|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Dmitry Namiot,Vladimir Sukhomlin
Pág. 99 - 103
The paper describes the model of hyper-local Internet. This refers to a set of Internet resources that are, to one degree or another, relevant (useful) for users located in a certain limited area. At the same time, such a network is not visible outside t...
ver más
|
|
|
|
|
|
|
Javed Iqbal, Usman Illahi, Muhammad Abbas Khan, Abdul Rauf, Esraa Mousa Ali, Inam Bari, Haider Ali, Muhammad Amir Khan, Mohammad Alibakhshikenari and Mariana Dalarsson
In this research article, a single-fed dual-band circular polarized (CP) dielectric resonator antenna (DRA) for dual-function communication, such as GPS and WLAN, was made. Initially, the proposed design process was initiated by designing a linearly pola...
ver más
|
|
|
|
|
|
|
Muhammed Zahid Karakusak, Hasan Kivrak, Hasan Fehmi Ates and Mehmet Kemal Ozdemir
Wireless Local Area Network (WLAN) positioning is a challenging task indoors due to environmental constraints and the unpredictable behavior of signal propagation, even at a fixed location. The aim of this work is to develop deep learning-based approache...
ver más
|
|
|
|
|
|
|
Samir Balbal, Salim Bouamama and Christian Blum
Dominating sets are among the most well-studied concepts in graph theory, with many real-world applications especially in the area of wireless sensor networks. One way to increase network lifetime in wireless sensor networks consists of assigning sensors...
ver más
|
|
|
|
|
|
|
Md. Ruhul Amin, Md. Shohrab Hossain and Mohammed Atiquzzaman
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area netwo...
ver más
|
|
|
|
|
|
|
Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed and Ali Kashif Bashir
Internet of Things (IoT)-based devices consist of wireless sensor nodes that are battery-powered; thus, energy efficiency is a major issue. IEEE 802.15.4-compliant IoT devices operate in the unlicensed Industrial, Scientific, and Medical (ISM) band of 2....
ver más
|
|
|
|
|
|
|
Jingwei Liu, Takumi Aoki, Zhetao Li, Tingrui Pei, Young-june Choi, Kien Nguyen and Hiroo Sekiya
Recently, we often see the environment where many one-to-one Wireless Local Area Networks (WLANs) exist in a small area. In this environment, the network throughput of certain WLAN reduces significantly because of the interference from other networks (i....
ver más
|
|
|
|
|
|
|
Teuku Yuliar Arif,Munandar Munandar,Ramzi Adriman,Rizal Munadi
Pág. pp. 172 - 199
The wireless mesh network (WMN) is a future network technology that develops single-hop wireless local area networks (WLANs) into multi-hop wireless mesh networks, based on the IEEE 802.11s standard. However, this development still presents many challeng...
ver más
|
|
|
|
|
|
|
Jianjun Lei, Ying Wang and Hong Yun
Legacy IEEE 802.11 Medium Access Control (MAC) adopts the Distributed Coordination Function (DCF) mechanism, which provides the same access opportunity for all contenders. However, in dense multi-rate Wireless Local Area Networks (WLANs), the pure distri...
ver más
|
|
|
|