نتایج جستجو برای: سیستم gsm

تعداد نتایج: 78769  

Journal: :Land 2023

Grain Scale Management (GSM) is a crucial factor in ensuring national food security. However, countries facing rigid resource constraints and complex land tenure relationships, the strategy of promoting large-scale grain management through rights transfer may not be sustainable. Therefore, based on traditional agricultural division labor theory, we analyze mechanism rationality Agricultural Pro...

Journal: :CoRR 2013
Beena Joy Chirayil

In this paper a method to facilitate M2M communication using existing GSM networks is proposed – as M2M devices primarily use SMS as their data bearer, the focus is on increasing the number of devices that can use the associated GSM signaling channels at a time. This is achieved by defining a new class of low mobility, static M2M devices which use a modified physical layer control frame structu...

2012
Ioannis Psaroudakis Vasilios Katos Pavlos S. Efraimidis

The proposed framework describes a service for users that gives them the ability to make gsm calls from their smartphones without revealing their identity. The principle to achieve that is simple: instead of using your cell phone to make a call, pick somebody else’s phone to do so. We proposed an infrastructure of smartphones, sip registrars and sip proxies to provide caller anonymity. We devel...

Journal: :Security and Communication Networks 2015
Ioannis Psaroudakis Vasilios Katos Pavlos S. Efraimidis

Considering the widespread adoption of smartphones in mobile communications and the well-established resource sharing use in the networking community, we present a novel mechanism to achieve anonymity in the Global System for Mobile Communications (GSM). We propose a Voice over Internet Protocol infrastructure using the Session Initiation Protocol (SIP) where a smartphone registers on a SIP reg...

2010
Laura Cutillas Sánchez Claes Beckman

Mobile users need more capacity and higher velocity to work with new data applications. In order to satisfy these requirements, mobile systems of third generation were created and they are established every day in more places. Consequently second and third generation of system have to coexist. In this paper is presented a study about the coexistence between GSM and UMTS, the most popular system...

Journal: :CoRR 2010
Steven Meyer

Since 1998 the GSM security has been academically broken but no real attack has ever been done until in 2008 when two engineers of Pico Computing (FPGA manufacture) revealed that they could break the GSM encryption in 30 seconds with 200’000$ hardware and precomputed rainbow tables. Since then the hardware was either available for rich people only or was confiscated by government agencies. So C...

1999
J. D. Neale E. V. Jones J. T. Zubrzycki

Remote news reporting via fixed telephones suffers from a lack of mobility and sound quality limitations. Options for the design of a GSM/DECT dual-standard mobile terminal for broadcast news gathering are presented. Simulation results show that GSM HSCSD could carry MPEG encoded audio and occasional pictures. Computer simulations demonstrate that a mean of 3 GSM channels (aggregate of 28.8kb/s...

2000
Laurent Besacier Sara Grassi Alain Dufaux Michael Ansorge Fausto Pellandini

This paper investigates the influence of GSM speech coding on text independent speaker recognition performance. The three existing GSM speech coder standards were considered. The whole TIMIT database was passed through these coders, obtaining three transcoded databases. In a first experiment, it was found that the use of GSM coding degrades significantly the identification and verification perf...

Journal: :Telecommunication Systems 2011
Cheng-Chi Lee I-En Liao Min-Shiang Hwang

In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between VLR; (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with authentication of mobile stations; and (e) ...

Journal: :J. Comput. Physics 2015
Abouzar Kaboudian Peyman Tavallali Boo Cheong Khoo

Original and modified variants of the Ghost Solid Method (GSM) are proposed for application to the boundary conditions at the solid-solid interface of isotropic elastic-plastic materials, in a Lagrangian framework. The methods are discussed for one dimensional as well as two dimensional settings with slip and no-slip conditions. It is shown, in the presence of the wave propagation through the s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید