A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
PARS: Position based Anonymous Routing Scheme in MANETs
2014
IOSR Journal of Computer Engineering
Mobile Ad hoc Networks (MANET) comprises of self-organizing autonomous mobile nodes. MANETs are open and decentralized. Therefore they are vulnerable to malicious entities. ...
Anonymity means secure communications by hiding node identities and preventing traffic analysis attacks by outside observers. ...
Anonymity Increase the anonymity protection of the source light weight mechanism called" broadcast to neighbors" issued. ...
doi:10.9790/0661-16357582
fatcat:6c6nomgnivgtrnhu5bb2uq4g2i
Towards privacy-compliant mobile computing
[article]
2018
new applications and services, they also introduce entirely new threats to users' privacy because they can capture a complete record of the user's location, online and offline activities, and social encounters ...
Sophisticated mobile computing, sensing and recording devices like smartphones, smartwatches, and wearable cameras are carried by their users virtually around the clock, blurring the distinction between ...
In this project, we leverage the notion of addressable secure encounters introduced in SDDR to build EnCore, a communication platform that provides powerful new capabilities to mobile social apps, with ...
doi:10.22028/d291-27563
fatcat:qoei66bx6bc25gauvs6n4col4q
Cross-Layer Optimization for Power-Efficient and Robust Digital Circuits and Systems
[article]
2017
arXiv
pre-print
Moreover, Chapter 6 presents a power reduction potential in a Massive MIMO application, by embracing light-weight but erroneous hardware. ...
The mobile phone of the future has to provide seamless connectivity anywhere and anytime. Around 2020, the new 5G mobile networks are expected to be deployed [Andrews, 2014] . ...
arXiv:1712.03948v1
fatcat:b564kq3gkjhwfpgtjenzgs23em
Mali: Poverty Reduction Strategy Paper
2013
IMF Staff Country Reports
Weight insufficiency (low weight: age index) was 18.9 percent in 2010 (MICS), 6 against 26.7 percent in 2006 (EDSM IV). ...
In the case of weight insufficiency, 20.4 percent of the children are affected in rural areas, against 14.3 percent in urban areas. 76. ...
doi:10.5089/9781484398296.002
fatcat:wtjfz2nfkvhubc5ep3koqzr3ee
Mali: Poverty Reduction Strategy Paper
2003
IMF Staff Country Reports
These certificates provide some information such as: • the weight of the exported quantity in kg, • the weight of refined gold in ounces, • the weight of silver in the exported quantity in ounces, • the ...
The major problems encountered consists mainly in the nonfinalization of the Drinking Water Sanitation Sector Programme (PROSEPA), the non-mobilization of adequate financing to support emergency programmes ...
Extension of scope of social security A legal and institutional framework adapted to the missions of the ministry is defined. ...
doi:10.5089/9781451826258.002
fatcat:fvhdpawc3bh3pecezmu4dkf32a
Towards improved statistical analyses of the cosmic dawn and epoch of reionisation
2021
Its sensitivity is so impressive that it would be able to detect a mobile phone within 10 light years. ...
However we encountered computational issues when trying to include a fuller analysis since the MPS requires processing of the entire light-cone in one go -a light-cone of similar size to those calculated ...
Similarly when comparing the three brightness temperature light-cone slices for these three models, light-cones 2 (red) and 5 (magenta) are visually similar across the redshift range while 1 (light-blue ...
doi:10.25560/89973
fatcat:z4ptykxdevhpjcelbecz72jhg4
User-centred and context-aware identity management in mobile ad-hoc networks
2017
Synopsis A thesis presented on the security issues of Identity Management in Mobile Adhoc Networks, considering the issues and utilisation of contextual information, user-centricity and user control in ...
The main focus of this thesis is on the area of identity management in MANets and emergency situations by using context-awareness and user-centricity together with its security issues and implications. ...
Secure Cash Withdrawal through Mobile Phone/Device. ...
doi:10.24377/ljmu.t.00006103
fatcat:xrfm7mkse5a47nzhd5srsoiplu
Mathematical Models and Monte-Carlo Algorithms for Improved Detection of Targets in the Commercial Maritime Domain
2021
The Monte-Carlo nature of Particle Filters places them as the ideal candidate for solving the highly non-linear, non-Gaussian problems encountered by modern VTMS systems. ...
Commercial Vessel Traffic Monitoring Services (VTMSs) are widely used by port authorities and the military to improve the safety and efficiency of navigation, as well as to ensure the security of ports ...
Sensor Models Stones Soup contains a SensorPlatform class that represents a mobile platform that can move in 2D or 3D space to represent the motion of an aircraft, ship, or other mobile sensor. ...
doi:10.17638/03118824
fatcat:dugu3s3ewfg5dpoufekhly2tqu
Population-Development-Environment: Understanding Their Interactions in Mauritius
1995
Population
and age of dependents (TDR-LF-P-AD), or alternatively socia-demographic dependency ratio (SDDR). ...
There is a growing demand for greater personal mobility and movement of goods. ...
doi:10.2307/1534221
fatcat:7qtzalioh5ellk43x257gqwpqe