PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
In this paper, we consider the mobility management in highly dynamic multi-hop wireless networks (HDNet) used for military communication. We propose a mobility management solution that is the combination of macro mobility management using several HAs and micro mobility management integrating location management with routing. The
main advantage of our scheme is that it considerably reduces the location update overhead and especially cares for reliability and survivability. Simulation results show our scheme is suitable for highly dynamic networks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Computing today is becoming pervasive. To provide pervasive computing environments flexible, dynamic and less distractive security mechanisms, trust managements are introduced. However, current trust frameworks are designed for specific scenarios and can’t fulfill requirements in different environments, which leads to that these trust frameworks can’t be deployed in different environments and pervasive devices can’t enjoy pervasive computing anywhere really. To remedy this problem, this paper proposes a universal trust framework. In our framework, the flexible attribute vector model is used to represent trust evidence that are needed to evaluate trust relationships, thus the framework can work in identity-based trust environments as well as context-based trust environments. Besides,
the universal trust framework defines four kinds of trust relationships that are suitable o model trust relationships in
various scenarios. In a word, the proposed universal trust framework is an especially designed trust framework that can unify trust management in different pervasive computing cases.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6
address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is
analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Self-organized time division multiple access ( SOTDMA) is an advanced wireless communication technology used in quick automatic networking. Also self-organized network is an equity network, which is provided with selforganized characteristics. First, the paper analyses the technology and characteristics of self-organized network and
puts forward network architecture with self-organized model for different environments. Then it discusses the message transport protocol of SOTDMA, further gives a clear description of the functions for each layer in the network architecture. Second, the paper studies the access algorithms of SOTDMA, providing a full flow for the realization of this algorithm. Finally, the paper induces the practical application of this technology, and raises an
integrated principle diagram of wireless user terminal networking based on SOTDMA.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We are witnessing the exploding development of Mobile Geoinformation Services(MGS). However, MGS is a complex system engineering involving many different technological fields or disciplines. There are many problems still existing and deserving to be further clarified and studied. Based on the analysis of the derivation of MGS and different
related terms, a relatively universal concept of MGS is first defined in this paper. After that, this paper illuminates the present application level in China by summarizing the five modes that exist in all application related to MGS. In addition, five aspects of problems that hinder MGS from developing on a large scale are put forward. Finally the paper concludes that the implementation of MGS can be only performed on a limited basis in current China and there are still many barriers that prevent MGS from reaching its full potentials.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
WLAN-Based softswitch access system can provide users voice service and all kinds of value-added services using softswitch technology. Softswitch can also help solve the security problem of WLAN.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
To meet the urgent need of personal communication and hign-speed data services,the standardization and products development for International Mobile Telecommunication-2000 (IMT-2000) have become a hot point in wordwide. The wireless location for mobile terminals has been an important research project. Unlike GPS which is located by 24 artificial satellities, it is based on the base-station of wireless cell network, and the research and development of it are correlative with IMT-2000. While the standard for the third generation mobile telecommunication (3G)-TD-SCDMA, which is proposed by China and the intellective property right of which is possessed by Chinese, is adopted by ITU-T at the first time, the research for wireless location based on TD-SCDMA has theoretic meaning, applied value and marketable foreground. First,the basic principle and method for wireless location, i.e. Direction of Angle(DOA), Time of Arrival(TOA) or Time Difference of Arrival(TDOA), hybridized location(TOA/DOA,TDOA/DOA,TDOA/DOA),etc. is introduced in the paper. So the research of DOA is very important in wireless location. Next, Main estimation methods of DOA for wireless location, i.e. ESPRIT, MUSIC, WSF, Min-norm, etc. are researched in the paper. In the end, the performances of DOA estimation for wireless location based on mobile telecommunication network are analyzed by the research of theory and simulation experiment and the contrast algorithms between and Cramer-Rao Bound. Its research results aren't only propitious to the choice of algorithms for wireless location, but also to the realization of new service of wireless location .
