a smartphone and connect to an internet. Therefore, without the need to wait in long queues for a long time. The user will get his e-ticket in a way that will gain a lot of time and efforts for both of the users and the staff. In this study, “the Method of Booking e-tickets for Iraqi Stadiums using the Smartphone” will be introduce. The study has been implemented using five major steps. The prototype will go through Awareness of the problem that will happen through the interview with the person who is in charge at stadium, and the problems that you are trying to solve as well. The main interface of the system will contain some of the box to enter the information about the customers, thus they can make the booking easily. Development, evaluation are the last steps to finalize the system usefulness to be implement in real life. Nowadays, the mobile becomes the most important thing that plays main role in many activities that we need it in daily life. Therefore, this study will depend on a mobile phone application, which is expect to give ease and effectiveness to the users and the administrator’s requirements in saving time, cost and efforts.
Quadrant Based Neighbor to Sink and Neighbor to Source Routing Protocol and Alternate Node Deployment Strategies for WSN
Multiple sensor nodes are required to gather the information and exchange the information in the direction of the sink node which makes a network. The static common node (NC) deployment has been work towards the coverage of deterministic territory. At that point, the coordinates of each regular node have been determined with the assistance of geometry of coverage locale. Among those basic nodes, on the off chance that one of the nodes gets fail, at that point, the coverage hole is made. To solve this issue, a viable alternate node (NA) deployment method has been presented for supplanting the damaged node. And furthermore developed quadrant based neighbor to sink and neighbor to source (Q-(NS)2) routing protocol for lessening the superfluous flooding of ‘RREQ’ message to the majority of its neighbor while route discovery. A viable comparison has been done between this other node deployment procedure and references. The performance comparison has been done between Quadrant based Direct routing protocol (Q-DIR), Angle routing protocol (ARP) and Q-(NS)2 routing protocol. Therefore, Q-(NS)2 routing protocol decreases the pointless flooding of ‘RREQ’ to the greater part of its neighbor which implies it devours less energy for data packet delivery and no redundant node in NA deployment.
Detecting bad information in mobile wireless networks based on the wireless application protocol
The scale of mobile wireless networks is increasing sharply. However, many websites in the WAP networks contain obscenity information, viruses, and Trojans. How to crawl, judge and locate these bad websites is a challenging problem. In this article, a WAP bad information detection system is proposed, which contains crawling, judgment and location subsystems to identify bad WAP websites. The distributed crawling is adapted to break the IP limitation of WAP networks. Text and image automatic classification are introduced in the judgment subsystem. The location subsystem can locate the bad sites and collect the evidence. The experiment results verify that our WAP bad information detection system has high efficiency and accuracy.
Cross layer access point selection mechanisms for a distributed queuing MAC protocol
The Distributed Queuing with Collision Avoidance (DQCA) Medium Access Control (MAC) protocol has been presented in the literature as a high-performance protocol for WLANs. Previous work regarding DQCA is focused on the operation of a single cell, where no interaction with neighboring sites is considered. In this paper, we define specific handoff procedures (channel sensing, discovery and reassociation functions) that enable the roaming of users in a scenario consisting of several DQCA access points (APs) deployed in a specific area using non-overlapping channel frequencies. Furthermore, we introduce a number of AP selection mechanisms in order to provide efficient reassociation decision criteria in the context of DQCA. These mechanisms are based either on a single metric such as the Signal to Noise Ratio (SNR) or the traffic load, or on cross-layer design by combining the information from different layers. Finally, our proposed solutions are evaluated by means of computer simulations.
Responding to Security Issues in WiMAX Networks
WiMAX technology, the commercialization of the evolving IEEE 802.16 standard, aims to solve the last-mile problem with broadband wireless access at the scale of metropolitan area networks. WiMAX has attracted significant attention and interest because of its wide transmission range, high transmission rate, and mobility support. However, to make WiMAX networks usable and reliable, several security issues must be addressed in the standard and its protocols. In this article, the authors give an introduction to the security protocols used in WiMAX networks and then discuss why these protocols are deficient in terms of anti-replay, efficiency, scalability, and forward and backward secrecy, as well as how they can be enhanced to address these issues for real applications.
Analysis of liberty single-sign-on with enabled clients
Web single-sign-on protocols-such as Microsoft passport, Oasis's security assertion markup language (SAML), and the Internet2 project Shibboleth, aim to solve security problems by letting individuals log in to many Internet services while authenticating only once, or at least always in the same way. Enterprises hope that single-sign-on protocols will significantly decrease customer-care costs due to forgotten passwords and increase e-commerce transactions by enhancing the user experience. Commercial interest centers on distributed enterprises and on small federations of enterprises with existing business relationships, such as supply chains. We concentrate on the liberty-enabled client and proxy (LECP) profile. The LECP protocol assumes a special protocol-aware client (the enabled client). We also consider the design of security protocols based on XML and Web services.
Municipal Wi-Fi: big wave or wipeout?
This article describes some contemporary cases, explores the perspectives of municipalities, providers, and legislators, and examines some examples that could synchronize the various stake-holders' positions. We focus here mostly on US cases. Deployment of wireless services to cities and towns has become a topic of considerable controversy. At the center of the debate is the decision by municipalities to offer low-cost service to citizens who would normally be excluded from the Internet. This \"digital divide\" justification often pits large cities against incumbent telecommunications providers. Legislation at the national and state levels has been somewhat favorable to the providers so far, but this bias might be shifting as more large providers join, rather than oppose, municipal wireless projects