Performances study of compact printed diversity antenna in the presence of user's body for LTE mobile phone applications

Author(s):  
Hari Shankar Singh ◽  
Rahul Upadhyay ◽  
Raed M. Shubair
2012 ◽  
Vol 2012 ◽  
pp. 1-6 ◽  
Author(s):  
Bunggil Yu ◽  
Chang Won Jung ◽  
Haechun Lee ◽  
Myun-Joo Park ◽  
Byeongkwan Kim ◽  
...  

Here a compact wideband diversity antenna covering the PCS/UMTS/WiMAX bands with high isolation and low enveloped correlation coefficient (ECC) is proposed. To widen the bandwidth, the proposed antenna uses a structure with a gap-coupled feed and an inductively shorted line that has capacitive compensation between the radiator and the ground plane. Also, a suspended line with a parasitic element is used to enhance the isolation between the two antennas.


2020 ◽  
Vol 2020 ◽  
pp. 1483-1484
Author(s):  
Masoumeh Hosseinpour ◽  
◽  
Ralf Terlutter ◽  
Holger Roschk

2017 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
Is Mardianto ◽  
Kuswandi Kuswandi

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES


2006 ◽  
Vol 23 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Nor Shahriza Abdul Karim ◽  
Siti Hawa Darus ◽  
Ramlah Hussin

Author(s):  
Thaísa C. Lacerda ◽  
Juliane V. Nunes ◽  
Christiane Gresse von Wangenheim

In this chapter, we discuss the importance of evaluating the usability of mobile applications using tools and technics that consider their specific characteristics. One common way to evaluate usability is using heuristics. However, since many assumptions regarding usability of computer applications are not true for mobile applications, a question arises: does there exist usability heuristics specific for this type of device? To answer this question, we conducted a systematic literature review. We mapped the encountered sets of heuristics to Nielsen's ten heuristics and identified additional ones specifically proposed for this kind of device. Our review indicates that research with respect to usability heuristics for mobile phones are still sparse. Nevertheless, this chapter provides an overview on the state of the art that can guide the design and evaluation of interfaces for mobile applications as well as provide a starting point for the evolution of such customized heuristics.


Sign in / Sign up

Export Citation Format

Share Document