Search Results - (( java implication based algorithm ) OR ( using access point algorithm ))
Search alternatives:
- implication based »
- java implication »
- point algorithm »
-
1
Rogue access point detection and tracking system using trilateration algorithm
Published 2023“…Network security is vulnerable to rogue access points, and unauthorized wireless access points lead to security threats. …”
Get full text
Get full text
Book Section -
2
Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud
Published 2017“…All ten access point model used in the experiment are currently supplied by TM to the customers.…”
Get full text
Get full text
Thesis -
3
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The separation between uplink and downlink throughputs is based on separating the model equations between the access point and the stations. This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network
Published 2025“…For the enhanced roaming algorithm, two network parameters were considered: current associated stations and signal strength to the access point. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…In order to create database for indoor navigation system, Wi-Fi access point is required to create the reference point which use fingerprint technique by collecting the RSS I value for each access point (AP). …”
Get full text
Get full text
Thesis -
9
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012“…Through this algorithm, each access point (AP) that adjacent will be given different channels based on colours available. …”
Get full text
Get full text
Conference or Workshop Item -
10
Rogue access point detector in UTAR campus
Published 2024“…In contrast, network security may be vulnerable to rogue access points and unauthorised wireless access points that provide security threats. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Detecting rogue access point (RAP) using simple network management protocol (SNMP)
Published 2008“…Rogue access points (RAPs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. …”
Get full text
Get full text
Get full text
Book Section -
13
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…To overcome these issues in this algorithm, we have improved the existing DBSCAN to ST-DBSCAN where we have used the estimation for the epsilon value and used the Manatton distance formula to find out the distance between points which produces 94.9853 accuracy on our dataset. …”
Get full text
Get full text
Article -
14
-
15
-
16
-
17
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…However, accurately estimating the number of contending STAs without specific signalling is challenging for Access Points (APs). Using a fixed number of Resource Units (RUs) for the OFDMA backoff (OBO) counter can lead to higher collisions and underutilization. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Wi-fi fingerprint database construction using Chebyshev wavelet functions
Published 2015“…Once we have the path-loss function, we can predict the signal strength values at any point of the target area. One of the advantages of proposed algorithm is that it does not require any detailed information about target area, i.e. location of wireless access points, number of walls (floors, obstructions) between the transmitter and reference points and etc.…”
Get full text
Get full text
Conference or Workshop Item
