نتایج جستجو برای: like mobile
تعداد نتایج: 813702 فیلتر نتایج به سال:
In this paper, we introduce a new multi-operator pico eNodeB (eNB) concept for cellular networks. It is expected that mobile data offloading will be performed effectively after installing the pico eNBs in cellular networks, owing to the rapid increase in mobile traffic. However, when several different operators independently install the pico eNBs, high costs and large amounts of space will be r...
In wireless cellular networks, a roaming mobile station (MS) is expected to move from one cell to another. In order to ensure that ongoing calls are not dropped while the owner mobile stations roam among cells, handoff calls may be admitted with a higher priority than newly generated calls. Predictive channel reservation (or pre-reservation) schemes allow the reservation of a channel for an ong...
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But...
The main objective of this paper is to argue how the mobile phones have transformed the Iranian lifestyle and how the arrival of mobiles has been a catalyst for revolting behavior, and has launched a new consumer behavior and has changed our relationships. The paper explains how the people's behavior has developed a whole new social code in Iran. It is argued that the social value of being able...
Abstract Introduction: Mobile phones create high-frequency electromagnetic fields around them when in use. The close proximity of mobile phones to the user’s head leads to the absorption of part of the electromagnetic waves into the head and the brain. Methods: We have elucidated the alteration in cognitive function of the male and female offspring rats, which were exposed to chronic mobi...
the main purpose of this study was to investigate any relationship between high school efl teachers metaphorical understandings of their role in class and their self-efficacy beliefs. teachers metaphors were elicited through two different prompts: one picturing what they believed a language teacher should be like in class, and the other demonstrating what they are actually like in class; such...
Android Mobile devices are secured using various mechanisms like pattern, pin, and password. Biometric Authentication is an upcoming technology accepted by various android mobile manufactures for better security and with change in technology, time this mechanisms are vulnerable to various attacks like factory reset. Factory Reset will erase all the settings in the device and makes device vulner...
Mobile agent technology has received a rapidly growing attention over the last few years. A number of mobile agent systems are under development in academic as well as industrial environments, there are already various moves to popularize and standardize mobile agent facilities and architectures. It has been argued that mobile agents provide certain advantages as compared to traditional approac...
mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...
Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in thes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید