نتایج جستجو برای: access point

تعداد نتایج: 826021  

2002
Hyunseung Choo Hee Yong Youn Daewoo Chung

One of main issues in mobile wireless networks is how to deal with moving terminals. As the movement implies a change of access point, the wireless network must be able to determine the location of moving terminals in order to set-up a connection and route incoming messages. Location management is for tracking and locating the mobile terminal. In this paper we propose a novel location managemen...

2015
Prashant Tiwari Varun Prakash Saxena Raj Gaurav Mishra Devendra Bhavsar

This paper presents introduction, advantages and disadvantages, possible applications and research challenges of Wireless Sensor Networks (WSN).

2000
Jelena Nikolic-Popovic

Third generation wireless transceivers require more programmability than their second generation predecessors. In this paper, we explore how Texas Instruments’ TMS320C6400 family of DSPs could provide this programmability, specifically for symbol-rate functionality. Details of the implementation and real-time performance are given for each function. A summary of real-time requirements shows tha...

Journal: :JCM 2013
Raed M. Bani Hani Abdalraheem A. Ijjeh

Due to the advances in wireless communications and electronics technology, Wireless Sensor Networks (WSNs) are used in many applications such as civil and military application. A WSN is composed on many nodes each of which is basically equipped with a sensing device to collect data from the environment, a processing unit to do some operations on data, a transceiver to send and receive collected...

Journal: :J. Network and Computer Applications 2011
Lucas D. P. Mendes Joel J. P. C. Rodrigues

Ever since wireless sensor networks (WSNs) have emerged, different optimizations have been proposed to overcome their constraints. Furthermore, the proposal of new applications forWSNs have also created new challenges to be addressed. Cross-layer approaches have proven to be themost efficient optimization techniques for these problems, since they are able to take the behavior of the protocols a...

2011

The contextual theory of political participation in non-electoral politics developed in this paper supposes that more open political opportunity structure of a respective state increases both, the individual non-electoral participation and mobilization into this participation, since the decentralized political institutions send a message that more access points to influence politics are availab...

2006
Youwei Wang Yufei Yuan

While Japan’s I-mode failed to be adopted in other countries and WAP also did not succeed in promoting mobile data services, a rather simple technology of SMS made its way to facilitate the growth of mobile data services in China. In this paper, we conduct a case study based on actornetwork theory in order to explain 1) how mobile data services are developed and adopted in China, 2) what is the...

2010
T. Pering

Coolspots is definitely a catchy name, although what is in a name, after all. Actually, going back through the paper it was difficult to ascertain what exactly the moniker refers to—at first the system as a whole was assumed, but an early figure actually labels the Bluetooth access points individually as the “Coolspots”. This was right above another figure that grouped both Bluetooth and Wi-fi ...

2014
Simon Ruffieux Denis Lalanne Elena Mugellini Omar Abou Khaled

This paper presents a survey on datasets created for the field of gesture recognition. The main characteristics of the datasets are presented on two tables to provide researchers a clear and rapid access to the information. This paper also provides a comprehensive description of the datasets and discusses their general strengths and limitations. Guidelines for creation and selection of datasets...

Journal: :IJCNS 2011
Iman M. Almomani Maha K. Saadeh

Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes to transmit data. In this paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims to enhance existing tree-based routing protocols and prolong the network’s life time by considerin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید