نتایج جستجو برای: روش wi
تعداد نتایج: 381954 فیلتر نتایج به سال:
Objective(s): Aberrant expression of CCL5 has been found in several kinds of inflammatory diseases, and the roles of CCL5 in these diseases have also been reported. However, the role of CCL5 in infantile pneumonia is still unclear. Thus, the function and acting mechanism of CCL5 in the in vitro model of infantile pneumonia were researched in this study. Materials and Methods: Human fetal lung f...
A speech recognition system targeting high inflective languages is described that combines the traditional trigram language model and an HMM tagger, obtaining results superior to the trigram language model itself. An experiment in speech recognition of Czech has been performed with promising results. 1. Speech Recognition of Inflective Languages Inflective languages pose a hard problem in speec...
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It provides a walk-through tutorial on setting up Wi...
In this paper, we consider a novel denial of service attack targeted at popular smartphone operating systems. This type of attack, which we call a Denial of Convenience (DoC) attack, prevents non-technical savvy victims from utilizing data services by exploiting the connectivity management protocol of smartphones' operating systems when encountered with a Wi-Fi access point. By setting up a fak...
Coexistence of Wi-Fi and LTE in unlicensed spectrum (LTE-U) is recently drawing significant concern in industry. In this paper, we investigate the Wi-Fi performance in the presence of duty cycle based LTE-U transmission on the same channel. More specifically, one LTE-U cell and one Wi-Fi basic service set (BSS) coexist by allowing LTE-U devices transmit their signals only in predetermined duty ...
Nowadays mobile devices have become a ubiquitous medium supporting various forms of functionality and are widely accepted for commons. In this study, we investigate using Wi-Fi logs from a mobile device to discover user preferences. The core ideas are two folds. First, every Wi-Fi access point is with a network name, normally a human-readable string, called SSID (Service Set Identifier). Since ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید