The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, we present a Medium Access Control (MAC) scheme for wireless...
Radio frequency identification (RFID) uses wireless local area network technology, which limits its scope of application. And the data security isn't well protected because of the limited hardware resource of cheap electronic tag. In this paper, we realize the combination of TCP/IP and RFID technology by the Ethernet interface of SAMSysMP9320 reader/writer. This is accomplished by assigning IP address...
Rapid image acquisition in magnetic resonance imaging (MRI) offers a number of potential benefits, such as avoiding physiological effects or scanning time on patients, overcoming physical constraints inherent within the MRI scanner, or meeting timing requirements when imaging dynamic structures and processes. In this paper, the combination of compressed sensing and parallel magnetic resonance imaging...
Voice over Internet Protocol (VoIP) over a wireless local area network (WLAN) is poised to become an important Internet application. However, unacceptable VoIP performance in the presence of coexisting traffic from other applications is still one of the major problems standing in its development way. For this point, in this paper, a novel adapted adjustment packet segmentation method is proposed to...
Currently embedded remote monitoring technology step into a rapidly developing period. With the advancement of related technology, low cost remote monitoring system which is web-based, powerful and reliable at the same time will become the mainstream. Under this background, this paper presents a lightweight embedded remote monitoring system. The owerall system established a LAN using zensys's Z-WAVE...
This paper presents an ultra-wideband (UWB) bandpass filter for UWB applications and notch filter for the purpose of reducing interference from the WLAN (802.11a) when it coexist with UWB radio system. The bandpass filter consists of a hexagonal shaped multiple mode resonator (MMR) with interdigital coupling at both sides. The notch filter consists of four identical open ended stubs nearby the MMR...
This paper presents a CPW-fed antenna for WLAN application. This Antenna satisfies the licensed frequency band (2.4 to 2.480GHz) having return loss lower than -10 dB. This antenna is designed on a substrate with dielectric constant εr =4.4. With a size 27.8mm×27mm×1.6mm the antenna operates for WLAN application. The effects of shape, length, size, and location of feeding point, substrate and their...
This paper presents a compact novel CPW-fed antenna for WLAN/RFID applications. This Antenna satisfies the licensed frequency band (5.15 to 5.95 GHz) for WLAN and (5.725-5.875) GHz for RFID having return loss lower than -10 dB. The antenna is designed on a substrate with dielectric constant εr=4.4.With two different substrate thickness the antenna can be used for different applications. The effects...
Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. In this paper ,two type of Symmetric encryption algorithms introduced, they are 1. UMARAM 2. IMAkey Algorithm. These two algorithms a new symmetrical encryption algorithm is...
Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be merged with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to heighten the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration. The IEEE 802.11n standard based...
It is heterogeneous wireless Networks (HWN) aggregation foundation for vertical handoff (VHO), and that is key characters of core technology for multi-network aggregation. The currently mechanism handoff trigger is analyzed, a best network selected (BNS) framework is designed, the parameters of network terminal and user terminal of effecting VHO algorithm, and which also include norm of capable parameters,...
This paper presents a CPW-fed antenna with a triangle placed on a rectangular patch with two semi circles placed on either sides for WLAN application. This Antenna satisfies the licensed frequency band (5.15 to 5.95 GHz) having return loss lower than -10 dB. The antenna is designed on a substrate with dielectric constant εr=4.4. The size of the antenna is 15.6mm×15.2mm×1mm. The effects of shape, length,...
A Dielectric resonator antenna design is presented for Wireless Local Area Network (WLAN) applications. By using a dielectric resonator with an inverted U-shape cross section and optimized rectangular patch adhered in between the dielectric resonator as a feeding mechanism, an impedance bandwidth of about 15.7% and covering a frequency range of 5.1 to 5.97 GHz is achieved and resonating at 5.5 GHz...
This paper proposes a compact planar single band and dual-band antenna for Wideband local area (WLAN)/ ultra wideband (UWB) applications. The antenna consists of elliptical metal patch and a 50Ω coplanar waveguide (CPW) transmission line. By etching C-shaped slot in the patch for dual-band antenna (2.45GHz/3.1-10.6GHz). The proposed antenna is successfully designed and simulated. It shows that broadband...
Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld...
After the analysis of the working principle of WAPI, its security weaknesses are pointed out: it does not securely realize the goal of identity authentication and key agreement. According to the security weaknesses, the key agreement part is improved without changing the framework of WAPI. The improved protocol is not only SK-secure but also UC-secure, thus realizing identity authentication and key...
A printed monopole antenna with microstrip-fed Sierpinski fractal geometry for dual wideband application is presented. The operating bands are adjusted with the design of modified Sierpinski triangle (radiating patch), ground plane and scale factor used to create a fractal shape. The simulated 10 dB (VSWR 2:1) reflection bandwidth for first resonant frequency is 60% (1.47 GHz2.7 GHz). It covers GPS,...
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless...
In this paper, we investigate the training problem of wireless local area networks (WLANs) with downlink multi-user multiple input multiple output (DL MU MIMO) capability. We extend the 802.11 MAC protocol and propose a few training protocols at the MAC layer to support DL MU MIMO. We provide a capacity analysis based on measurement results from an 802.11n systems, evaluate the overhead of these training...
Future wireless access will involve a variety of integrated and interworking technologies. Depending on the conditions (e.g., the specific application, the quality of service requirements, the user mobility) each session will be served through the most suited access network; following some event, there will be a variation of the access technology, which is called vertical handover. Although the use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.