The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is a strong focus on the use of Web Real-Time Communication (WebRTC) for many-to-many video conferencing, while the IETF working group has left the signalling issue on the application layer. The main aim of this paper is to create a novel scalable WebRTC signalling mechanism called WebNSM for many-to-many (bi-directional) video conferencing. WebNSM was designed for unlimited users over the mesh...
This paper describes the Web Real-Time Communication (WebRTC) technology and the implementation of its clients and server. The main aim is to design and implement WebRTC video conferencing between browsers in real implementation using Chrome and (Wired & WiFi) of LAN & WAN networks. Also, an evaluation of CPU performance, bandwidth consumption and Quality of Experience (QoE) was achieved....
This paper investigates the UWB channel to focus the light on the multi-user and their impact on the UWB communication performance. We addressed the performance evaluation of Time Hopping Ultra-Wideband (TH-UWB) system with the Pulse Position Modulation (PPM) by assuming multiuser scenarios. The channel used here is the IEEE 802.15.3a that consists of Channel Models (CM1∼CM4). Moreover, a Rake receiver...
In wireless communication, there exists a phenomenon know as ‘multipath’. This phenomenon is considered as a disadvantage because it causes interference. The multipath phenomenon results in an antenna receiving two or more signals from the same sent signal from different paths. This paper considers them as redundant copies of the transmitted data and utilises them to improve the performance of forward...
There has been a strong focus on the evaluation of Quality of Service (QoS) and multimedia transmission over protocols of internet protocol (IP). The main goal of this paper is to evaluate the performance of QoS in real implementation, also a comparison of an appropriate video and voice (CODECS) over IP schemes depending on the SIP and IAX2 protocols based on the Asterisk PBX server(s), an open source...
Software Defined Network (SDN) provides a new fine-grained interface enables the routing algorithm to have an a global view of the network throughputs, connectivity and flows at the data-path. This paper aims to provide a novel approach for dynamic routing algorithm for Software Defined Network in Wide Area Network (SDN-WAN); based on using a modified shortest-widest path algorithm with a fine-grained...
Location-based services (LBS) are becoming important services on today's smartphones (SPs), tablets and wearable devices. Seamless outdoors-indoors navigation, and especially for accurate indoors localization, is the main demand of LBS users. Onboard WiFi, Bluetooth (BT) or inertial-sensors technologies have been proven to somewhat provide alternative solutions in GNSS-signal-denied areas (i.e. indoors)...
It is noticeable that most of VANETs communications tests are assessed through simulation. In a majority of simulation results, the physical layer is often affected by an apparent lack of realism. Therefore, vehicular channel model has become a critical issue in the field of intelligent transport systems (ITS). To overcome the lack of realism problem, a more robust channel model is needed to reflect...
In the recent year's vehicular ad hoc networks VANETs has received significant attention in the intelligent transport system research. Vehicle-to-vehicle V2V communication can be considered an important approach to help the drivers to satisfy requirements like less congestion, accident warning, road exploration, etc. The propagation issues such as path loss, multipath fading, shadowing loss, depolarization...
The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption techniques in wireless communication as well. The review...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.