Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
120,407
result(s) for
"mobile networks"
Sort by:
Novel approach of distributed & adaptive trust metrics for MANET
2019
It is known to all that mobile ad hoc network (MANET) is more vulnerable to all sorts of malicious attacks which affects the reliability of data transmission because the network has the characteristics of wireless, multi-hop, etc. We put forward novel approach of distributed & adaptive trust metrics for MANET in this paper. Firstly, the method calculates the communication trust by using the number of data packets between nodes, and predicts the trust based on the trend of this value, and calculates the comprehensive trust by considering the history trust with the predict value; then calculates the energy trust based on the residual energy of nodes and the direct trust based on the communication trust and energy trust. Secondly, the method calculates the recommendation trust based on the recommendation reliability and the recommendation familiarity; adopts the adaptive weighting, and calculates the integrate direct trust by considering the direct trust with recommendation trust. Thirdly, according to the integrate direct trust, considering the factor of trust propagation distance, the indirect trust between nodes is calculated. The feature of the proposed method is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network. Simulation experiments and tests of the practical applications of MANET show that the proposed approach can effectively avoid the attacks of malicious nodes, besides, the calculated direct trust and indirect trust about normal nodes are more conformable to the actual situation.
Journal Article
Vehicular networking
\"With this essential guide to vehicular networking, you will learn about everything from conceptual approaches and state-of-the-art protocols, to system designs and their evaluation. Covering both in- and inter-vehicle communication, this comprehensive work outlines the foundations of vehicular networking as well as demonstrating its commercial applications, from improved vehicle performance, to entertainment, and traffic information systems. All of this is supported by in-depth case studies and detailed information on proposed protocols and solutions for access technologies and information dissemination, as well as topics on rulemaking, regulations, and standardization. Importantly, for a field which is attracting increasing commercial interest, you will learn about the future trends of this technology, its problems, and solutions to overcome them. Whether you are a student, a communications professional or a researcher, this is an invaluable resource\"-- Provided by publisher.
Better Realization of Mobile Cloud Computing Using Mobile Network Computers
by
Ren, Xincheng
,
Ren, Feng
,
Guo, Zhaoming
in
Cloud computing
,
Communication networks
,
Communications Engineering
2020
In this paper, we first briefly explain why mobile network computers should be used as mobile terminals based on the concept of mobile network computer and cloud computing. Then, we illustrate the related aspects of cloud computing including classification, characteristics, and technology. Finally, we investigate why mobile network computer can better realize mobile cloud computing using the cloud computing platform. Mobile network computer is an important concept, which is rational from both mobile network communications and mobile network computing perspective. We aim to promote the concept of the mobile network computer. Furthermore, we mainly illustrate that mobile network computers should be the terminals of mobile communication networks. Mobile network computers define modern mobile terminals better and reflect the nature of multiple mobile terminals based on the structure of their integrated computers and the capability of multimedia based on the concepts of mobile network computer and cloud computing. Moreover, we also illustrate how mobile network computing is realized by mobile network computers using the cloud computing platform. Computers are the main terminals of fixed and mobile networks, respectively. With the introduction of cloud computing, mobile network computers can better highlight their value using the cloud computing platform. The concept of mobile network computer is appropriate in the information age.
Journal Article
Security management in mobile cloud computing
\"This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms\"-- Provided by publisher.
Fundamentals of 5G Mobile Networks
by
Rodriguez, Jonathan
in
Applied physics
,
Communication, Networking and Broadcast Technologies
,
Mobile communication systems
2015
Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks, discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development. The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including the future Internet, cloud computing, small cells and self-organizing networks (SONs), cooperative communications, dynamic spectrum management and cognitive radio, Broadcast-Broadband convergence , 5G security challenge, and green RF. This book aims to be the first of its kind towards painting a holistic perspective on 5G Mobile, allowing 5G stakeholders to capture key technology trends on different layering domains and to identify potential inter-disciplinary design aspects that need to be solved in order to deliver a 5G Mobile system that operates seamlessly.
Gaming in social, locative, and mobile media
\"The convergence of online social media, location-based services, mobile apps and games is transforming the way we communicate with each other and participate in media spaces. Gaming in Social, Locative and Mobile Media explores this complex dynamic of platforms and interfaces, reflecting on some of the social, personal and political dimensions of the 'playful turn' in contemporary culture. Drawing on ethnographic case studies across the Asia-Pacific region, Hjorth and Richardson consider how mobile social media are changing our experience of place, mobility, intimacy and sociality, both in the context of quotidian life and across geographic regions. Through the lens of everyday practices, and adapting a range of concepts and theoretical perspectives from media, communication and game studies, the authors think critically about how locative, mobile, social and 'playful' media are reshaping our experience of the world and ourselves as cultural beings.\"--Publisher.
Robust Zero Watermarking Algorithm for Medical Images Based on Improved NasNet-Mobile and DCT
by
Yen-Wei Chen
,
Uzair Aslam Bhatti
,
Dekai Li
in
Algorithms
,
Artificial neural networks
,
Data compression
2023
In the continuous progress of mobile internet technology, medical image processing technology is also always being upgraded and improved. In this field, digital watermarking technology is significant and provides a strong guarantee for medical image information security. This paper offers a robustness zero watermarking strategy for medical pictures based on an Improved NasNet-Mobile convolutional neural network and the discrete cosine transform (DCT) to address the lack of robustness of existing medical image watermarking algorithms. First, the structure of the pre-training network NasNet-Mobile is adjusted by using a fully connected layer with 128 output and a regression layer instead of the original Softmax layer and classification layer, thus generating a regression network with 128 output, whereby the 128 features are extracted from the medical images using the NasNet-Mobile network with migration learning. Migration learning is then performed on the modified NasNet-Mobile network to obtain the trained network, which is then used to extract medical image features, and finally the extracted image features are subjected to DCT transform to extract low frequency data, and the perceptual hashing algorithm processes the extracted data to obtain a 32-bit binary feature vector. Before performing the watermark embedding, the watermark data is encrypted using the chaos mapping algorithm to increase data security. Next, the zero watermarking technique is used to allow the algorithm to embed and extract the watermark without changing the information contained in the medical image. The experimental findings demonstrate the algorithm’s strong resistance to both conventional and geometric assaults. The algorithm offers some practical application value in the realm of medicine when compared to other approaches.
Journal Article
A Survey of Green Mobile Networks: Opportunities and Challenges
2012
The explosive development of Information and Communication Technology (ICT) has significantly enlarged both the energy demands and the
CO
2
emissions, and consequently contributes to make the energy crisis and global warming problems worse. However, as the main force of the ICT field, the mobile networks, are currently focusing on the capacity, variety and stability of the communication services, without paying too much severe concerns on the energy efficiency. The escalating energy costs and environmental concerns have already created an urgent need for more energy-efficient “green” wireless communications. In this paper, we survey and discuss various remarkable techniques toward green mobile networks to date, mainly targeting mobile cellular networks. We also summarize the current research projects related to green mobile networks, along with the taxonomy of energy-efficiency metrics. We finally discuss and elaborate future research opportunities and design challenges for green mobile networks.
Journal Article