نتایج جستجو برای: like mobile

تعداد نتایج: 813702  

Journal: :IEICE Transactions 2013
Tomohiko Mimura Koji Yamamoto Masahiro Morikura Ayako Iwata Takashi Tamura

In this paper, we introduce a new multi-operator pico eNodeB (eNB) concept for cellular networks. It is expected that mobile data offloading will be performed effectively after installing the pico eNBs in cellular networks, owing to the rapid increase in mobile traffic. However, when several different operators independently install the pico eNBs, high costs and large amounts of space will be r...

Journal: :Computer Networks 2007
Zhenqiang Ye Lap Kong Law Srikanth V. Krishnamurthy Zhong Xu Suvidhean Dhirakaosal Satish K. Tripathi Mart Molle

In wireless cellular networks, a roaming mobile station (MS) is expected to move from one cell to another. In order to ensure that ongoing calls are not dropped while the owner mobile stations roam among cells, handoff calls may be admitted with a higher priority than newly generated calls. Predictive channel reservation (or pre-reservation) schemes allow the reservation of a channel for an ong...

Journal: :CoRR 2006
Darko Fuduric Marko Horvat Mario Zagar

Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But...

Ali A. Saeidi

The main objective of this paper is to argue how the mobile phones have transformed the Iranian lifestyle and how the arrival of mobiles has been a catalyst for revolting behavior, and has launched a new consumer behavior and has changed our relationships. The paper explains how the people's behavior has developed a whole new social code in Iran. It is argued that the social value of being able...

Abstract Introduction: Mobile phones create high-frequency electromagnetic fields around them when in use. The close proximity of mobile phones to the user’s head leads to the absorption of part of the electromagnetic waves into the head and the brain. Methods: We have elucidated the alteration in cognitive function of the male and female offspring rats, which were exposed to chronic mobi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم انسانی 1390

the main purpose of this study was to investigate any relationship between high school efl teachers metaphorical understandings of their role in class and their self-efficacy beliefs. teachers metaphors were elicited through two different prompts: one picturing what they believed a language teacher should be like in class, and the other demonstrating what they are actually like in class; such...

2015
Suchita Rane Narendra Shekokar

Android Mobile devices are secured using various mechanisms like pattern, pin, and password. Biometric Authentication is an upcoming technology accepted by various android mobile manufactures for better security and with change in technology, time this mechanisms are vulnerable to various attacks like factory reset. Factory Reset will erase all the settings in the device and makes device vulner...

1998
Ashraf Iqbal Joachim Baumann Markus Straßer A. Iqbal J. Baumann M. Straßer Markus Strasser

Mobile agent technology has received a rapidly growing attention over the last few years. A number of mobile agent systems are under development in academic as well as industrial environments, there are already various moves to popularize and standardize mobile agent facilities and architectures. It has been argued that mobile agents provide certain advantages as compared to traditional approac...

Journal: :journal of advances in computer research 0
reza fotohi department of computer engineering, germi branch, islamic azad university, germi, iran roodabe heydari department of computer engineering, germi branch, islamic azad university, germi, iran shahram jamali department of computer engineering, mohaghegh ardabili university, ardabil, iran

mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...

2003
Jordi Herrera-Joancomartí Josep Prieto

Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in thes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید