• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 146
  • 62
  • 31
  • 26
  • 21
  • 12
  • 8
  • 7
  • 5
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 409
  • 288
  • 79
  • 66
  • 61
  • 47
  • 46
  • 41
  • 40
  • 39
  • 37
  • 36
  • 36
  • 36
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Wi-Fi fingerprinting as a mean to measure building occupancy : A case study in an office environment

Bexhorn, Johan, Kvarnefalk, Karl January 2023 (has links)
The task of collecting visitor data in an indoor environment and therein determining the occupancy of a building is an extensive task. Conventional methods are expensive, time-consuming, and often lack the ability to produce data in longer time series. Further, they often require disruption of the studied area as equipment must be deployed. The use-case for such data sets is often also limited as it can only reflect a certain state-of-time in the studied space.The thesis seeks to investigate if using a Wi-Fi tracking system as a methodology to measure building occupancy through passive data collection is a viable method. Through continuous monitoring over an extended period, it seeks to do a trend analysis over a limited time. The collected data reveals insights into peak usage periods and commonly used areas. Although not used in this study, this methodology could leverage existing Wi-Fi infrastructure eliminating the need of installing additional equipment.In the case study, temporary wireless access points were deployed in the office which was studied. Data was then gathered after a month-long measurement period. This data was analyzed, and patterns were discovered showing higher occupation in the beginning of weeks and declining towards weekends. The focus of the study was to see if the technology would work in this context as it had previously not been tested in office environments.The results showed that there were some differences between data predicted by the Wi-Fi tracking system and that observed by the authors while conducting manual counts for validation during certain hours in the office. This may stem from faulty calibration of the model or settings affecting the signal strength required for the system to register devices as visitors. Mainly the conclusions are bound to the thesis subject and not placed in a larger context, however applications in public transport are suggested.The study displays the possibilities offered by using Wi-Fi tracking systems as a method to collect and analyze data in indoor environments. Further study of the subject would likely find a better model calibration able to predict more accurate results. Such results could be used and integrated with HVAC control systems to contribute to energy savings.
82

Application of DPSIR framework to access environmental impact of white limestone mining and processing in Luc Yen, Yen Bai province

Nguyen, Thi Cuc, Nguyen, Phuong, Nguyen, Quoc Phi, Phan, Thi Mai Hoa 21 February 2019 (has links)
Application of DPSIR framework (Drivers, Pressures, States, Impacts and Responses) aims to assess the current impact of the environment through a process starting with “driving forces” through “pressures” to “states” and “impacts” eventually leading to political “responses” in mineral mining in Luc Yen district. Research results show that the main drivers in Luc Yen are resources consumption (Wi = 3.675), the demand for industrial development (Wi = 3.575), followed by diversification and size of mines (Wi = 3.250). The environmental pressures are solid (Wi = 4.025), dust (Wi = 3.900) and wastewater (Wi = 3.625). The current state of environment is the most affected by air (Wi = 3.400). The soil and water are almost unaffected. The current environmental impacts have positive and negative social, economic and environmental impacts. Specifically, the positive impacts are employment opportunities, income (Wi = 3.325) and an increase in state budget (Wi =3.000). There are no positive improvements of the environment related to mining activities, such as negative impacts on ecological landscape (Wi = 3.050) and infrastructure (Wi = 3.075). Improving environmental quality and mitigating environmental impacts have been applied, including innovative technology (Wi = 3.175), pollution monitoring and environmental quality monitoring (Wi = 3.400). Communication activities to enhance community participation in Luc Yen area were also highly appreciated by people (Wi = 3.375). / Việc ứng dụng mô hình DPSIR (Drivers, Pressures, States, Impacts and Responses) nhằm mục đích đánh giá tác động môi trường theo một quá trình từ động lực, áp lực, hiện trạng và tác động đến đáp ứng để giải quyết vấn đề môi trường liên quan đến hoạt động khai thác khoáng sản tại huyện Lục Yên. Kết quả nghiên cứu cho thấy động lực dẫn tới hoạt động khai thác đá vôi trắng tại huyện Lục Yên là nhu cầu sử dụng tài nguyên (Wi = 3,675), nhu cầu phát triển hoạt động công nghiệp (Wi = 3,575), tiếp đến là sự đa dạng, quy mô các mỏ khoáng (Wi = 3,250). Áp lực môi trường là chất thải rắn (Wi = 4,025), tiếp đến là bụi (Wi = 3,900) và nước thải (Wi = 3,625). Hiện trạng môi trường tự nhiên hiện nay tại khu vực Lục Yên chịu ảnh hưởng mạnh nhất là không khí (trọng số Wi = 3,400), môi trường đất và nước gần như chưa bị tác động. Tác động môi trường hiện nay tại huyện Lục Yên thể hiện qua tác động đến môi trường xã hội và môi trường tự nhiên. Cụ thể, tác động giải quyết việc làm, tăng thu nhập (Wi = 3,325) và tăng ngân sách nhà nước (Wi = 3,000). Tác động tiêu cực tới cảnh quan sinh thái (Wi = 3,050) và cơ sở hạ tầng (Wi = 3,075). Các giải pháp cải thiện và giảm thiểu tác động môi trường đã áp dụng hiện nay là đổi mới công nghệ khai thác theo hướng tiên tiến (Wi = 3,175), giám sát ô nhiễm và quan trắc chất lượng môi trường (Wi = 3,400). Giải pháp truyền thông tăng cường sự tham gia của cộng đồng tại khu vực Lục Yên cũng được người dân đánh giá cao với trọng số (Wi = 3,375).
83

Integrating Wireless Sensor Technologies into Instrumentation and Telemetry Systems

Araujo, Maria S., Moodie, Myron L., Willden, Greg C., Thibodeaux, Ryan J., Abbott, Ben A. 10 1900 (has links)
ITC/USA 2010 Conference Proceedings / The Forty-Sixth Annual International Telemetering Conference and Technical Exhibition / October 25-28, 2010 / Town and Country Resort & Convention Center, San Diego, California / Recent technological advancements in low-power, low-cost, small-footprint embedded processors, sensors, and radios are resulting in the very rapid growth of wireless sensor network deployments. Wireless sensor networks merge the scalability and distributed nature of networked systems with the size and energy constraints of remote embedded systems. With the ever increasing need to develop less intrusive, more scalable solutions for instrumentation systems, wireless sensor technologies present several benefits. They largely eliminate the need for power and network wiring, thus potentially reducing cost, weight, and deployment time; their modularity provides the flexibility to rapidly change instrumentation configurations and the capability to increase the coverage of an instrumentation system. While the benefits are exciting and varied, as with any emerging technology, many challenges need to be overcome before wireless sensor networks can be effectively and successfully deployed in instrumentation applications, including throughput, latency, power management, electromagnetic interference (EMI), and band utilization considerations. This paper describes some approaches to addressing these challenges and achieving a useful system.
84

Styrning av datorers strömlägen med enhetsigenkänning via trådlösa nätverk : Controlling computer power modes using device recognition via wireless networks

Klintström, Angelica, Badini, André January 2015 (has links)
Rapportens syfte är att påvisa möjligheten att sänka energiförbrukningen på arbetsplatser. I samband med detta arbete utvecklas en hårdvarulösning, som kallas AutoSleep, vars syfte är att automatisera arbetsdatorns byte mellan strömspar- och aktivt läge.AutoSleep utför sin uppgift genom att söka efter en specifik förutbestämd enhet bland de enheter som för stunden är uppkopplade mot arbetsplatsens nätverk. Beroende på om enheten hittas eller ej skickar AutoSleep en signal till datorn som därefter antingen försätter datorn i strömsparläge eller i aktivt läge. För att undersöka nyttan och nödvändigheten hos arbetet utfördes en kvalitativ litteraturstudie, sammanställning av statistik från två enkäter, en intervju och en experimentell studie. All insamlad teori och statistik jämfördes med tidigare studier för att avgöra rapportens tillförlitlighet. Resultatet visade att det finns ett stort utrymme för förbättring inom energieffektiviseringen vid användandet av arbetsdatorer. Det system som utvecklades i samband med arbetet kan på ett enkelt sätt bidra till en energismartare arbetsmiljö. Arbetet visar på en möjlig lösning och använder ett hårdvarugränssnitt som endast är tillgängligt på stationära datorer. Hårdvarulösningen använder en smartphone som verktyg för enhetsigenkänning och växlar endast datorns strömläge mellan strömspar- och aktivt läge.
85

Telemetry System Architecture for a Solar Car

Walter, Eric, Glover, Nicholas, Cureton, Jesse, Kosbar, Kurt 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / This paper discusses the telemetry system used to monitor the performance of a solar-powered vehicle during testing and competitions. Car-side systems collect and transmit data onboard over an ISO 11898 / CAN bus. A bridge then converts this data into TCP/IP packets, which are transmitted via Ethernet to a Wi-Fi access point. The data is distributed through an IEEE 802.11N 5GHz mesh network to provide real time data to remote computers running telemetry software. This software displays and logs data from the car, allowing team members to monitor the vehicle.
86

Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques

Wang, Le 27 August 2013 (has links)
"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. "
87

Application of IEEE 802.15.4 for home network

Jonsson, Tobias, Acquaye, Gabriel January 2008 (has links)
<!--st1\:*{behavior:url(#ieooui) } -->&lt;!--[endif]--&gt; <!-- /* Font Definitions */ @font-face {font-family:Garamond; panose-1:2 2 4 4 3 3 1 1 8 3; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; mso-layout-grid-align:none; punctuation-wrap:simple; text-autospace:none; font-size:12.0pt; mso-bidi-font-size:10.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-GB; mso-fareast-language:EN-US;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> To implement a utility wireless sensor network, investigation of different wireless protocols has been performed. The protocols are Bluetooth, Wi-Fi, IEEE 802.15.4 and Zigbee. Consecutively literature studies have made it comprehensible to understand the function of the protocols that are suitable for development of wireless sensor networks. The importance of low cost, low power, reliable and high-quality properties for long distances are significant. IEEE 802.15.4 and Zigbee protocol are proper to implement as a wireless sensor network.   To reduce the human efforts in the configuration of the system, a comfortable method is implemented to facilitate the procedure. The applied method is based on an automatic configuration of the system. The configuration and the decision taking are implemented in the software. The system is designed to avoid interference to other wireless networks with the possibilities of reconfiguration. A uniform hardware and software design with separate functions of the system decided by a subsequent command for configuration is preferable. This imposes an advantage that increases the flexible potential of the system when a uniform solution is implemented.   To support the basic communication principles and control of the system, a buffer implementation has been introduced. The functionality of decision taking is distributed, configured by system commands from the host system. Detecting of system commands requires a properly operating buffer management. In consideration to the power consumption in reference to battery utilizations, the settings of RF-module and microcontroller have a powerful impact to reduce the power consumption. All possibilities of hibernates and avoidance of unnecessarily transmitting, should be deactivated to minimize the power consumption.
88

Sécurité dans les réseaux Wi-Fi : étude détaillée des attaques et proposition d'une architecture Wi-Fi sécurisée

Gaha, Maher 03 1900 (has links) (PDF)
Nous avons assisté ces dernières années à la montée en puissance des réseaux locaux sans fil ou encore Wi-Fi, qui sont en passe de devenir l'une des principales solutions de connexion pour de nombreuses entreprises. Le marché du sans fil se développe rapidement dès lors que les entreprises constatent les gains de productivité qui découlent de la disparition des câbles. Avec cette évolution rapide de ce type dématérialisé de réseaux, les exigences en termes de sécurité deviennent de plus en plus sévères. De ce fait, beaucoup de travaux et d'efforts ont été consentis ces dernières années afin d'aboutir à des solutions pour sécuriser ces réseaux. Toutefois, des vulnérabilités persistent encore et il est toujours possible de monter des attaques plus ou moins facilement. Notamment, contre le dernier né des protocoles de sécurité Wi-Fi, à savoir WPA2, qui bien qu'étant plus robuste sur le plan conceptuel que les générations précédentes, fait face à un problème majeur, celui de son incompatibilité matérielle avec les précédents protocoles. En effet, WPA2 exige de nouveaux équipements matériels, ce qui constitue un surcoût économique énorme pour les entreprises ayant déjà déployé des équipements Wi-Fi d'anciennes générations. Dans ce mémoire, nous élaborons une synthèse exhaustive de toutes les attaques qui ciblent les réseaux Wi-Fi. Cette synthèse comprend une classification des attaques par rapport aux standards de sécurité ainsi que l'illustration des détails de leur mise en œuvre. Outre le volet conceptuel et théorique, nous abordons également le volet pratique et montrons sa richesse. Nous proposons également une nouvelle approche architecturale de sécurisation des réseaux Wi-Fi dans l'entreprise. Notre proposition prend en compte l'hétérogénéité des équipements et des standards de sécurité supportés. Cette nouvelle architecture a le mérite d'offrir une grande flexibilité ainsi qu'une sécurité renforcée par rapport aux approches traditionnelles. Pour élaborer cette solution sécurisée, nous nous sommes basés principalement sur la différenciation à plusieurs niveaux (standard de sécurité supporté, communauté d'utilisateurs, nature de trafic). Ces niveaux de différenciation offrent la granularité nécessaire pour permettre une meilleure gestion du réseau et un meilleur contrôle d'accès aux ressources, ce qui améliore la sécurité du réseau Wi-Fi en particulier et du système d'information de l'entreprise dans son ensemble. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : Wi-Fi, sécurité, attaque, architecture sécurisée, différenciation.
89

Self-optimization of Radio Resources on IEEE 802.11 Networks

García Villegas, Eduardo 18 February 2010 (has links)
Les xarxes d'àrea local sense fils (WLANs), principalment les basades en les diverses versions de les normes IEEE 802.11, i més concretament, aquelles operant en mode infraestructura (ús de punts d'accés o APs), són avui dia les tecnologies més populars per a l'accés ràdio de banda ampla a xarxes IP, ja sigui per a estendre petites xarxes LAN domèstiques (SOHO), o per a proporcionar accés d'Internet en espais públics. A més, amb l'arribada de productes amb el certificat Wi-Fi, els diferents fabricants de dispositius WLAN proporcionen un alt nivell d'interoperabilitat.No obstant això, la creixent densitat de punts d'accés WLAN ha començat a revelar els efectes negatius i les deficiències de les normes IEEE 802.11 inicials. Un dels factors clau del seu èxit, l'ús de la bandes de freqüència lliures (bandes ISM), és al mateix temps un dels seus grans inconvenients. Aquestes freqüències són de lliure accés al públic en general, i es defineixen dins d'una petita porció de l'espectre. En conseqüència, són generalment compartides entre diversos usuaris, dispositius de tecnologies diferents, etc.. A més, el control d'accés al medi definit per l'IEEE 802.11 (CSMA, o "escoltar abans de parlar") requereix una atenció especial a tots els problemes sorgits al voltant de les interferències.En aquest escenari, les xarxes WLAN IEEE no estan en condicions d'arribar a explotar tot el seu potencial. Malgrat aquest fet, unes polítiques intel·ligents sobre la gestió dels recursos ràdio (RRM) poden ajudar a reduir al mínim els efectes perjudicials de les interferències i d'una distribució desigual de la càrrega oferta. En aquesta tesi, es demostra que els mecanismes de RRM eficients són capaços de millorar notablement el rendiment d'una WLAN basada en l'IEEE 802.11.Aquesta tesi estudia la forma d'entendre els problemes de rendiment que són endèmics en les WLANs IEEE 802.11, així com les formes de minimitzar aquests efectes negatius per mitjà de la gestió de recursos ràdio. De fet, aquests problemes no són nous i han estat àmpliament estudiats des de l'aparició de xarxes de comunicacions mòbils, però les característiques particulars de les xarxes WLAN 802,11 requereixen nous enfocaments.Els mecanismes RRM en l'àmbit de les xarxes WLAN IEEE 802.11 són bàsicament destinats a reduir el grau de contenció i la interferència. Aquesta reducció es tradueix en una millor qualitat d'experiència (QoE), d'acord amb la percepció dels usuaris. Amb aquesta finalitat, RRM ha de proporcionar mecanismes eficients d'assignació de canals, algoritmes de selecció de modulació, control de potència i repartiment de càrrega. Atesa la naturalesa dinàmica de la propagació ràdio, i a causa de la mobilitat dels usuaris, els paràmetres que defineixen l'entorn sense fils varien amb el temps. Llavors, per tal de mantenir el rendiment en nivells acceptables, s'han de trobar mecanismes RRM que permetin una reconfiguració automàtica i dinàmica de la xarxa en resposta als canvis en el medi. En resum, podem construir el nostre escenari d'interès a partir de dispositius Wi-Fi intel·ligents capaços de cooperar, ja sigui de forma centralitzada o distribuïda, per tal de fer un millor ús dels minsos recursos ràdio.La nostra contribució als mecanismes RRM en xarxes WLAN s'inicia amb l'estudi i la caracterització de la interferència en l'àmbit particular de les xarxes IEEE 802.11. A continuació, desenvolupem un model de capacitat per a grans xarxes WLAN multi cel·la que té en compte tant l'efecte de la càrrega de la xarxa, com el de les interferències entre cel·les. El model també inclou l'efecte de l'adaptació automàtica de modulació que porten a terme molts dispositius. Aquestes estimacions de la capacitat són útils per a avaluar els beneficis d'un mecanisme RRM. Per exemple, aquestes estimacions són la base sobre la qual desenvolupem una innovadora solució per a la gestió de freqüències. Aquest mecanisme d'assignació de freqüències fa ús de tot l'espectre disponible (tant si es tracta de canals ISM solapats o no), ja que té en compte els efectes dels dos tipus d'interferència que trobem en xarxes IEEE 802.11: co-canal i per canal adjacent. Per tal de fer front a una distribució desigual de la càrrega, fet que es dóna típicament en els anomenats hotspots, es proposen dos mecanismes de repartiment de càrrega (un cop definit el concepte de càrrega): un enfocament distribuït gestionat per les estacions client, i un mecanisme de "cell breathing".Tots aquests mecanismes han de ser integrats en una arquitectura de gestió aglutinadora. En aquest sentit, s'han desenvolupat dues arquitectures de RRM: una arquitectura centralitzada, com a part del projecte UAMN, i un sistema distribuït. / WLANs, primarily the various versions of IEEE 802.11 standards, and more precisely, those operating in infrastructure mode, are nowadays the most popular technologies for providing broadband radio access to IP networks, whether to extend Small Office/Home Office (SOHO) network LANs or to provide Internet access in public places. Moreover, with the advent of Wi-Fi certified products, different competitive brands of WLAN devices are interoperable at a basic level of service.However, the increasing density of WLAN access points has started to reveal the negative effects and shortcomings of the original IEEE 802.11 standards. One of its key success factors, the use of unlicensed Industrial Scientific Medical (ISM) frequency bands, is at the same time one of its major drawbacks. These frequencies are freely available to the general public. On the other hand, such frequencies are defined within a small portion of the spectrum and are usually shared among several users. Besides, the medium access defined by the IEEE 802.11 (CSMA, or "listen before talk") requires a special attention to all interference issues.In this scenario, IEEE WLANs are unable to exploit all their potential. However, intelligent radio resource management (RRM) policies could be applied to minimize the harmful effects of interference and an uneven load distribution. Throughout this dissertation, it is shown that efficient RRM mechanisms are able to improve notably the performance of a legacy IEEE WLAN.This thesis explores ways of understanding the performance issues that are endemic to IEEE 802.11 WLANs, as well as ways of minimizing these negative effects by means of radio resource management. In fact, these problems are not new and have been studied extensively since the advent of mobile communications networks, but the particular characteristics of the 802.11 WLANs require new approaches.RRM mechanisms in the field of IEEE 802.11 WLANs are basically intended to reduce contention and interference. This reduction is translated into an improved Quality of Experience (QoE), as perceived by the users. To this end, RRM should provide efficient channel allocation mechanisms, modulation selection algorithms, power control and load balancing. Given the dynamic nature of radio propagation, and due to user mobility, the parameters that define the wireless environment vary in time. Therefore, in order to maintain the required performance, we should find mechanisms that allow a dynamic and automatic reconfiguration of the network in response to the changes in the environment. To sum up, we build our scenario of interest with intelligent Wi-Fi devices capable of cooperating either in a centralized or a distributed manner, in order to make a better use of the shared and scarce radio resources.Our contribution to RRM on WLANs starts with the study and characterization of interference in the particular field of IEEE 802.11 networks. Following, we develop a capacity model for large WLAN deployments that takes both the effect of carried traffic and inter-cell interference into account. The model also includes the effect of rate adaptation. These capacity estimations are useful to evaluate the benefits of a RRM mechanism, for example, it was used as the metric observed by a frequency management approach. This frequency assignment mechanism makes use of all the available spectrum (overlapping and non-overlapping ISM channels), since it takes the effects of both co-channel and adjacent-channel interference into account. In order to cope with the uneven load distribution usually found on hot-spots, two load balancing mechanisms are proposed after defining the concept of load: a client-driven approach, and a cell-breathing mechanism. All these mechanisms need to be integrated into a single architecture. In this regard, two radio resource management architectures are developed: a centralized architecture, as part of the UAMN project, and a distributed scheme.
90

Statistical Processing of IEEE 802.15.4 Data Collected in Industrial Environment

Wang, Yun, Jiang, Wenxuan January 2013 (has links)
Wireless sensor network, which is constitute of autonomous sensors, is used for monitoring physical or environmental conditions like temperature, sound, pressure, and so on. The dispersed sensors or nodes will respectively pass their data through the network to the main location. Currently, several standards are ratified or in developing for wireless sensor network, like Wireless Hart, ISA, 100.11a, WIA-PAA, IEEE 802.15.4, etc. Among the standards, Zigbee is often used in industrial applications that require short-range and low-rate wireless transfer. In the research, all the data is collected under industrial environment using IEEE 802.15.4 compliant physical layer, some packets are interfered only by multi-path fading while others are also interfered by Wi-Fi interference. The goal of the thesis is to find out the dependence between the received power (RSS), correlation value (CORR) and bit error rate (BER) of the received message, and their distribution in situations both when the packet is lost or not. Besides, the performance of bit error rate such as the distribution and the features of burst error length under Wi-Fi interference or not will also be tested. All of them are based on a precise statistical processing.

Page generated in 0.0153 seconds