Wi-Fi Traffic Enforcement System (WiTE)

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wi-Fi Based Positioning System

 Abstract—In today’s era position of any outdoor element can be determine precisely using GPS. But in the indoor environment like house, colleges, underground construction site GPS does not work well. As now-a-days all house and colleges are equipped with Wi-Fi access point, precise position can be found out using Wi-Fi using method name Received Signal Strength Indicator (RSSI). A series of e...

متن کامل

Music Recommender system for Wi-Fi Walkman

The research described in this report is a part of research in UseT work package of the CACTUS project. This research focuses on personalization in ad-hoc wireless environments. As a concrete example, we look into music recommender systems (MRS). In this report, we give the problem description of MRS as well as its application with the scenario of Wi-Fi walkman of the CACTUS storyboard. In this...

متن کامل

Traffic Pattern Modeling for Cognitive Wi-Fi Networks

The cognitive radio is a technology that efficiently uses the spectrum allowing the secondary users to use the spectral opportunities from the licensed bands without interfering with the primary users’ communications. The purpose of this article is to analyze and compare the development of three prediction algorithms based on time series during the spectral handoff. In order to assess the algor...

متن کامل

Wi-Fi Walkman

Wireless home entertainment center refers to a device able to handle heterogeneous media and to connect client devices located within the house and the outside world (i.e., the Internet).

متن کامل

Surveying Wi-fi Security

This paper is a study of the use and possible flaws of the two basic cryptographic protocols (WEP, WPA) in Wi-Fi Networks. It is presenting some very easy to implement methods to gain malicious access to such networks by disclosing the network secret key, using Windows Operating Systems, like Win XP. It is also describing the shutter of the myth saying that the MAC Address filtering is a safe p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Transportation Technologies

سال: 2013

ISSN: 2160-0473,2160-0481

DOI: 10.4236/jtts.2013.32014