نتایج جستجو برای: شبکه gsm

تعداد نتایج: 40065  

2005
RAFAEL ÁLVAREZ ANTONIO ZAMORA

As standard GSM protection methods are now well-known to be insecure, we have designed a new secure communication system over GSM network which is developed using the Symbian OS platform. It uses standard cryptographic methods such as key generators, key exchange protocols and public and private key cipher algorithms. This system allows communicating text, voice and any kind of data securely ov...

Journal: :International Journal of Advanced Computer Science and Applications 2023

In graph analytics, the identification of influential nodes in real-world networks plays a crucial role understanding network dynamics and enabling various applications. However, traditional centrality metrics often fall short capturing interplay between local global information. To address this limitation, Global Structure Model (GSM) its improved version (IGSM) have been proposed. Nonetheless...

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). The mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and encryption keys of greater strength than the indiv...

2006
Weiming Zhang You Li Dongbo Liu

Schema matching is a basic problem nowadays in many application areas, such as data integration, data warehouse and e-business. In this paper, we propose a generic schema matching method called GSM (Generic Schema Matching) and its optimizing approaches. GSM provides an extensible library of match algorithms to support multi-strategy matching approach. It also uses a mapping knowledge base to l...

Journal: :Wireless Personal Communications 2012
Christoforos Ntantogian Christos Xenakis

Recently, Ahmadian and Salimi [1] presented and analyzed three different attacks that can be performed in UMTS-GSM interworking networks: (i) a real-time eavesdropping attack, (ii) an offline eavesdropping attack, and (iii) an impersonation attack. In this letter we question the feasibility of these attacks. In particular, we pinpoint and analyze that these attacks are based on some erroneous a...

1997
Thomas Hindelang Wen Xu Christian Erben

In GSM system, speech is coded in frames. Here the redundancy is characterized mainly by the statistical correlation among certain temporally neighboring coefficients or bits. In our investigations the redundancy among bits is first utilized to realize a source-controlled channel decoding [2], so that the bit error rate can be further reduced. Then based on the redundancy among coefficients an ...

Journal: :AJNR. American journal of neuroradiology 2000
T J Tegos M Sohail M M Sabetai P Robless N Akbar G Pare G Stansby A N Nicolaides

BACKGROUND AND PURPOSE Our hypothesis was that the carotid plaques associated with retinal and cerebrovascular symptomatology and asymptomatic presentation may be differ from each other. The aim of this study was to identify the sonographic and histopathologic characteristics of plaques that corresponded to these three clinical manifestations. METHODS The echo process involved duplex preopera...

Journal: :Atherosclerosis 2011
P Monica Lind Lars Lind

BACKGROUND AND OBJECTIVE Bisphenol A (BPA) levels have previously been associated with coronary heart disease (CHD). Since CHD is an atherosclerotic disease, we investigated if circulating levels of BPA and phthalate metabolites are related to atherosclerosis in a cross-sectional study. METHODS In the population-based Prospective Investigation of the Vasculature in Uppsala Seniors (PIVUS) stu...

2015
M. Gambacciani M. Levancini M. Cervigni

Aim To evaluate the effects of the vaginal erbium laser (VEL) in the treatment of postmenopausal women suffering from genitourinary syndrome of menopause (GSM). Method GSM was assessed in postmenopausal women before and after VEL (one treatment every 30 days, for 3 months; n = 45); the results were compared with the effects of a standard treatment for GSM (1 g of vaginal gel containing 50 μg of...

2012
R.Anil Kumar K. RameshBabu

With ARM7 as the core, this paper discusses a kind of design of vehicle location system. The new mobile vehicle Positioning architecture and working theory of this system is integrated by a lot of hardware modules such as ARM microprocessor LPC2129 as a control unit to combinative with GPS LR9548 and GSM TC35 modules By the hardware/software co-design, the new mobile vehicle Positioning system ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید