• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 149
  • 62
  • 32
  • 26
  • 21
  • 12
  • 8
  • 7
  • 5
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 414
  • 293
  • 79
  • 67
  • 62
  • 48
  • 47
  • 45
  • 40
  • 39
  • 37
  • 37
  • 37
  • 36
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Interference mitigation strategy design and applications for wireless sensor networks

Yao, Fang January 2010 (has links)
The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard presents a very useful technology for implementing low-cost, low-power, wireless sensor networks. Its main focus, which is to applications requiring simple wireless connectivity with relaxed throughout and latency requirements, makes it suitable for connecting devices that have not been networked, such as industrial and control instrumentation equipments, agricultural equipments, vehicular equipments, and home appliances. Its usage of the license-free 2.4 GHz frequency band makes the technique successful for fast and worldwide market deployments. However, concerns about interference have arisen due to the presence of other wireless technologies using the same spectrum. Although the IEEE 802.15.4 standard has provided some mechanisms, to enhance capability to coexist with other wireless devices operating on the same frequency band, including Carrier Sensor Multiple Access (CSMA), Clear Channel Assessment (CCA), channel alignment, and low duty cycle, it is essential to design and implement adjustable mechanisms for an IEEE 802.15.4 based system integrated into a practical application to deal with interference which changes randomly over time. Among the potential interfering systems (Wi-Fi, Bluetooth, cordless phones, microwave ovens, wireless headsets, etc) which work on the same Industrial, Scientific, and Medical (ISM) frequency band, Wi-Fi systems (IEEE 802.11 technique) have attracted most concerns because of their high transmission power and large deployment in both residential and office environments. This thesis aims to propose a methodology for IEEE 802.15.4 wireless systems to adopt proper adjustment in order to mitigate the effect of interference caused by IEEE 802.11 systems through energy detection, channel agility and data recovery. The contribution of this thesis consists of five parts. Firstly, a strategy is proposed to enable IEEE 802.15.4 systems to maintain normal communications using the means of consecutive transmissions, when the system s default mechanism of retransmission is insufficient to ensure successful rate due to the occurrence of Wi-Fi interference. Secondly, a novel strategy is proposed to use a feasible way for IEEE 802.15.4 systems to estimate the interference pattern, and accordingly adjust system parameters for the purpose of achieving optimized communication effectiveness during time of interference without relying on hardware changes and IEEE 802.15.4 protocol modifications. Thirdly, a data recovery mechanism is proposed for transport control to be applied for recovering lost data by associating with the proposed strategies to ensure the data integrity when IEEE 802.15.4 systems are suffering from interference. Fourthly, a practical case is studied to discuss how to design a sustainable system for home automation application constructed on the basis of IEEE 802.15.4 technique. Finally, a comprehensive design is proposed to enable the implementation of an interference mitigation strategy for IEEE 802.15.4 based ad hoc WSNs within a structure of building fire safety monitoring system. The proposed strategies and system designs are demonstrated mainly through theoretical analysis and experimental tests. The results obtained from the experimental tests have verified that the interference caused by an IEEE 802.11 system on an IEEE 802.15.4 system can be effectively mitigated through adjusting IEEE 802.15.4 system s parameters cooperating with interference pattern estimation. The proposed methods are suitable to be integrated into a system-level solution for an IEEE 802.15.4 system to deal with interference, which is also applicable to those wireless systems facing similar interference issues to enable the development of efficient mitigation strategies.
162

Aplikace pro definování pokrytí bezdrátových připojení ISP / Application for Wireless ISP Providers

Naibrt, Tomáš Unknown Date (has links)
The aim of this work is to examine the application Topocoding API and Google Maps API. Analyze system requirements to define the coverage of wireless connectivity to allow the ISP so as to allow the ISP to file AP and customers, as well as exploring the possibilities of joining the AP ISP and view coverage maps. Further, this application design, implement and test.
163

Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple

Nykvist, Carl, Larsson, Martin January 2019 (has links)
The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). The LPIDS was implemented and tested on the hardware platforms Wi-Fi Pineapple and Raspberry Pi. To evaluate and test the LPIDS as well as the algorithms, performance metrics such as throughput, response time and power consumption are considered. The experimental results reveal that Aho-Corasick performed better than KMP throughout the majority of the process, but KMP was typically faster in the beginning with fewer rules. Similarly, Raspberry Pi shows remarkably higher performance than Wi-Fi Pineapple in all of the measurements. Moreover, we compared the throughput between LPIDS and Snort. It was concluded that the throughput was significantly higher for LPIDS when most of the rules do not include content parameters. This thesis concludes that due to computational complexity and slow hardware processing capabilities of Wi-Fi Pineapple, it could not become suitable IDS in the presence of different pattern matching strategies. Finally, we propose a modification of Snort to increase the throughput of the system.
164

Application for selection of Bluetooth or WLAN

Svenjeby, Jonatan, Jönsson, Richard January 2019 (has links)
Wireless communication is important in data transportation between devices. It is as ever important to find the best connection fitted for the users specific requirements. This process can be a hassle and having an application testing all the options could save both time and resources. This project involves solving mentioned problem and to create an application implementing the solution. A method of recommending a connection is to measure different metrics e.g throughput and packet loss for Bluetooth (BT) and each channel on 2.4GHz and 5GHz Wireless Area Network (WLAN). By using an appropriate algorithm to rate the connections a result ranging from best to worst can be displayed to the user. Limitations on metrics can be inputted by the user to tailor the result to match user requirements. The application is based on Hardware Meets Software (HMS) product Anybus Wireless Bridge II. With a Telnet connection Attention-commands (AT-commands) can be used to configure and utilize the modules e.g measure signal strength. Third-party services POCO and iPerf are used to measure other metrics e.g throughput and latency. C++ and Visual Studio was used to develop the application. In accordance to the test specification the projected resulted in a successfully working application. Tests prove that with interference on a channel results in a worse rating and that other channels that are unaffected gets a higher ranking on the list. There is still room for improvement regarding exception handling when connection timeouts happen due to loss of signal.
165

An Application for the Detection of Signal Strength for ESP8266 Position

Pourshirazi, Aida 01 July 2017 (has links)
Sinkholes are hazardous to buildings and their occupants, so a sensing device that can monitor underground changes is vital. Void Technology, developed in the Research and Development Center at Western Kentucky University, is creating a device that can improve monitoring for any movement underground. This device, created by Void Technology, is equipped with ESP8266, which is a Wi-Fi module that can send its information to the router in a wireless network. The focus of this thesis is on designing and developing an IOS framework application to show the signal strength capabilities in different buildings to find the optimum placement of the Void Technology devices. Each building, based on various construction materials, had different attenuations that could cause signal loss from the application to the ESP82266. The optimum place was found with this designed application. From this test experiment, it can be concluded that the application can show the signal strength based dBm. Thus, this new application is cost-effective as well as user friendly and which can help both the installer and homeowner to find the best position for installing The Void Technology with optimum signal strength.
166

Identification of the impact mechanisms of the electromagnetic interferences on the Wi-Fi communications / Identification des mécanismes d’impact des interférences électromagnétiques sur des communications Wi-Fi

Romero, Grecia 13 December 2017 (has links)
Les communications sans fil sont essentielles pour les nouveaux systèmes des transports. Ainsi, ces communications sans fil doivent être capables d'opérer sans interruption quelque soit l'environnement électromagnétique (EM) dans lequel elles se trouvent. Pour cette raison, nous nous étudions comment certains environnements EM affectent les systèmes de communication. Dans cette thèse, nous nous sommes intéressés aux trains à grande vitesse. Dans ce secteur, on peut trouver des interférences EM intentionnelles (IEMI) et des interférences EM non intentionnelles (EMI). Nous avons considéré comme EMI les signaux interférences électromagnétiques transitoires produites par les pertes de contact entre la caténaire et le pantographe. Pour les IEMI, nous avons utilisé des signaux d'interférence générés par des brouilleurs. Nous avons étudié la vulnérabilité du réseau de communication IEEE 802.11n face à ces différents types d'interférences. Par la suite nous avons identifié le mécanisme d'accès au canal comme un point potentiellement vulnérable aux deux types d'interférences. En effet, une interférence de faible puissance peut faire croire que le canal est occupé, empêchant toute communication. Concernant les IEMI, nous avons remarqué que la période de balayage de la bande de fréquence du signal du brouillage est un paramètre important pour que celui-ci soit efficace. Pour les signaux EMI, nous avons identifié la période DIFS comme étant un autre paramètre vulnérable de la norme, car à partir d'un certain niveau de puissance d'interférence et dès que l'intervalle de répétition entre les transitoires est inférieur au DIFS, la communication est systématiquement interrompue. / Wireless communications are essential for new transportation systems. Thus, these wireless communications must be able to operate without interruption, regardless of the electromagnetic (EM) environment. For this reason, we study how some EM environments affect communication systems. In this thesis, we are particularly interested in the transportation sector, especially high speed trains. In this sector, both unintentional EM interferences (EMI) and intentional EM interferences (IEMI) can be found. We considered unintentional EM interferences (EMI), such as transient EM interference signals produced by contact losses between the catenary and the pantograph. For intentional EM interferences (IEMI) we used interference signals as those generated by low power commercial jammers. We have studied the vulnerability of the IEEE 802.11n communication network facing these different interference types. We identified the channel access mechanism as a vulnerable feature of IEEE 802.11n. As a matter of fact, in the presence of low power interferences, the channel can be considered busy by the channel access mechanism, preventing any communication. With regard to the IEMI, we have noticed that the sweep period of the frequency band of the jamming signal is an important parameter on the jamming performance. For transient EM interference signals, we identified the DIFS period as another vulnerable parameter of the standard. Indeed, when the repetition interval between transients is lower than DIFS period, with a certain interference power level, the communication is systematically interrupted.
167

Trådlös styrning av larmsystem : Kandidatuppsats

Green, Jonas, Delén, Johan January 2010 (has links)
<p>Lansen Technology develops and sells alarm systems. The communication between the system devices are wireless. The radio protocol used by the system is developed by Lansen with the purpose to be energy efficient. The alarm systems target groups are individuals, businesses and government agencies. The current system is installed, configured and controlled from a control panel for all audiences. Some operations are also available using a mobile phone via a GSM network. Lansen Technology has a request to move more of the functionality to a mobile device and avoid the cost of using the GSM network used today. The target group for the application is primarily users that want instant access to information within the network. The project has mainly consisted of two parts. The first part of the project was to investigate two different wireless technologies that were relevant to the project. The investigation showed that Bluetooth was the best choice based on the requirements of the alarm system. Bluetooth was then integrated to the existing alarm system. The second part consisted of developing software to operate the alarm system from a PDA running Windows Mobile. An application was developed successfully and it can perform the majority of the functions specified by Lansen. The idea of remote controlling an alarm system from a mobile device has resulted in a successful project. Lansen Technology develops and sells alarm systems. The communication between the system devices are wireless. The radio protocol used by the system is developed by Lansen with the purpose to be energy efficient. The alarm systems target groups are individuals, businesses and government agencies. The current system is installed, configured and controlled from a control panel for all audiences. Some operations are also available using a mobile phone via a GSM network. Lansen Technology has a request to move more of the functionality to a mobile device and avoid the cost of using the GSM network used today. The target group for the application is primarily users that want instant access to information within the network. The project has mainly consisted of two parts. The first part of the project was to investigate two different wireless technologies that were relevant to the project. The investigation showed that Bluetooth was the best choice based on the requirements of the alarm system. Bluetooth was then integrated to the existing alarm system. The second part consisted of developing software to operate the alarm system from a PDA running Windows Mobile. An application was developed successfully and it can perform the majority of the functions specified by Lansen. The idea of remote controlling an alarm system from a mobile device has resulted in a successful project.</p> / <p>Lansen Technology utvecklar och säljer larmsystem. Kommunikationen mellan systemets enheter sker trådlöst. Det trådlösa radioprotokoll som används är utvecklat av Lansen med målet att vara energisnål. Larmsystemets målgrupp är privatpersoner, företag och myndigheter. Nuvarande system installeras, konfigureras och styrs från en manöverpanel. Viss manövrering kan också ske med hjälp av mobiltelefon via GSM-nätet. Önskemål från Lansen Technology finns att flytta funktionalitet till en mobil enhet och att komma ifrån trafikkostnaden på GSM-nätet. Målgruppen för applikationen är i första hand användare som omgående kräver tillgång till information från larmsystemet. Projektet har i huvudsak bestått av två delar. Första delen av projektet bestod av att utreda de två olika trådlösa tekniker som var aktuella för projektet. Utvärderingen visade att Bluetooth var det bästa valet med de krav larmsystemet ställde på uppkopplingen. Bluetooth integrerades därefter i nuvarande larmsystem. Den andra delen bestod av att utveckla en mjukvara  för att kunna manövrera larmsystemet från en handdator med Windows Mobile. Applikationen utvecklades framgångsrikt och kan utföra majoriteten av de funktioner som specificerats inför projektet. Idén med att fjärrstyra larmsystemet från en mobil enhet har resulterat i ett lyckosamt projekt. Lansen Technology utvecklar och säljer larmsystem. Kommunikationen mellan systemets enheter sker trådlöst. Det trådlösa radioprotokoll som används är utvecklat av Lansen med målet att vara energisnål. Larmsystemets målgrupp är privatpersoner, företag och myndigheter. Nuvarande system installeras, konfigureras och styrs från en manöverpanel. Viss manövrering kan också ske med hjälp av mobiltelefon via GSM-nätet. Önskemål från Lansen Technology finns att flytta funktionalitet till en mobil enhet och att komma ifrån trafikkostnaden på GSM-nätet. Målgruppen för applikationen är i första hand användare som omgående kräver tillgång till information från larmsystemet. Projektet har i huvudsak bestått av två delar. Första delen av projektet bestod av att utreda de två olika trådlösa tekniker som var aktuella för projektet. Utvärderingen visade att Bluetooth var det bästa valet med de krav larmsystemet ställde på uppkopplingen. Bluetooth integrerades därefter i nuvarande larmsystem. Den andra delen bestod av att utveckla en mjukvara  för att kunna manövrera larmsystemet från en handdator med Windows Mobile. Applikationen utvecklades framgångsrikt och kan utföra majoriteten av de funktioner som specificerats inför projektet. Idén med att fjärrstyra larmsystemet från en mobil enhet har resulterat i ett lyckosamt projekt.</p>
168

Indoor Positioning using Sensor-fusion in Android Devices

Shala, Ubejd, Rodriguez, Angel January 2011 (has links)
This project examines the level of accuracy that can be achieved in precision positioning by using built-in sensors in an Android smartphone. The project is focused in estimating the position of the phone inside a building where the GPS signal is bad or unavailable. The approach is sensor-fusion: by using data from the device’s different sensors, such as accelerometer, gyroscope and wireless adapter, the position is determined. The results show that the technique is promising for future handheld indoor navigation systems that can be used in malls, museums, large office buildings, hospitals, etc.
169

Cascading Web Services in Mobile Environments : Bridging Wireless and Wired Networks for Data Transactions

Kajtazi, Miranda, Vogel, Bahtijar January 2007 (has links)
<p>Cascading Web Services represent a collection of services offered in a system consisting of multiple devices and multiple interacting platform independent networks. ‘Cascading’ enables Web Services to exploit access in diverse environments without manual intervention. The aim of this thesis is to investigate how Mobile Web Services interact with multiple other Web Services by allowing the generated content to cascade. These services are demonstrated as a technical design solution, in a number of cases within the field of Learning technologies. Communication among devices is preceded using request-response commands by cascading these commands between different Web Services that are self-contained and independent on their context or state.</p><p>The system signifies a typical Service Oriented Architecture (SOA) based on a distributed system. Cascading Web Services involve multiple transport networks including Bluetooth Technology, GPRS, Wi-Fi, and Wired Networks. Whereas the protocol of this communication is to bridge Wired and Wireless networks for data transactions, specifically from a Bluetooth location-based network. A number of particular cases will be illustrated in the context of ‘educational outdoor activities’, to demonstrate how the system solution works involving users.</p>
170

Mobile localization : approach and applications

Rallapalli, Swati 09 February 2015 (has links)
Localization is critical to a number of wireless network applications. In many situations GPS is not suitable. This dissertation (i) develops novel localization schemes for wireless networks by explicitly incorporating mobility information and (ii) applies localization to physical analytics i.e., understanding shoppers' behavior within retail spaces by leveraging inertial sensors, Wi-Fi and vision enabled by smart glasses. More specifically, we first focus on multi-hop mobile networks, analyze real mobility traces and observe that they exhibit temporal stability and low-rank structure. Motivated by these observations, we develop novel localization algorithms to effectively capture and also adapt to different degrees of these properties. Using extensive simulations and testbed experiments, we demonstrate the accuracy and robustness of our new schemes. Second, we focus on localizing a single mobile node, which may not be connected with multiple nodes (e.g., without network connectivity or only connected with an access point). We propose trajectory-based localization using Wi-Fi or magnetic field measurements. We show that these measurements have the potential to uniquely identify a trajectory. We then develop a novel approach that leverages multi-level wavelet coefficients to first identify the trajectory and then localize to a point on the trajectory. We show that this approach is highly accurate and power efficient using indoor and outdoor experiments. Finally, localization is a critical step in enabling a lot of applications --- an important one is physical analytics. Physical analytics has the potential to provide deep-insight into shoppers' interests and activities and therefore better advertisements, recommendations and a better shopping experience. To enable physical analytics, we build ThirdEye system which first achieves zero-effort localization by leveraging emergent devices like the Google-Glass to build AutoLayout that fuses video, Wi-Fi, and inertial sensor data, to simultaneously localize the shoppers while also constructing and updating the product layout in a virtual coordinate space. Further, ThirdEye comprises of a range of schemes that use a combination of vision and inertial sensing to study mobile users' behavior while shopping, namely: walking, dwelling, gazing and reaching-out. We show the effectiveness of ThirdEye through an evaluation in two large retail stores in the United States. / text

Page generated in 0.1608 seconds