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Adaptive signal processing as a new subject, is widely used to telecommunication, radar, industrial control, earthquake detection , biomedicine and electronics field,etc.. In recent years, the great progress has been made in the theory, method and application of adaptive signal processing. The application of adaptive signal processing to mobile telecommunication is researched in the paper, The basic algorithms for adaptive wireless signal processing, i.e. Least Mean Square(LMS),Sequence Regression(SER),Recursion Least Square(RLS) and Random Search(RS),etc. are mainly analyzed and the performance of these algorithms are compared in the paper. It is propitious to choice and amelioration of the adaptive algorithms for different surroundings and condition in reason.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Channel estimation is the key technology in MIMO-OFDM system design. In this paper, we propose a novel robust frequency domain diversity time domain combining(FDTC) channel estimation algorithm. Compared with the existing LS and trans-domain estimation methods, the proposed algorithm shows lower MSE and BER. And the FDTC algorithm
has better robust and lower calculating complexity.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Non-line-of-sight (NLOS) propagation is one of the main errors in accurate wireless location positioning system. This paper first briefly discusses some new NLOS error mitigation algorithms, then presents a novel combined location positioning algorithm, the simulation results show that it provides quite improvement than linear line of position algorithm and Taylor series algorithm.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the fast development of Multimedia Message Service (MMS), MMS has penetrated people’s life as an important way for real-time communication of message. Clients use the service everyday to make, send and transmit huge amount of real-time multimedia messages. Usually the filtering application can block messages by lists of addresses (Black/White list) or use traditional Text/Keyword filtering methods. We propose a new filtering scheme by using content-based image analysis technology, which can help filter trash messages in MMS, while the route scheme is adapted for the goal of content-based real-time blocking system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Collision avoidance is one of the most important problems in autonomous vehicles, ship navigation, and robot manipulators, etc. Image processing technique could be applied for solving the collision avoidance of moving objects. The collision could be avoided if the direction of the moving object could be accurately anticipated. The problem is how to anticipate the expected path of the moving object, so that the other moving objects in the expected path should be detected and avoided for collision avoidance. Collisions could be avoided by searching the obstacles and moving objects in the expected path, but the moving objects, which would come inside the expected path, should also be detected for fully collision avoidance. In this paper, the expected path of the moving object is determined from the previous history of the moving object using the statistical measurements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
As we know, medical informatics can improve diagnosis, treatment, disease prevention and failure prevention in hospitals and clinics. Due to the ability to real time access information at anytime and anywhere, wireless medical informatics can minimize mobile errors, optimize healthcare delivery and simplify workflow. This paper describes the overall architecture and primary functionality of a mobile e-care system that tries to complement existing hospital information systems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The fundamental of QCELP speech coding technology is introduced. According to the features of TMS320C54X family DSP of TI Inc., the implementation approach of QCELP speech coding with fixed-point DSP (digital signal processor) is presented.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents several key technologies in the Mobile Location Based Service (MLBS) system of Shanghai. In the paper, the author presents a solution of handset mobile terminal, PDA+GPS+GSM/GPRS. The paper particularly introduces the hardware of the terminal and the acquirement of GPS information at the terminal. The paper also
introduces how the terminal communicates with the special service center.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Project background: we are engaged in research on service management for mobile Internet. It is well known that Internet will primarily become a service-driven-network, and services will be differentiated. The motivation for service management is to make service management automation, and the users will discovery all kinds of services provided by service providers conveniently. In order to reach theses goals, the one of the key issues for service description, or service
definition must be resolved. So, we research below three aspects’ issues: the firstly, the application services are classified, all the properties for every type of service are researched. Secondly, in order to model the service data model, we build the meta-model to describe the service data model, based on these meta-models, a general service data model is built in a kind of oriented-object modeling language, EXPRESS. Finally, based on the service data model described by EXPRESS and the definition for service template, a concrete service template can be generated by a tool for generating
service template automatically.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Shape descriptions based on the traditional chain codes are very susceptible to small perturbations in the contours of the objects. Therefore, direct matching of traditional chain codes could not be used for image retrieval based on the shape boundaries from the large databases. In this paper, a histogram based chain codes are proposed which could be used for image retrieval. The modified chain codes matching are invariant to translation, rotation and scaling transformations, and have high immunity to noise and small perturbations.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
With the development of mobile telecommunication network, users of CDMA advanced their request of network service quality. While the operators also change their network management object from signal coverage to performance improvement. In that case, reasonably layout & optimization of mobile telecommunication network, reasonably configuration of network resource, improvement of the service quality, and increase the enterprise's core competition ability, all those have been concerned by the operator companies.
This paper firstly looked into the flow of CDMA network optimization. Then it dissertated to some keystones in the CDMA network optimization, like PN code assignment, calculation of soft handover, etc. As GSM is also the similar cellular mobile telecommunication system like CDMA, so this paper also made a contrast research of
CDMA and GSM network optimization in details, including the similarity and the different. In conclusion, network optimization is a long time job; it will run through the whole process of network construct. By the adjustment of network hardware (like BTS equipments, RF systems, etc.) and network software (like parameter optimized, configuration optimized, capacity optimized, etc.), network optimization work can improve the performance and
service quality of the network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
CC/PP (Composite Capability/Preference Profile) is a mechanism for content negotiation and adaptation between users and servers. The heterogeneity in communication devices and difference between application situations make it difficult to guarantee the compatibility of CC/PP documents. This increases CC/PP parsing time, and decreases service quality. The compatibility and efficiency are two contrary requirements. In this paper, we compare different approaches of CC/PP resolution. We introduce our CC/PP Parser design that is based on the UAProf CC/PP Schema and employs Java Factory Mode and XML SAX parser. We try to solve both the compatibility and efficiency problems. The parsing speed is 3-5 times that with RDF Parser. The coordination between server-adaptation and proxy-adaptation via CC/PP is simple and effective. The proxy and server can focus on adaptations optimized for free and paid services respectively, and system performance can be improved. Our system is configurable with an XML setup file. The existing approaches for CC/PP security and privacy protection decrease service quality. We suggest performing P3P comparison in the proxy. Our P3P approach increases service performance and can be integrated into the coordination model of server-adaptation and proxy-adaptation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Mobile IPv6 enables network nodes to roam in the IPv6 Internet. It is the main protocol for mobile Internet. Supported by Mobile IPv6, the Internet node can roam regardless of its changing of IP address. However during Mobile IPv6 handover procedure, the Internet node has a period of communication interruption. Thus the mobile Internet system has handover latency and packet loss. Also because Home Agent (HA) is in charge of registration of Mobile Node (MN) and tunneling packets for MN, it potentially has overflow problem. These three problems are especially obvious in multimedia networks with many users. So in this article, we propose a new Mobile IPv6
handover method to reduce handover latency and packet loss, and to overcome overflow of HA. We have evaluated the proposed handover method over IEEE 802.11b wireless LAN system by using NS2 simulation
platform, and confirmed the effectiveness of the new method.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.