scholarly journals APPLICATION OF PLANAR BROADBAND SLOW-WAVE SYSTEMS / PLANARIŲJŲ PLAČIAJUOSČIŲ LĖTINIMO SISTEMŲ TAIKYMO SRITYS

2012 ◽  
Vol 4 (1) ◽  
pp. 85-88
Author(s):  
Edvardas Metlevskis

Different types of planar broadband slow-wave systems are used for designing microwave devices. The papers published by Lithuanian scientists analyze and investigate the models of helical and meander slow-wave systems. The article carefully examines the applications of meander slow-wave systems and presents the areas where similar systems, e.g. mobile devices, RFID, wireless technologies are used and reviewed nowadays. The paper also focuses on the examples of the papers discussing antennas, filters and couplers that contain designed and fabricated meander slow-wave systems. Santrauka Mikrobangų įtaisams projektuoti plačiai taikomos įvairių konstrukcijų planariosios plačiajuostės lėtinimo sistemos. Lietuvos mokslininkų darbuose nagrinėjami spiralinių ir meandrinių lėtinimo sistemų modeliai, tiriamos jų savybės. Darbe aptariamos meandrinių lėtinimo sistemų taikymo sritys. Apžvelgiamos mobiliųjų įrenginių, radijo dažnio identifikavimo, belaidžio ryšio technologijų sritys, kuriose tokios sistemos yra dažniausiai taikomos. Pateikiami darbų, kuriuose taikant meandrines lėtinimo sistemas projektuojamos bei gaminamos antenos, filtrai ir šakotuvai, pavyzdžiai.

Author(s):  
C. Liu

Bluetooth (2001) is one of the low-bandwidth, energy-efficient wireless technologies designed for mobile devices. As the technology spreads widely in various applications, more and more services and functions are brought to the front, so different types of devices may be equipped with the Bluetooth module and appear in the same area. However, when nodes for different services come together, the need for forming a network comes out.


2011 ◽  
pp. 203-230
Author(s):  
Kin Choong Yow ◽  
Nitin Mittal

The evolution in mobile messaging and mobile devices has made it possible to provide multimedia rich messaging capabilities to personal digital assistants (PDAs). The need for this arises simply because mobile service providers want to provide an enhanced messaging experience to the user. It also opens up new avenues for business, such as a shopping mall scenario. This chapter discusses the development of a multimedia messaging client for a PDA and a kiosk providing multimedia messages composition, search, share, and sending capabilities. This chapter also discusses the various messaging technologies, enabling wireless technologies, and the peer-to-peer model. The peer-to-peer technology used was Jxta, an XML-based and language agnostic peer-to-peer platform specification from Sun Microsystems. The peers (PDA client and the kiosk) were implemented using the application programming interfaces provided by the Personal Java reference implementation and the Jxta platform’s Personal Java port.


2008 ◽  
pp. 129-150
Author(s):  
K. C. Yow ◽  
N. Mittal

The evolution in mobile messaging and mobile devices has made it possible to provide multimedia rich messaging capabilities to personal digital assistants (PDAs). The need for this arises simply because mobile service providers want to provide an enhanced messaging experience to the user. It also opens up new avenues for business, such as a shopping mall scenario. This chapter discusses the development of a multimedia messaging client for a PDA and a kiosk providing multimedia messages composition, search, share, and sending capabilities. This chapter also discusses the various messaging technologies, enabling wireless technologies, and the peer-to-peer model. The peer-to-peer technology used was Jxta, an XML-based and language agnostic peer-to-peer platform specification from Sun Microsystems. The peers (PDA client and the kiosk) were implemented using the application programming interfaces provided by the Personal Java reference implementation and the Jxta platform’s Personal Java port.


2010 ◽  
Vol 1 (4) ◽  
pp. 1-24 ◽  
Author(s):  
Josephina Antoniou ◽  
Christophoros Christophorou ◽  
Augusto Neto ◽  
Susana Sargento ◽  
Filipe Pinto ◽  
...  

The increase of networking complexity requires the design of new performance optimization schemes for delivering different types of sessions to users under different conditions. In this regard, special attention is given to multi-homed environments, where mobile devices cross areas with overlapping access technologies (Wi-Fi, 3G, WiMax). In such a scenario, efficient multiparty delivery depends upon the grouping operation, which must be done based on several parameters. In this paper, the authors propose context-aware sub-grouping of content-based service groups so that the same service session can be delivered using different codings of the same content, adapting to current network, users, session, and environment context. The context-aware information is used to improve the sub-grouping process. This paper aims to describe these sub-grouping techniques, and in particular how they improve network performance and user experience in the future Internet by focusing on the improved network-level and session-level mechanisms.


SLEEP ◽  
2019 ◽  
Vol 42 (Supplement_1) ◽  
pp. A7-A7
Author(s):  
Mark R Zielinski ◽  
Dmitry Gerashchenko ◽  
Kayla Torres ◽  
Dhruviben Patel ◽  
Gretchen Desrosiers

2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Yilei Wang ◽  
Chuan Zhao ◽  
Qiuliang Xu ◽  
Zhihua Zheng ◽  
Zhenhua Chen ◽  
...  

With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.


Author(s):  
Hosam Alamleh ◽  
Ali Abdullah S. AlQahtani

<p>Mobile devices can sense different types of radio signals. For example, broadcast signals. These broadcasted signals allow the device to establish a connection to the access point broadcasting it. Moreover, mobile devices can record different physical layer measurements. These measurements are an indication of the service quality at the point they were collected. These measurements data can be aggregated to form physical layer measurement maps. These maps are useful for several applications such as location fixing, navigation, access control, and evaluating network coverage and performance. Crowdsourcing can be an efficient way to create such maps. However, users in a crowdsourcing application tend to have different devices with different capabilities, which might impact the overall accuracy of the generated maps. In this paper, we propose a method to build physical layer measurements maps by crowdsourcing physical layer measurements, GPS locations, from participating mobile devices. The proposed system gives different weights to each data point provided by the participating devices based on the data source’s trustworthiness. Our tests showed that the different models of mobile devices return GPS location with different location accuracies. Consequently, when building the physical layer measurements maps our algorithm assigns a higher weight to data points coming from devices with higher GPS location accuracy. This allows accommodating a wide range of mobile devices with different capabilities in crowdsourcing applications. An experiment and a simulation were performed to test the proposed method. The results showed improvement in crowdsourced map accuracy when the proposed method is implemented.</p>


Sign in / Sign up

Export Citation Format

Share Document