33   Artículos

 
en línea
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry    
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dmitry Namiot,Vladimir Sukhomlin     Pág. 99 - 103
The paper describes the model of hyper-local Internet. This refers to a set of Internet resources that are, to one degree or another, relevant (useful) for users located in a certain limited area. At the same time, such a network is not visible outside t... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Javed Iqbal, Usman Illahi, Muhammad Abbas Khan, Abdul Rauf, Esraa Mousa Ali, Inam Bari, Haider Ali, Muhammad Amir Khan, Mohammad Alibakhshikenari and Mariana Dalarsson    
In this research article, a single-fed dual-band circular polarized (CP) dielectric resonator antenna (DRA) for dual-function communication, such as GPS and WLAN, was made. Initially, the proposed design process was initiated by designing a linearly pola... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammed Zahid Karakusak, Hasan Kivrak, Hasan Fehmi Ates and Mehmet Kemal Ozdemir    
Wireless Local Area Network (WLAN) positioning is a challenging task indoors due to environmental constraints and the unpredictable behavior of signal propagation, even at a fixed location. The aim of this work is to develop deep learning-based approache... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Samir Balbal, Salim Bouamama and Christian Blum    
Dominating sets are among the most well-studied concepts in graph theory, with many real-world applications especially in the area of wireless sensor networks. One way to increase network lifetime in wireless sensor networks consists of assigning sensors... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Md. Ruhul Amin, Md. Shohrab Hossain and Mohammed Atiquzzaman    
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area netwo... ver más
Revista: Information    Formato: Electrónico

 
en línea
Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed and Ali Kashif Bashir    
Internet of Things (IoT)-based devices consist of wireless sensor nodes that are battery-powered; thus, energy efficiency is a major issue. IEEE 802.15.4-compliant IoT devices operate in the unlicensed Industrial, Scientific, and Medical (ISM) band of 2.... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jingwei Liu, Takumi Aoki, Zhetao Li, Tingrui Pei, Young-june Choi, Kien Nguyen and Hiroo Sekiya    
Recently, we often see the environment where many one-to-one Wireless Local Area Networks (WLANs) exist in a small area. In this environment, the network throughput of certain WLAN reduces significantly because of the interference from other networks (i.... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Teuku Yuliar Arif,Munandar Munandar,Ramzi Adriman,Rizal Munadi     Pág. pp. 172 - 199
The wireless mesh network (WMN) is a future network technology that develops single-hop wireless local area networks (WLANs) into multi-hop wireless mesh networks, based on the IEEE 802.11s standard. However, this development still presents many challeng... ver más

 
en línea
Jianjun Lei, Ying Wang and Hong Yun    
Legacy IEEE 802.11 Medium Access Control (MAC) adopts the Distributed Coordination Function (DCF) mechanism, which provides the same access opportunity for all contenders. However, in dense multi-rate Wireless Local Area Networks (WLANs), the pure distri... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »