9 Hits in 2.3 sec

PARS: Position based Anonymous Routing Scheme in MANETs

Remya S, Lakshmi K S
2014 IOSR Journal of Computer Engineering  
Mobile Ad hoc Networks (MANET) comprises of self-organizing autonomous mobile nodes. MANETs are open and decentralized. Therefore they are vulnerable to malicious entities.  ...  Anonymity means secure communications by hiding node identities and preventing traffic analysis attacks by outside observers.  ...  Anonymity Increase the anonymity protection of the source light weight mechanism called" broadcast to neighbors" issued.  ... 
doi:10.9790/0661-16357582 fatcat:6c6nomgnivgtrnhu5bb2uq4g2i

Towards privacy-compliant mobile computing [article]

Paarijaat Aditya, Universität Des Saarlandes, Universität Des Saarlandes
new applications and services, they also introduce entirely new threats to users' privacy because they can capture a complete record of the user's location, online and offline activities, and social encounters  ...  Sophisticated mobile computing, sensing and recording devices like smartphones, smartwatches, and wearable cameras are carried by their users virtually around the clock, blurring the distinction between  ...  In this project, we leverage the notion of addressable secure encounters introduced in SDDR to build EnCore, a communication platform that provides powerful new capabilities to mobile social apps, with  ... 
doi:10.22028/d291-27563 fatcat:qoei66bx6bc25gauvs6n4col4q

Cross-Layer Optimization for Power-Efficient and Robust Digital Circuits and Systems [article]

Yanxiang Huang
2017 arXiv   pre-print
Moreover, Chapter 6 presents a power reduction potential in a Massive MIMO application, by embracing light-weight but erroneous hardware.  ...  The mobile phone of the future has to provide seamless connectivity anywhere and anytime. Around 2020, the new 5G mobile networks are expected to be deployed [Andrews, 2014] .  ... 
arXiv:1712.03948v1 fatcat:b564kq3gkjhwfpgtjenzgs23em

Mali: Poverty Reduction Strategy Paper

International Monetary Fund
2013 IMF Staff Country Reports  
Weight insufficiency (low weight: age index) was 18.9 percent in 2010 (MICS), 6 against 26.7 percent in 2006 (EDSM IV).  ...  In the case of weight insufficiency, 20.4 percent of the children are affected in rural areas, against 14.3 percent in urban areas. 76.  ... 
doi:10.5089/9781484398296.002 fatcat:wtjfz2nfkvhubc5ep3koqzr3ee

Mali: Poverty Reduction Strategy Paper

International Monetary Fund
2003 IMF Staff Country Reports  
These certificates provide some information such as: • the weight of the exported quantity in kg, • the weight of refined gold in ounces, • the weight of silver in the exported quantity in ounces, • the  ...  The major problems encountered consists mainly in the nonfinalization of the Drinking Water Sanitation Sector Programme (PROSEPA), the non-mobilization of adequate financing to support emergency programmes  ...  Extension of scope of social security A legal and institutional framework adapted to the missions of the ministry is defined.  ... 
doi:10.5089/9781451826258.002 fatcat:fvhdpawc3bh3pecezmu4dkf32a

Towards improved statistical analyses of the cosmic dawn and epoch of reionisation

Thomas Binnie, Jonathan Pritchard, Andrew Jaffe, Science And Technology Facilities Council (Great Britain)
Its sensitivity is so impressive that it would be able to detect a mobile phone within 10 light years.  ...  However we encountered computational issues when trying to include a fuller analysis since the MPS requires processing of the entire light-cone in one go -a light-cone of similar size to those calculated  ...  Similarly when comparing the three brightness temperature light-cone slices for these three models, light-cones 2 (red) and 5 (magenta) are visually similar across the redshift range while 1 (light-blue  ... 
doi:10.25560/89973 fatcat:z4ptykxdevhpjcelbecz72jhg4

User-centred and context-aware identity management in mobile ad-hoc networks

A Arabo
Synopsis A thesis presented on the security issues of Identity Management in Mobile Adhoc Networks, considering the issues and utilisation of contextual information, user-centricity and user control in  ...  The main focus of this thesis is on the area of identity management in MANets and emergency situations by using context-awareness and user-centricity together with its security issues and implications.  ...  Secure Cash Withdrawal through Mobile Phone/Device.  ... 
doi:10.24377/ljmu.t.00006103 fatcat:xrfm7mkse5a47nzhd5srsoiplu

Mathematical Models and Monte-Carlo Algorithms for Improved Detection of Targets in the Commercial Maritime Domain

Lyudmil Vladimirov
The Monte-Carlo nature of Particle Filters places them as the ideal candidate for solving the highly non-linear, non-Gaussian problems encountered by modern VTMS systems.  ...  Commercial Vessel Traffic Monitoring Services (VTMSs) are widely used by port authorities and the military to improve the safety and efficiency of navigation, as well as to ensure the security of ports  ...  Sensor Models Stones Soup contains a SensorPlatform class that represents a mobile platform that can move in 2D or 3D space to represent the motion of an aircraft, ship, or other mobile sensor.  ... 
doi:10.17638/03118824 fatcat:dugu3s3ewfg5dpoufekhly2tqu

Population-Development-Environment: Understanding Their Interactions in Mauritius

I. W., Wolfgang Lutz
1995 Population  
and age of dependents (TDR-LF-P-AD), or alternatively socia-demographic dependency ratio (SDDR).  ...  There is a growing demand for greater personal mobility and movement of goods.  ... 
doi:10.2307/1534221 fatcat:7qtzalioh5ellk43x257gqwpqe