scispace - formally typeset
Search or ask a question

Answers from top 10 papers

More filters
Papers (10)Insight
Open accessProceedings ArticleDOI
21 Mar 2016
3 Citations
By using a commercially available wireless access point we may be able to monitor the spectrum within range of the access point.
Proceedings ArticleDOI
18 Nov 2008
3 Citations
Therefore, the typical signal strength value of an access point can be inferred.
In this paper, we propose an external rogue access point prediction mechanism which uses radio frequency(RF) signal strength to predict a rogue access point.
It is shown that an received signal strength indicator is the primary criterion used by the IoT WiFi device for access point selection during connection procedure.
Open accessProceedings ArticleDOI
Moustafa Youssef, Ashok K. Agrawala 
07 Mar 2004
237 Citations
Using our model, we describe a technique to use multiple signal strength samples from each access point, taking the high autocorrelation into account, to achieve better accuracy.
This access point allows the reading of a wider range of signal strengths using RSSI.
Proceedings ArticleDOI
Zhihong Liu, Yaping Liu, Zhenghu Gong, Lin Chen 
26 Jul 2011
4 Citations
In this paper, we propose a Mutil-Rate Access Point selection (MRAPS) policy, which not only considers overall received signal strength indication(RSSI), throughput and transmission rate, but also can be implemented easily.
We propose an indoor angle-of-arrival (AOA) estimation algorithm for IEEE 802.11ac Wi-Fi signal using single access point (AP) with multiple antennas.
Proceedings ArticleDOI
Saâd Biaz, Ji. Yiming, Bing Qi, Shaoen Wu 
23 Sep 2005
14 Citations
With 6 days of continuous measurements and simulations, the results show that the proposed method dynamically estimates the signal strength for the deployed building, and the results achieve average estimation accuracy to within 3% of maximum signal strength.

See what other people are reading

What is the definition of management dillemma?
5 answers
A management dilemma, as discussed in various contexts, refers to a situation where decision-makers face conflicting choices or challenges in managing a particular issue. In the context of delirium management, non-pharmacological interventions play a crucial role in prevention and treatment, emphasizing strategies like reorientation, cognitive stimulation, early physiotherapy, and effective communication. In the realm of authoritarian leadership, the successor's dilemma arises when predecessors appoint successors who may pose a threat due to their impatience and power, leading to potential removal from power. Additionally, in the management of dilated cardiomyopathy, especially in resource-limited settings, tailoring management strategies to available resources is essential to maintain overall prognosis despite limitations in diagnostic capabilities and treatment options.
What applications are envisioned for this latency-sensitive federated learning archi- tecture?
5 answers
The latency-sensitive federated learning architectures, such as the proposed Vision-Aided Federated Wireless Networks (VFWN) and Delay-Aware Federated Learning (DFL), are envisioned for applications requiring real-time machine learning capabilities at the wireless edge. These architectures are particularly suitable for scenarios like self-driving vehicles, intelligent transportation systems, and industrial automation, where instantaneous learning, adaptation, and decision-making are crucial. By leveraging multi-sensor data and advanced deep learning techniques, these architectures aim to predict beam blockages in wireless networks, optimize model training efficiency, reduce communication costs, and minimize latency for time-sensitive applications. Overall, the applications envisioned for these latency-sensitive federated learning architectures span across various domains requiring rapid and accurate decision-making capabilities in dynamic environments.
How has the development of visible light communication technology impacted data transmission rates?
5 answers
The development of visible light communication (VLC) technology has significantly impacted data transmission rates, offering a promising alternative to traditional radio frequency (RF) communication methods. Innovations in VLC technology, such as the use of GaN-based blue micro-light-emitting diode (µ-LED) arrays, have demonstrated enhanced light output power and increased transmission data rates up to 1.50 Gbps, attributed to improvements in luminescence efficiency and optical power. Further advancements have enabled high data rate capacity in VLC, with successful transmission of data at rates of 10 Gbps over diffused channels, showcasing VLC's potential for smart city infrastructure. LiFi, a subset of VLC, has shown capabilities of transmitting data at speeds of 150 Mbps using LEDs, indicating a significant leap over traditional WiFi technologies. Techniques like pre-equalization have been implemented to improve the quality and reliability of audio data transmission in indoor environments, further enhancing the versatility of VLC. Despite challenges related to the frequency bandwidth and data transference rate due to long carrier lifetimes in luminescent materials, recent advances aim to overcome these limitations. Experimental results have confirmed VLC's efficacy in transmitting audio data, with green LEDs producing the highest output voltage, indicating color-specific performance variations. VLC's application in intelligent transportation systems (ITS) has been explored, highlighting its potential to improve traffic congestion and safety while offering high data security and energy efficiency. Experimental studies on Li-Fi have demonstrated successful data transmission of various types, including audio, text, and images, through VLC technology. Efforts to boost VLC data rates using commercial-off-the-shelf (COTS) devices have achieved throughputs up to 80 kbps at a distance of 2 m. Lastly, VLC's capability for image transmission has been validated, with a 100% success rate for images sent over a distance of 50 cm. Collectively, these advancements underscore VLC's transformative impact on data transmission rates, offering a viable and efficient alternative to conventional communication technologies.
How to filter a multifasta by coverage and identity?
5 answers
To filter a multifasta by coverage and identity, one can utilize innovative approaches such as designing filters based on multiple secondary structure profiles (SSPs). These filters can efficiently scan sequences, excluding irrelevant ones while detecting instances of interest with high sensitivity and specificity. Additionally, for scenarios where track identity is crucial, the Set JPDA (SJPDA) filter offers a label-free approach that localizes targets effectively and allows for the recall of identities as an overlay. In the realm of radio tag identification, mathematical models of linear time-invariant filters can be employed to address the identification problem in multiple access channels, offering insights into designing radio label impulse responses under specific constraints. These diverse methodologies showcase the adaptability and effectiveness of filtering techniques in various domains.
How do search and rescue operations differ across various disaster scenarios?
5 answers
Search and rescue (SAR) operations vary across different disaster scenarios based on the strategies employed. In disaster situations, the lack of information and communication infrastructure can hinder rescue efforts. Wireless sensor networks can trigger alerts for immediate rescue actions. Agent-based simulations optimize SAR through cooperative plans, increasing survival probabilities and reducing rescue times significantly. Coordination mechanisms for heterogeneous agents in city-scale disasters improve task completion, with teaming algorithms outperforming independent operations. Electronic information technology has transformed SAR patterns, with central dispatch and independent search methods showing distinct advantages based on real-time information and survivor distribution. Unmanned robotic technologies with cognitive wireless networks enhance SAR missions by facilitating communication and adaptability in dynamic disaster environments.
What is the scope and focus of IEEE Transactions on Multimedia?
4 answers
IEEE Transactions on Multimedia focuses on a range of topics related to multimedia capturing, mining, and streaming. The journal covers articles on the deployment and adoption of technology tailored to media applications in networks and devices, as well as the opportunities for innovation in the media industry created by the Internet and global technologies. It also includes articles on the upcoming fifth-generation (5G) wireless communications technologies and their potential to revolutionize society's digital transformation. Additionally, the journal recognizes the achievements of authors through annual awards for the best article and best department.
What are the most effective methods to improve internet connectivity while traveling?
5 answers
To improve internet connectivity while traveling, there are several effective methods. One approach is to use a hybrid-connectivity scenario, where vehicles are equipped with both cellular connectivity and dedicated short-range wireless devices. This allows vehicles to connect to fixed road side units via single or multiple hops, offloading non-critical flows to the wireless local area network (WLAN) and alleviating the overloaded cellular networks. Another method is the use of a multilink system that employs IPinIP tunneling, dynamic distribution of packets, and reordering of distributed packets. This system optimizes bandwidth utilization and ensures seamless connectivity in a nomadic network environment. Additionally, enhancing the acquisition of data from wireless access points during a window of acquisition can improve connectivity. This involves obtaining a list of access points along the route, identifying the closest upcoming access point, and continuing the session with that access point until the session is restarted. These methods can enhance internet connectivity while traveling, providing a better user experience and optimizing network resources.
What are the challenges of dynamic wireless charging for EVs?
5 answers
Dynamic wireless charging (DWC) for electric vehicles (EVs) faces several challenges. One challenge is the economic viability of installing power tracks underneath the lane, which can be addressed by considering local power support with renewable energy integration and energy storage. Another challenge is the limited system efficiency and stability of the DWC system, which can be improved through research on ferrite structure, compensation network, and control methods. Additionally, the size of the battery in EVs and the need for frequent charging are obstacles to the widespread adoption of DWC, but the use of wireless power transfer (WPT) technology can help reduce the battery size and enable on-road powering. Furthermore, the performance of WPT systems in various applications, including DWC, remains a significant design challenge, and research efforts are focused on optimizing the system's performance and efficiency.
What is the practical significance of the resilience of EV charging, from the perspective of utility company?
5 answers
The resilience of EV charging is of practical significance to utility companies. Effective management and utilization of EVs can yield significant benefits for networks. The increasing number of EVs puts a burden on the utility grid, and extensive renewable energy integration is necessary to meet the EV load demand. The vehicle-to-grid (V2G) paradigm, where EVs act as a resilient load, can help alleviate the pressure on the grid. By optimizing the hierarchical bi-directional technique throughout V2G and grid-to-vehicle (G2V) technologies, an EV aggregator can determine the number of EVs participating in electric power trade, set charging/discharging capacity levels, and ensure grid stabilization. Resilient event-triggered mechanisms can also be used to minimize cyber attacks and reduce communication pressure in EV charging scheduling systems, leading to cost reduction and effective detection of attacked EVs.
Is 5g adavnced including machine to machine communication?
5 answers
Yes, 5G includes machine-to-machine (M2M) communication. M2M communication is considered a potentially disruptive technology that will lead to advancements in both component and architectural design for 5G systems. The massive machine-type communications (mMTC) is one of the three generic services for 5G, and it involves the connection-based random access (CBRA) scheme for establishing connections between machine-type devices (MTDs) and base stations (BS). The mMTC in 5G networks requires efficient management of the massive connections with MTDs, considering factors such as signaling overhead, access delay, and connection resource utilization ratio. Additionally, the 5G cellular network supports massive M2M communication for wireless sensor network (WSN) applications, where High Altitude Platforms (HAPs) can be used as a replacement for base stations. Therefore, 5G advancements include machine-to-machine communication for various applications and services.
What are the potential benefits and drawbacks of using GSM modems for school event management?
4 answers
Using GSM modems for school event management can have several potential benefits. Firstly, GSM modems can provide a wireless and efficient way to transfer information between the school and external parties, allowing for quick and convenient communication. Additionally, GSM modems can enable remote access to the school's database, allowing authorized individuals to update information from any location. This can save time and resources by eliminating the need for physical visits to the school. However, there may also be drawbacks to using GSM modems for school event management. One potential drawback is the reliance on mobile network coverage, which may be limited in certain areas. Another drawback is the potential for security risks, as unauthorized access to the GSM modem could lead to unauthorized access to the school's database. Overall, while GSM modems offer convenience and efficiency, careful consideration should be given to network coverage and security measures when implementing them for school event management.