Essays about: "Access Point AP ."

Showing result 1 - 5 of 10 essays containing the words Access Point AP ..

  1. 1. Impact of interfering rouge access points on modulationand coding in IoT network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Amgad Shaher Saif; [2023]
    Keywords : Rogue access point; internet of things; modulation and coding scheme; round trip time; radio frequency interference; network latency; network security.; Obehörig åtkomstpunkt; sakernas internet; modulation och kodningsschema; round trip time; radiofrekvensinterferens; nätverkslatens; nätverkssäkerhet.;

    Abstract : This Bachelor thesis presents an in-depth investigation into the effects of RogueAccess Point interference within Internet of Things networks. The study focuses onthe impact of rogue APs on the modulation and coding scheme indices, round triptime, and overall network performance. READ MORE

  2. 2. Access Point Selection and Clustering Methods with Minimal Switching for Green Cell-Free Massive MIMO Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qinglong He; [2022]
    Keywords : Cell-free massive MIMO; multi-objective optimization; deep reinforcement learning; AP switch ON OFF; energy efficiency; Cellfri massiv MIMO; multiobjektiv optimering; djup förstärkningsinlärning; AP switch ON OFF; energieffektivitet;

    Abstract : As a novel beyond fifth-generation (5G) concept, cell-free massive MIMO (multiple-input multiple-output) recently has become a promising physical-layer technology where an enormous number of distributed access points (APs), coordinated by a central processing unit (CPU), cooperate to coherently serve a large number of user equipments (UEs) in the same time/frequency resource. However, denser AP deployment in cell-free networks as well as an exponentially growing number of mobile UEs lead to higher power consumption. READ MORE

  3. 3. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  4. 4. Network Slicing to Enhance Edge Computing for Automated Warehouse

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xiaoyi Wei; [2022]
    Keywords : Network Slicing; Wi-Fi; 5G; Human-Robot Collaboration; Multi-access Edge Computing; Nätverksskärning; Wi-Fi; 5G; Samarbete mellan människa och robot; Multi-access Edge Computing;

    Abstract : In a previous work, a distributed safety framework supported by edge computing was developed to enable real-time response of robots that collaborate with humans in the Human-Robot Collaboration (HRC) scenario. However, as the number of robots in the automated warehouse increases, the network is easier to induce the congestion. READ MORE

  5. 5. Indoor Positioning using the Android Platform

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sergio Mellado Delgado; Alberto Díaz Velasco; [2014]
    Keywords : Location; Indoor; Android; Positioning; wifi;

    Abstract : In recent years, there has been a great increase in the development of wireless technologies and location services. For this reason, numerous projects in the location field, have arisen. In addition, with the appearance of the open Android operating system, wireless technologies are being developed faster than ever. READ MORE