• No results found

[PDF] Top 20 Study of Wi-Fi Signal Strength Measurement and it’s Optimization

Has 10000 "Study of Wi-Fi Signal Strength Measurement and it’s Optimization" found on our website. Below are the top 20 most common "Study of Wi-Fi Signal Strength Measurement and it’s Optimization".

Study of Wi-Fi Signal Strength Measurement and it’s Optimization

Study of Wi-Fi Signal Strength Measurement and it’s Optimization

... Very often slow speed of network leads to limited connectivity and delay in processing hours, so we all tend to use wireless technology either at home or at coffee shop or at airport.We deal with the different ways of ... See full document

5

Study of Wi-Fi Signal Strength Measurement and it’s Optimization

Study of Wi-Fi Signal Strength Measurement and it’s Optimization

... Over the past 20 years, wireless LANs based on 802.11 have become common in office, at home and campus environments. Recent survey suggest over 10 billion Wi-Fi devices have been sold in total. Among those ... See full document

5

Relationship between macular thickness measurement and signal strength using Stratus optical coherence tomography

Relationship between macular thickness measurement and signal strength using Stratus optical coherence tomography

... cross-sectional study 79 eyes of 42 healthy subjects were ...with signal strengths of 4, 5, 6, 7, 8, and 9 out of 10 via adjustment of the focusing ... See full document

6

Indoor location estimation utilizing Wi Fi signal based on bayesian 
		approach

Indoor location estimation utilizing Wi Fi signal based on bayesian approach

... In this study, the performances of Bayesian Approach was been evaluate and it has greatly performed in this location with low percentage of error. There are several task can be extended in the future works. ... See full document

9

Research on Wi Fi indoor positioning in a smart exhibition hall based on received signal strength indication

Research on Wi Fi indoor positioning in a smart exhibition hall based on received signal strength indication

... to study the offline acquisition and online positioning ...(received signal strength indication) is preprocessed, which makes the location fingerprint data more effective and reliable, thus improving ... See full document

13

ANALYSIS OF ACCEPTANCE OF MOBILE PAYMENT AS AN ALTERNATIVE TRANSACTION OF 
PARKING PAYMENT

ANALYSIS OF ACCEPTANCE OF MOBILE PAYMENT AS AN ALTERNATIVE TRANSACTION OF PARKING PAYMENT

... low signal strength faced inside closed rooms and ...the signal strength, this paper utilises an approach based on RSS (Received Signal Strength) ...received signal ... See full document

13

A Hybrid Fingerprint Scheme for a Reliable WLAN Positioning System

A Hybrid Fingerprint Scheme for a Reliable WLAN Positioning System

... the Wi-Fi ...this study proposes a hybrid scheme to tackle the problem of reliability in Wi-Fi based location estimation system by providing a fail-over feature for the case where one ... See full document

10

Wi Fi Gun as a Range Extender

Wi Fi Gun as a Range Extender

... homemade Wi-Fi ...increased signal strength. To achieve this, we need to study about the various parameters of antennas to increase the signal strength for long ...the ... See full document

5

Simulation Based WiFi Fingerprinting for Indoor Localization

Simulation Based WiFi Fingerprinting for Indoor Localization

... read signal values, which is not practical for a mobile positioning ...[4]. Wi-Fi is a ubiquitous technology that is broadly accepted by users and they are freely available ...current signal ... See full document

6

Geometric and Signal Strength Dilution of Precision (DoP) Wi-Fi

Geometric and Signal Strength Dilution of Precision (DoP) Wi-Fi

... The democratization of wireless networks combined to the emergence of mobile devices increasingly autonomous and efficient lead to new services. Positioning services become overcrowded. Accuracy is the main quality ... See full document

10

Creation of Virtual Wi Fi Access Point and Secured Wi Fi Pairing, through NFC

Creation of Virtual Wi Fi Access Point and Secured Wi Fi Pairing, through NFC

... We have to make sure the certificate is securely sent. If a non-secure protocol such as e-mail, HTTP, or FTP is used to send the file over the Internet, the certificate’s security can be compromised. The secure way to ... See full document

6

Wi-Fi Technology Goes Hi-fi Technology

Wi-Fi Technology Goes Hi-fi Technology

... With less than $100,000 in seed capital, Dossick and his team of 10 built a wireless hard-drive-based storage device that connects to a Wi-Fi setup and can stream music anywhere in the network. But Martian ... See full document

5

Localization based User Tracking Using RSSI Fingerprint

Localization based User Tracking Using RSSI Fingerprint

... (WLAN) Wi-Fi technology. We combined two different Wi-Fi approaches to locate a ...received signal strength (RSS) from nearby access points (AP), to the data transmitted from the ... See full document

6

Wi Fi File Explorer

Wi Fi File Explorer

... Main thing is that we can access it anywhere the router ranges last. All the transferring speed depends upon the Wi- Fi signals as the signals is the weak the transferring speed gets slow. We are sure we ... See full document

6

Wi Fi Security pdf

Wi Fi Security pdf

... the signal and ...your signal because even if a hacker does listen to your signal, he would have to decode the transmission before making any usable sense out of ... See full document

332

Wi Fi authentication using visual cryptography for securing Wi Fi 
		enabled devices

Wi Fi authentication using visual cryptography for securing Wi Fi enabled devices

... The phases of the Wi-Fi AVC proposed system are explained in this section. The proposed system consists of three phases; Firstly, Share construction phase in which two shares Share1 and Share2 are generated ... See full document

5

An Exploratory Study of Wi-Fi Security: Wireless Network Encryption

An Exploratory Study of Wi-Fi Security: Wireless Network Encryption

... the Wi-Fi Protected Access (WPA) followed by the Wi-Fi Protected Access II (WPA2) we are going to explore and discuss proper procedures for maintaining high levels of security in order to keep ... See full document

5

The analysis of passive Wi Fi tracking

The analysis of passive Wi Fi tracking

... The results show interesting results, especially when it comes to iPhones. It seems that some iPhones are not always sending the real MAC-address of the phone when dispatching Wi-Fi packages. iPhones can ... See full document

8

Wi-Fi Based Smart Socket

Wi-Fi Based Smart Socket

... This paper introduces Smart Plug using mcu card, touchpad card and Wi-Fi module. The rest of the paper is structured as this. The second chapter will show the idea of proposed system. The hardware and ... See full document

5

Polling In Wi-Fi Using Android

Polling In Wi-Fi Using Android

... With all the efforts invested in polling android application for interaction between the teacher and student, we believe that at the end of the project finds itself a much better place and moves a bit closer to the real ... See full document

5

Show all 10000 documents...