To see the other types of publications on this topic, follow the link: Wi-Fi Protected Access 3.

Journal articles on the topic 'Wi-Fi Protected Access 3'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wi-Fi Protected Access 3.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, Byoungcheon. "Stateless Re-Association in WPA3 Using Paired Token." Electronics 10, no. 2 (January 19, 2021): 215. http://dx.doi.org/10.3390/electronics10020215.

Full text
Abstract:
In Wi-Fi Protected Access 3 (WPA3), a secure connection is established in two sequential stages. Firstly, in the authentication and association stage, a pairwise master key (PMK) is generated. Secondly, in the post-association stage, a pairwise transient key (PTK) is generated from PMK using the traditional 4-way handshake protocol. To reduce the heavy load of the first stage, PMK caching can be used. If the client and AP are previously authenticated and have a PMK cache, the first heavy stage can be skipped and the cached PMK can be used to directly execute the 4-way handshake. However, PMK caching is a very primitive technology to manage shared key between a client and AP and there are many limitations; AP has to manage a stateful cache for a large number of clients, cache lifetime is limited, etc. Paired token (PT)is a new secondary credential scheme that provides stateless pre-shared key (PSK) in a client-server environment. The server issues a paired token (public token and secret token) to an authenticated client where the public token has the role of signed identity and the secret token is a kind of shared secret. Once a client is equipped with PT, it can be used for many symmetric key-based cryptographic applications such as authentication, authorization, key establishment, etc. In this paper, we apply the PT approach to WPA3 and try to replace the PMK caching with the one-time authenticated key establishment using PT. At the end of a successful full handshake, AP securely issues PT to the client. Then, in subsequent re-association requests, the client and AP can compute the same one-time authenticated PMK using PT in a stateless way. Using this kind of stateless re-association technology, AP can provide a high performance Wi-Fi service to a larger number of clients.
APA, Harvard, Vancouver, ISO, and other styles
2

Eissa, M. M., Ihab A. Ali, and K. M. Abdel-Latif. "Wi-Fi protected access for secure power network protection scheme." International Journal of Electrical Power & Energy Systems 46 (March 2013): 414–24. http://dx.doi.org/10.1016/j.ijepes.2012.10.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.

Full text
Abstract:
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
APA, Harvard, Vancouver, ISO, and other styles
4

Nguyen, Duc-Thang, and Taehong Kim. "An SDN-Based Connectivity Control System for Wi-Fi Devices." Wireless Communications and Mobile Computing 2018 (July 24, 2018): 1–10. http://dx.doi.org/10.1155/2018/9359878.

Full text
Abstract:
In recent years, the prevalence of Wi-Fi-enabled devices such as smartphones, smart appliances, and various sensors has increased. As most IoT devices lack a display or a keypad owing to their tiny size, it is difficult to set connectivity information such as service set identifier (SSID) and password without any help from external devices such as smartphones. Moreover, it is much more complex to apply advanced connectivity options such as SSID hiding, MAC ID filtering, and Wi-Fi Protected Access (WPA) to these devices. Thus, we need a new Wi-Fi network management system which not only facilitates client access operations but also provides a high-level authentication procedure. In this paper, we introduce a remote connectivity control system for Wi-Fi devices based on software-defined networking (SDN) in a wireless environment. The main contributions of the proposed system are twofold: (i) it enables network owner/administrator to manage and approve connection request from Wi-Fi devices through remote services, which is essential for easy connection management across diverse IoT devices; (ii) it also allows fine-grained access control at the device level through remote control. We describe the architecture of SDN-based remote connectivity control of Wi-Fi devices. While verifying the feasibility and performance of the proposed system, we discuss how the proposed system can benefit both service providers and users.
APA, Harvard, Vancouver, ISO, and other styles
5

Kalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.

Full text
Abstract:
Abstract The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Omollo, Vincent N., and Ruth K. Chweya. "Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol." Universal Journal of Communications and Network 3, no. 2 (May 2015): 35–40. http://dx.doi.org/10.13189/ujcn.2015.030201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garey, Wesley D., Yishen Sun, and Richard A. Rouil. "Performance Evaluation of Proximity Services and Wi-Fi for Public Safety Mission Critical Voice Application." Wireless Communications and Mobile Computing 2020 (May 21, 2020): 1–12. http://dx.doi.org/10.1155/2020/8198767.

Full text
Abstract:
Proximity Services (ProSe) and Wi-Fi are two promising technologies that may provide support for Mission Critical Voice (MCV) applications in remote and rural areas by enabling Device-to-Device (D2D) communication. In this paper, several performance metrics of ProSe and Wi-Fi are evaluated and compared side-by-side under various configurations. The ns-3 simulation results show that ProSe outperforms Wi-Fi in terms of coverage range and access time with a medium traffic load, while Wi-Fi has a shorter access time under a light traffic load. In addition, with various user densities, ProSe offers better coverage range and access time a majority of the time. The evaluation in this paper provides insights to first responders on what to expect with either technology and how to improve the performance by adjusting different system parameters.
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Yue, Ruizhi Chen, Zuoya Liu, Guangyi Guo, Feng Ye, and Liang Chen. "Wi-Fi Fine Time Measurement: Data Analysis and Processing for Indoor Localisation." Journal of Navigation 73, no. 5 (May 4, 2020): 1106–28. http://dx.doi.org/10.1017/s0373463320000193.

Full text
Abstract:
Indoor positioning systems have received increasing attention for supporting location-based services in indoor environments. Wi-Fi based indoor localisation has become attractive due to its extensive distribution and low cost properties. IEEE 802.11-2016 now includes a Wi-Fi Fine Time Measurement (FTM) protocol which can be used for Wi-Fi ranging between intelligent terminal and Wi-Fi access point. This paper introduces a framework of Wi-Fi FTM data acquisition and processing that can be used for indoor localisation. We analyse the main factors that affect the accuracy of Wi-Fi ranging and propose a calibration, filtering and modelling algorithm that can effectively reduce the ranging error caused by clock deviation, non-line-of-sight (NLOS) and multipath propagation. Experimental results show that the proposed calibration and filtering method is able to achieve metre-level ranging accuracy in case of line-of-sight by using large bandwidth. Estimation results also show that the proposed Wi-Fi ranging model provides an accurate ranging performance in NLOS and multipath contained indoor environment; the final positioning error is less than 2·2 m with a stable output frequency of 3 Hz.
APA, Harvard, Vancouver, ISO, and other styles
9

Noh, Jaewon, Jeehyeong Kim, and Sunghyun Cho. "Secure Authentication and Four-Way Handshake Scheme for Protected Individual Communication in Public Wi-Fi Networks." IEEE Access 6 (2018): 16539–48. http://dx.doi.org/10.1109/access.2018.2809614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reva, Ivan, Aleksei Bogdanov, and Ekaterina Malakhova. "Application of Wi-Fi-access points to record object movements." Science Bulletin of the Novosibirsk State Technical University, no. 3 (October 9, 2017): 104–25. http://dx.doi.org/10.17212/1814-1196-2017-3-104-125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kohlios, Christopher, and Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3." Electronics 7, no. 11 (October 30, 2018): 284. http://dx.doi.org/10.3390/electronics7110284.

Full text
Abstract:
The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have progressed to provide wireless accessibility to industries and consumers with growing ease and convenience. As the usage of personal devices, such as phones and watches, that connect to the Internet through Wi-Fi increases, wireless attacks on users are becoming more critical. This paper provides a novel attack model to offer an organized and comprehensive view of the possible attacks on Wi-Fi latest security standards. All existing attacks will be investigated, with emphasis on more recent attacks, such as the KRACK and PMKID Dictionary attacks. The main contribution of this paper is to analyze the technology offered in the new Wi-Fi Protected Access III (WPA3) security scheme and provide the first comprehensive security analysis and discussion to determine whether it has addressed the vulnerabilities of its predecessor. An interesting finding of this paper is that WPA3 still lacks in addressing all the issues existing in WPA2 and exploring other mitigations for future research.
APA, Harvard, Vancouver, ISO, and other styles
12

Dauitbayeva, Aigul Ospanovna, Elmira Nurlanovna Tulegenova, Sapar Omir, and Mukhtar Kozhan. "CONCEPT OF PROTECTED NETWORKS CREATION." Bulletin of Toraighyrov University. Energetics series, no. 3.2020 (October 14, 2020): 87–94. http://dx.doi.org/10.48081/aqby3283.

Full text
Abstract:
Nowadays, it is important for users to know how to contact a corporate information system. There is a need for broadband connection, whether it’s fixed line or Wi-Fi, as it’s not rare for users to work on the road. At the moment, virtual technologies are widely popular, they have a high place in modern companies. Because they allow the voice server to communicate to one workplace. It does not require staff always to keep up-to-date with the Service, and there’s no need to be there, so use remote access. Many institutions have been fixed or fixed through a mobile connection that ensures optimal connection of mobile workers through the terminal. They work with voice data transmission services. It ensures that employees are always in touch.
APA, Harvard, Vancouver, ISO, and other styles
13

Miller, Joshua D., Edward A. Frongillo, Elly Weke, Rachel Burger, Pauline Wekesa, Lila A. Sheira, A. Rain Mocello, et al. "Household Water and Food Insecurity Are Positively Associated with Poor Mental and Physical Health among Adults Living with HIV in Western Kenya." Journal of Nutrition 151, no. 6 (March 12, 2021): 1656–64. http://dx.doi.org/10.1093/jn/nxab030.

Full text
Abstract:
ABSTRACT Background Household food insecurity (FI) and water insecurity (WI) are prevalent public health issues that can co-occur. Few studies have concurrently assessed their associations with health outcomes, particularly among people living with HIV. Objectives We aimed to investigate the associations between FI and WI and how they relate to physical and mental health. Methods Food-insecure adult smallholder farmers living with HIV in western Kenya were recruited to participate in a cluster-randomized controlled trial of a multisectoral agricultural and asset loan intervention. We used baseline data on experiences of FI (using the Household Food Insecurity Access Scale, range: 0–27) and WI (using a modified scale developed for this region, range: 0–51) in the prior month (n = 716). Outcomes included probable depression (using the Hopkins Symptom Checklist), fatigue and diarrhea in the prior month, and overall mental and physical health (using the Medical Outcomes Study HIV Health Survey, range: 0–100). We first assessed Pearson correlations between FI, WI, and sociodemographic characteristics. We then developed 3 regressions for each health outcome (control variables and FI; control variables and WI; control variables, FI, and WI) and compared model fit indexes. Results Correlations between household FI, WI, and wealth were low, meaning they measure distinct constructs. FI and WI were associated with numerous physical and mental health outcomes; accounting for both resource insecurities typically provided the best model fit. For instance, when controlling for FI, each 10-point higher WI score was associated with a 6.42-point lower physical health score (P < 0.001) and 2.92 times greater odds of probable depression (P < 0.001). Conclusions Assessing both FI and WI is important for correctly estimating their relation with health outcomes. Interventions that address food- and water-related issues among persons living with HIV concurrently will likely be more effective at improving health than those addressing a single resource insecurity. This trial was registered at clinicaltrials.gov as NCT02815579.
APA, Harvard, Vancouver, ISO, and other styles
14

Sharaf, Nevin E., Asmaa F. Galal, Mohamed S. El-Sawy, Aziza B. Shalby, Alaa H. Sayed, and Hanaa H. Ahmed. "Role of designed Bio-Geometrical forms in antagonizing neurobehavioral burden of Wi-Fi radiation: Evidence-based experimental study." Biomedical & Pharmacology Journal 12, no. 3 (September 14, 2019): 1217–34. http://dx.doi.org/10.13005/bpj/1751.

Full text
Abstract:
This study investigated the impact of Wi-Fi signals exposure on cognitive function and its relevant brain biomarkers and the possible role of designed Bio-Geometrical forms in restoring the neurobehavioral alterations resulting from the exposure to the emerging radiation.Rats were assigned into 3 groups; Gp I control group (away from exposure to radiation); Gp II, III were exposed to wireless router signals for 24 h for 6 months and Gp III was protected by a set of designed BioGeometrical shapes. Animals were tested for spatial memory, anxiety and emotionality in addition to the related neurotransmitters (dopamine, serotonin and acetylcholine) in different brain areas. Melatonin, Heat Shock Protein (HSP-70) and acetylcholine esterase (AchE) were also measured in various brain regions and histopathological examination was carried out as well. Wi-Fi radiation exposed group showed elevated anxiety level and impaired spatial memory. Moreover, significant decline in dopamine, serotonin and acetylcholine levels in the investigated brain areas has been recorded. Melatonin levels were decreased in the cortex, striatum and hippocampus while HSP-70 was depleted in the cortex only. Using Bio-Geometrical forms along with Wi-Fi exposure could combat the burden of Wi-Fi radiation. This was evidenced by the recovery of the anxiety level and the improvement of memory task. In addition, the presence of Bio-Geometrical shapes could retrieve dopamine, serotonin and acetylcholine as well as melatonin and HSP-70 levels This study provides solid foundation for the potential use of Bio-Geometrical shapes to modify the insult of Wi-Fi radiation on brain function and structure.
APA, Harvard, Vancouver, ISO, and other styles
15

Orukpe, P. E., T. O. Erhiaguna, and F. O. Agbontaen. "Computer Security and Privacy in Wireless Local Area Network in Nigeria." International Journal of Engineering Research in Africa 9 (May 2013): 23–33. http://dx.doi.org/10.4028/www.scientific.net/jera.9.23.

Full text
Abstract:
The advent of wireless computing and massive processing power available within portable devices provides organizations with an unprecedented ability to provide flexible computing services on-demand to enable business initiatives and this development has increased the demand for wireless network security, which if unaddressed enables the theft of data, lowers productivity, and causes quantifiable financial losses. Flaws arising from wireless protocol with networking design and implementation errors present challenges to the Wireless Fidelity (Wi-Fi) community of users. In this paper, we attempt to document and classify the flaws in Wi-Fi Protected Setup (WPS), then proving the existence of this flaw with a WPS Pin Cracking Method, and presenting a Reverse Engineering countermeasure to eliminating WPS from an Access Point firmware, including other recommendations to helping the network administrators not repeat the errors that are the root causes of flaws of wireless networking in general from being exploited. By implementing the various techniques discussed in this paper, a better and more secure wireless network will be developed.
APA, Harvard, Vancouver, ISO, and other styles
16

Dhiko Pradnyana, Putu, D. M. Wiharta, and N. P. Sastra. "ANALISIS CAKUPAN LAYANAN WI-FI GEDUNG PASCASARJANA UNIVERSITAS UDAYANA." Jurnal SPEKTRUM 6, no. 2 (June 1, 2019): 60. http://dx.doi.org/10.24843/spektrum.2019.v06.i02.p09.

Full text
Abstract:
The main changes in the telecommunication during these present days come mainly from wired technology to wireless technology. The Wireless LAN (WLAN) configuration consists of an access point, connected to users using air medium. The postgraduate building of Universitas Udayana has been equipped with a wireless network, supporting the study activities within the building. This research explains regarding the signal level quality and the Quality of Service (QoS) by analyzing the Wi-Fi coverage. The measurements were divided into two models, with and without barriers. The highest result comes to -42 dBm, conversely, the lowest is -82 dBm. Thus, the results show that the throughput value is 3.97 Mbps. Within the maximum bandwidth of 10 Mbps, the average packet-loss is not more than 3%. The delay measurement provides a result of not more than 100 ms, and the jitter obtained is 0.04. According to the digital floor plan, the calculation results of the coverage area match the signal level measurement.
APA, Harvard, Vancouver, ISO, and other styles
17

Velichko, M. A., Yu P. Gladkikh, and O. N. Satler. "CALIBRATION OF ULTRASONIC FLOWMETER FOR WI-FI NETWORK WITH THE HELP OF WEB BROWSER." Herald of Dagestan State Technical University. Technical Sciences 45, no. 3 (May 12, 2019): 94–102. http://dx.doi.org/10.21822/2073-6185-2018-45-3-94-102.

Full text
Abstract:
Objectives. The purpose of the work was to change the method of signal transmission containing metrological information from industrial time-pulse ultrasonic gas flow meter to a compu-ting device (CD). It was planned to expand the range of devices serving as gas flow calculators. A hardware-software complex (HSC) for automatic calibration / verification of ultrasonic flowmeters was to be developed. This HSC should work equally well on different operating systems. The information exchange between the CD and the flowmeter was to be carried out wirelessly.Method. The Wi-Fi Pro-tocol was used as a wireless Protocol. The energy-efficient ESP8266 controller was chosen as micro-controller to provide the functionality of Wi-Fi. The ESP8266 board acted as a Wi-Fi access point on the network to which CD was connected for data exchange. The ESP8266 microcontroller also served as a HTTP server. Exchange of metrological and other information was carried out by GET-requests. Given the need for continuous flow measurements and simultaneous communication between the user and the flow meter, requests to the server were transmitted using AJAX technology. The software part of the APK consisted of 3 programs: a program that measured the flow and transmitted the information further to the ESP8266 microcontroller, a server program recorded in ESP8266, providing a response to the requests of CD users, and the client program installed on the CD. The article discusses the key points of the HSC.Result. As a result of this work, the HSC was processed for calibration/verification of ultrasonic gas flow meters. For the first time this process for industrial flow meters was implemented using the ESP8266Wi-Fi controller as an access point. As a WU, it became possible to use any desktop or laptop computer or mobile device with a modern browser.Conclusion. The method proposed in the paper significantly simplified the data exchange between the VU and the flowmeter, reduced the cost of software development due to the common approach for different operating systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Ibitayo, A. O., O. B. Afolabi, A. J. Akinyemi, T. I. Ojiezeh, K. O. Adekoya, and O. O. Ojewunmi. "RAPD Profiling, DNA Fragmentation, and Histomorphometric Examination in Brains of Wistar Rats Exposed to Indoor 2.5 Ghz Wi-Fi Devices Radiation." BioMed Research International 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/8653286.

Full text
Abstract:
The advent of Wi-Fi connected high technology devices in executing day-to-day activities is fast evolving especially in developing countries of the world and hence the need to assess its safety among others. The present study was conducted to investigate the injurious effect of radiofrequency emissions from installed Wi-Fi devices in brains of young male rats. Animals were divided into four equal groups; group 1 served as control while groups 2, 3, and 4 were exposed to 2.5 Ghz at intervals of 30, 45, and 60 consecutive days with free access to food and water ad libitum. Alterations in harvested brain tissues were confirmed by histopathological analyses which showed vascular congestion and DNA damage in the brain was assayed using agarose gel electrophoresis. Histomorphometry analyses of their brain tissues showed perivascular congestion and tissue damage as well.
APA, Harvard, Vancouver, ISO, and other styles
19

Gao, Longshi, Shuangxia Tang, and Yuntian Brian Bai. "A New Approach for Wi-Fi-Based People Localization in a Long Narrow Space." Wireless Communications and Mobile Computing 2019 (April 23, 2019): 1–8. http://dx.doi.org/10.1155/2019/9581401.

Full text
Abstract:
Wi-Fi-based positioning technology has been recognized as an effective technology for indoor positioning along with the rapid development and application of smartphones. One of its typical applications is localizing people in large public areas such as shopping malls, schools, and airports. A common and critical task from such applications is localizing people in long narrow spaces such as a long corridor which is considered as the most frequent place where people activities take place. Generally, the geographical distribution of Wi-Fi access points (APs) in long spaces is poor for localizing people since normally less than 3 APs are connected to a smartphone. In addition, all these APs are normally mounted along a straight line; hence, it is difficult to track people using traditional positioning algorithms such as trilateration and fingerprinting. To address this issue, a new approach called same-line-dual-connection (SLDC) was developed to estimate user locations with a good positioning accuracy, particularly for long narrow spaces where only limited Wi-Fi connections are available. The SLDC approach integrates geometry principle with positioning theories and machine learning ideas. The test outcome has shown that the SLDC approach produced a promising result, and a mean positioning accuracy of 1.60 m was achieved.
APA, Harvard, Vancouver, ISO, and other styles
20

Callejas-Cuervo, Mauro, Manuel Andrés Vélez-Guerrero, and Andrea Catherine Alarcón-Aldana. "Characterization of Wireless Data Transmission over Wi-Fi in a Biomechanical Information Processing System." Revista Facultad de Ingeniería 29, no. 54 (November 6, 2019): e10228. http://dx.doi.org/10.19053/01211129.v29.n54.2020.10228.

Full text
Abstract:
This paper presents a characterization of the wireless transmission of biomechanical signals in an embedded system, where a TCP protocol is used in an IEEE 802.11 communications network (Wi-Fi). The embedded system under study, called Imocap, allows the collection, analysis and transmission of biomechanical signals in real-time for various applications, among which the analysis of the movement of the lower and upper extremities and the operation of various control systems stand out. To accomplish this, Imocap is equipped with a Wi-Fi transceiver module (ESP8266) and various input and output peripherals. The wireless communication performance of Imocap, exposed in this paper, was analyzed through different tests in miscellaneous conditions like indoors, outdoors and in the presence of interference, noise and other wireless networks. The different test protocols conducted result in the Imocap system: 1) has a maximum effective range of 45.6 m when in Access Point mode; 2) has a maximum effective range of 44.3 m when in Station mode. In indoors and under the same conditions, the Imocap system: 3) has a maximum effective range of 81.25 m2, either Access Point or Station mode. The results showed that the transmission of biomechanical information through Wi-Fi using the TCP protocol is efficient and robust, both indoors and outdoors, even in environments of radio frequency interference. The use of this protocol is emphasized since its use allows the transmission of packages to be carried out in a controlled manner, allowing the error handling and recovery. In this way, it is possible to carry out efficient and robust wireless communication through embedded and portable devices, focusing mainly on areas such as medicine, telemedicine and telerehabilitation.
APA, Harvard, Vancouver, ISO, and other styles
21

Utley, Lynn M., Grace S. Manchala, Mark J. Phillips, Chirag P. Doshi, Victoria L. Szatalowicz, and Jennifer R. Boozer. "Bridging the Telemedicine Gap Among Seniors During the COVID-19 Pandemic." Journal of Patient Experience 8 (January 1, 2021): 237437352110140. http://dx.doi.org/10.1177/23743735211014036.

Full text
Abstract:
At the onset of the COVID-19 pandemic, many senior patients in the USC-Keck Family Medicine clinics were limited or lacking in telemedicine participation. Three factors contributed: lack of video-enabled devices, technological literacy, and/or absence of Wi-Fi connectivity. We addressed the first 2 of these factors. Via phone contact, 9 patients agreed to receive donated Android or Apple devices and to trial instruction manuals for use. Donated equipment and instructions were prepared and delivered in accordance with pandemic guidelines. Follow-up calls indicated that 4 participants were able to set up their devices and 3 of whom had connected with their providers. The remaining 5 participants had not set up their devices by the end of the follow-up period, had difficulty with device setup, accessing applications necessary for telemedicine, or had limited access to Wi-Fi. This project highlights some telemedicine barriers that senior patients may overcome with the additional support of care providers.
APA, Harvard, Vancouver, ISO, and other styles
22

Bauer, Carrie, and Matthew J. Gallagher. "Education for Humanity: higher education for refugees in resource-constrained environments through innovative technology." Journal of Refugee Studies 33, no. 2 (June 1, 2020): 416–36. http://dx.doi.org/10.1093/jrs/feaa040.

Full text
Abstract:
Abstract Half of refugee children attend primary school and 22 per cent attend secondary school, yet only 3 per cent have access to higher education. When higher education efforts do exist, they often ignore common barriers refugees face in accessing it: cost, connectivity, lack of a power source, and access to devices, among others. Arizona State University’s Education for Humanity team piloted a programme to address this lack of access and associated barriers. Using a solar-powered, offline technology that emits a Wi-Fi hotspot, the team implemented a university-level course in Nakivale Settlement, Uganda. This article presents the results and findings from this pilot programme.
APA, Harvard, Vancouver, ISO, and other styles
23

Trageser, Jeffrey, and Judy E. Davidson. "Improving Speed and Security When Sharing Protected Health Information of Deceased Organ Donors." Progress in Transplantation 29, no. 3 (June 11, 2019): 279–82. http://dx.doi.org/10.1177/1526924819855077.

Full text
Abstract:
Because extensive data from medical records are gathered by organ procurement teams, the process of data transfer between sites created a data security risk. This includes the use of fax machines, courier services, and employees’ vehicles. Even health records transmitted over public Wi-Fi become at risk for a data breach. The Plan-Do-Study-Act method for performance improvement was used to address this time-consuming and labor-intensive process. A secured virtual private network from within the donor hospital site setting was developed to improve the transfer of images and data. The goal was to improve the process and increase data security. Once the new network was in place, the process steps decreased and eliminated data vulnerability. Average process time decreased by approximately 1 hour. Organs procured increased from pre (expected 3, observed 2) to post (expected 3, observed 5) implementation of the new process.
APA, Harvard, Vancouver, ISO, and other styles
24

Dilaga, Dilla Fajar Sukma, Uke Kurniawan Usman, and Doan Perdana. "ANALISIS IMPLEMENTASI LISTEN BEFORE TALK (LBT) PADA LTE-LICENSED ASSISTED ACCESS (LAA) DAN WI-FI 5 GH." TEKTRIKA - Jurnal Penelitian dan Pengembangan Telekomunikasi, Kendali, Komputer, Elektrik, dan Elektronika 4, no. 2 (June 8, 2020): 62. http://dx.doi.org/10.25124/tektrika.v4i2.2880.

Full text
Abstract:
LTE Release 13 memungkinkan pengguna anspektrum frekuensi unlicensed yang disebut dengan Licensed-Assisted Access(LAA).PadaLTE-LAA,spektrumlicensed LTEdigunakansebagaiprimarycelluntukmembawainformasi serta mengangkut tra?k data. Untuk secondary cell, spektrum unlicensed 5 GHz digunakan, yang bertujuan untuk meningkatkan kapasitas, serta pembagian spektrum secara adil. Penelitian ini menganalisa penggunaan mekanisme Listen Before Talk (LBT)padaLTE-LAAsebagaimekanismeuntukmenghasilkankoeksistensiantara LTE-LAA dan Wi-Fi. Hasil simulasi skenario 1 menghasilkan indeks fairness throughput 64 pengguna untuk FTP over UDP pada skenario 1 sebesar 0.998, skenario 2 sebesar 0.857 dan skenario 3 sebesar 0.997. Sedangkan untuk FTP over TCP pada skenario 1 sebesar 0.779, skenario 2 sebesar 0.639 dan skenario 3 sebesar 0.741.
APA, Harvard, Vancouver, ISO, and other styles
25

Antunes, Alex. "Cheap Deployable Networked Sensors for Environmental Use." Journal of Telecommunications and the Digital Economy 2, no. 4 (May 26, 2020): 15. http://dx.doi.org/10.18080/jtde.v2n4.271.

Full text
Abstract:
We profile the utility and limits in deployment of inexpensive disposable sensor networks by amateurs to achieve environmental monitoring goals. Four current technology movements — PC-on-a-chip processors such as Arduino, prebuilt sensors, 3-D printing, and Wi-Fi and mesh networking — enable rapid sensor platform creation and make it easy for non-specialists to create general sensor-bearing platforms. Deployment of a cluster of multiple sensor-bearing platforms is, however, communications-limited in terms of both range and number of devices supported, and generally requires a base station with internet access. We examine how inexpensive technology supports scenarios for short-term environmental modelling by average citizens.
APA, Harvard, Vancouver, ISO, and other styles
26

Vitomsky, E. V., and D. N. Somov. "Methods for protecting local wireless network aimed at providing temporary silency of signals and information interaction structure." Issues of radio electronics, no. 3 (April 26, 2020): 35–40. http://dx.doi.org/10.21778/2218-5453-2020-3-35-40.

Full text
Abstract:
This work is devoted to the security problem of wireless local area networks. It is known that against a number of typical attacks, the most common IEEE802.11 networks are poorly protected. Existing ways of solving this problem with the help of regular wireless device software are not effective enough, and against some attacks, it is even not possible. One of the reasons, which complicates the solution of this problem, is low level of temporal and spatial security of modern wireless network. Based on the analysis of common attacks on Wi-Fi networks, original protection methods have been developed to consider this aspect. These methods were embodied in a real device. Protection methods are implemented by slightly modifying the standard software of the device having an open hardware platform. An experiment was carried out using this device, which confirmed the possibility of deploying a local wireless network which security was enhanced using the methods proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
27

Johnson, Tyler, Daniel Roggow, Phillip H. Jones, and Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys." Journal of Circuits, Systems and Computers 24, no. 07 (June 17, 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.

Full text
Abstract:
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode, as it is the quickest and easiest to configure. This vulnerability requires the attacker to capture the traffic from the four-way handshake between the AP and client, and then have enough compute time to reverse the passphrase. Increasing the rate at which passphrases can be reversed reduces the amount of time required to construct a repository of service set identifiers (SSIDs) and passphrases, which can increase the chances an attack is successful, or, alternatively, reduce the difficulty of auditing a wireless network for security purposes. This work focuses on creating an field programmable gate array (FPGA)-based architecture to accelerate the generation of a WPA/WPA2 pairwise master key (PMK) lookup table (LUT) for the recovery of the passphrase, with special emphasis on the secure hash algorithm-1 (SHA-1) implementation. PMK generation relies heavily on SHA-1 hashing and, as this work shows, an optimized SHA-1 implementation can achieve up to a 40 × speedup over an unoptimized implementation when generating PMKs.
APA, Harvard, Vancouver, ISO, and other styles
28

Sizov, V. A., D. M. Malinichev, and Kh K. Kuchmezov. "The study of promising secure information systems based on signal modeling." Open Education 23, no. 2 (May 14, 2019): 69–77. http://dx.doi.org/10.21686/1818-4243-2019-2-69-77.

Full text
Abstract:
The aim of the study is to increase the effectiveness of information security management through the use of 5G networks. The transition to the fifth-generation network does not solve the existing problems of information security and leads to the emergence of new threats. The main objective of each modulation method of signals is to ensure high bandwidth, proper transmission quality in a noisy communication channel, using the minimum amount of energy. One of the most effective indicators of increasing the level of information security in wireless networks is quadrature modulation, which is used in such networks as: LTE, WiMAX, McWill, DVB-T (T2), Wi-Fi and other radio access networks [1].One of the promising directions for the development of 5G networks is the use of higher frequency ranges, such as the range of millimeter waves (from 30 to 300 GHz) [2, 3]. A feature of the millimeter wave range is that they provide much wider spectral bands, making it possible to significantly increase the bandwidth in the channels. Thus, when studying prospective protected information systems based on the use of 5G network technology, it is advisable to use a simulation of the signals of the channel-level interaction of subscribers, which allows you to evaluate the basic security parameters at the physical level.Materials and research methods. Fifth generation networks will simultaneously look like any previous generation of mobile networks, and at the same time they will differ significantly from them – and there are a number of explanations that become more obvious if you think about how these changes affect the principles of user and equipment safety networks of the fifth generation.Widespread in the field of digital information transmission, including 5G networks, has received combinational modulation, called quadrature amplitude modulation.Multiposition signals have the greatest spectral efficiency, of which four-position phase modulation and sixteen-position quadrature amplitude modulation are most often used.The quadrature amplitude modulation is a kind of multi-position amplitude-phase modulation, in addition to the phase, the amplitude of the signal for a given type of modulation will also carry information. This leads to the fact that for a given frequency band the amount of transmitted information increases.A brief overview of the existing modulation approaches is presented OFDM (english. Orthogonal frequency-division multiplexing) [4, 5] systems and methods for forming solutions of signal modulation problems for building such systems/Results. Currently, OFDM technology is widely used in modern wireless Internet systems. High data transfer rates in OFDM systems are achieved using parallel information transfer over a large number of orthogonal frequency subchannels (subcarriers) [6].The method of synthesizing signal-code constructions with orthogonal frequency multiplexing provides for different scenarios for the use of semi-square modulation depending on the requirements for interception protection, as well as balancing between spectral and energy efficiency. This method can be used in two cases: with alternative and consistent transmission of signals. In the case of alternative transmission, only one of the four subcarriers is used during one channel interval. For efficient use of bandwidth, the proposed method involves the use of the spectrum of three other subcarriers for data transmission in D2D channels (this creates a connection between two user devices that are in close proximity), which allows you to further avoid interference between fixed channels and D2D communication channels.Findings. At present, 5G networks can be considered as one of the necessary components of the digital transformation and digital economy, while the main task in ensuring security in cellular communications is protection against eavesdropping. However, in the future world of smartphones and the Internet of things, in environments with a large number of mechanisms, the probability of listening is likely to fade into the background. Instead, you have to think about such things as data manipulation attacks, which, for example, can be used to command the mechanisms to perform certain actions (for example, open the door or take control of an unmanned vehicle). Mobile network operators, like consumer electronics manufacturers, will be able to offer “security as a service,” with the result that application providers will be able to apply additional levels of security over existing secure cellular network channels when transferring certain types of data. [7] Due to the better spectral density, the proposed signal conditioning method makes it possible to use prototypes of window functions with the best spatial localization properties without violating the orthogonality condition of the signal bases, and accordingly does not require the use of cyclic prefixes when generating the OFDM signal.
APA, Harvard, Vancouver, ISO, and other styles
29

Amewuda, Andy Bubune, Ferdinand Apietu Katsriku, and Jamal-Deen Abdulai. "Implementation and Evaluation of WLAN 802.11ac for Residential Networks in NS-3." Journal of Computer Networks and Communications 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/3518352.

Full text
Abstract:
Wi-Fi has been an amazingly successful technology. Its success may be attributed to the fact that, despite the significant advances made in technology over the last decade, it has remained backward compatible. 802.11ac is the latest version of the wireless LAN (WLAN) standard that is currently being adopted, and it promises to deliver very high throughput (VHT), operating at the 5 GHz band. In this paper, we report on an implementation of 802.11ac wireless LAN for residential scenario based on the 802.11ax task group scenario document. We evaluate the 802.11ac protocol performance under different operating conditions. Key features such as modulation coding set (MCS), frame aggregation, and multiple-input multiple-output (MIMO) were investigated. We also evaluate the average throughput, delay, jitter, optimum range for goodput, and effect of station (STA) density per access point (AP) in a network. ns-3, an open source network simulator with features supporting 802.11ac, was used to perform the simulation. Results obtained indicate that very high data rates are achievable. The highest data rate, the best mean delay, and mean jitter are possible under combined features of 802.11ac (MIMO and A-MPDU).
APA, Harvard, Vancouver, ISO, and other styles
30

Mohamad Mohsin, Mohamad Farhan, Mohd Noor Abdul Hamid, Nurakmal Ahmad Mustaffa, Razamin Ramli, and Kamarudin Abdullah. "Investigation on the Access Log Pattern of the Corporate Social Responsibility UUMWiFi among Changlun’s Community." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (April 10, 2019): 140. http://dx.doi.org/10.3991/ijim.v13i04.10526.

Full text
Abstract:
<span>CSR UUMWiFi is a CSR project under Universiti Utara Malaysia (UUM) that provides unlimited free internet connection for the Changlun community. Launched in 2015, the service has accumulated a huge number of users with diverse background and interest. This paper aims to uncover interesting service users’ behavior by mining the usage data. To achieve that, the access log for 3 months with 24,000 online users were downloaded from the Wi-Fi network server, pre-process and analyzed. The finding reveals that there were many loyal users who have been using this service on a daily basis since 2015 and the community spent 20-60 minutes per session. Besides that, the social media and leisure based application such YouTube, Facebook, Instagram, chatting applications, and miscellaneous web applications were among the top applications accessed by the Changlun community which contributes to huge data usage. It is also found that there were few users have used the CSR UUM WiFi for academic or business purposes. The identified patterns benefits the management team in providing a better quality service for community in future and setting up new policies for the service.</span>
APA, Harvard, Vancouver, ISO, and other styles
31

Han, Jiyong, and Junghee Han. "Building a disaster rescue platform with utilizing device-to-device communication between smart devices." International Journal of Distributed Sensor Networks 14, no. 3 (March 2018): 155014771876428. http://dx.doi.org/10.1177/1550147718764284.

Full text
Abstract:
Recently, the world is facing more risk of natural disasters as a result of ongoing climate changes. One of the most critical obstacles in disaster mitigation (especially rescue operation) is lack of communication and localization of survivors in disaster sites. This article develops a disaster rescue platform for quick and accurate rescue operation with utilizing direct communication on smart hand-held devices such as Bluetooth and Wi-Fi. Specifically, we attempt to design an application-layer ad hoc network over smart devices without relying on centralized cellular networks or wireless access points. This study also incorporates a mobile localization algorithm to effectively perform disaster rescue objectives. Specifically, it aims (1) to accurately locate survivors, (2) to help rescuers to find victims quickly, and (3) to minimize calculation overheads for power saving on smart devices. This article verifies the proposed approach with presenting simulation and implementation results compared to other studies.
APA, Harvard, Vancouver, ISO, and other styles
32

Kalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.

Full text
Abstract:
Jaringan komunikasi semakin bergantung pada WLAN, maka semakin tinggi tuntutan Quality of Service (QoS) WLAN seperti Throughput, delay, dan jitter Untuk menjaga keamanan media komunikasi data, maka digunakan mekanisme keamanan jaringan Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), dan WPA2 [14]. Mall Bali Galeria memiliki beberapa alternatif Free WiFi. Banyaknya Wi-Fi yang terpasang menimbulkan permasalahan interferensi yang mempengaruhi unjuk kerja jaringan WiFi, MBG sendiri memiliki area Indoor dan Outdoor, Alternatif untuk mengatasi interferensi adalah dengan melakukan automasi penkanalan dengan menerapkan Channel Fly, Background Scanning dan Static Channel. Dari mekanisme keamanan, Penkanalan dan frekuensi dibuat skenario dilakukan penelitian pada setiap askes point untuk mendapatkan skenario terbaik, dari skenario yang diajukan, nilai Paket loss terbaik lingkungan indoor AP 4 dengan skenario frekuensi 5Ghz, Statik Channel, WEP-64 paket loss 0,016 ms, lingkungan outdoor AP 5 Frekuensi 5Ghz, Channel Fly, WEP-64 paket loss 0.094 ms, nilai Jitter terbaik lingkungan indoor AP 2 5Ghz Background Scanning, WPA 2, Jitter 1.336 ms, lingkungan outdoor AP 8 5Ghz, Statik Channel, WPA2-Mixed Jitter 1,116 ms, nilai Throughput terbaik lingkungan indoor AP 1 5Ghz, Statik channel, WPA2-Mixed, Throughput 78,7Mbps, untuk Outdoor AP 8 5Ghz, Background Scanning, Disable Security, Throughput 80Mbps jika dibandingkan dengan skenario eksisting performa unjuk kerja meningkat sebesar 10-30%. WEP memiliki nilai packet loss baik tetapi memiliki nilai Throughput yang lebih kecil. Static channel disarankan pada lokasi yang memiliki interferensi tinggi.
APA, Harvard, Vancouver, ISO, and other styles
33

Noreen, Sidra, and Muhammad Abid Malik. "Digital Technologies for Learning at Allama Iqbal Open University (AIOU): Investigating Needs and Challenges." Open Praxis 12, no. 1 (March 31, 2020): 39. http://dx.doi.org/10.5944/openpraxis.12.1.1016.

Full text
Abstract:
The present study investigated the need of digital technologies for the distance learners of AIOU (Allama Iqbal Open University), and the challenges in its implementation. Within mixed-method approach, an explanatory sequential design was employed to conduct this study. Quantitative data was collected through questionnaires from 963 students to find out the needs for digital technologies. Later 3 administrators and 1 library in-charge were interviewed to find out the challenges in its implementation. Quantitative data was analyzed using descriptive statistics. For qualitative data analysis, inductive analysis was done. Most of the students said that digital technologies were needed for increasing accessibility and flexibility of learning. The challenges for its implementation were in the requirement of diverse online learning resources, access, cost and lack of expertise. The paper recommended that there should be provision of portable devices to students with Wi-Fi, and guidance about its use. Annual need-assessment system was also suggested.
APA, Harvard, Vancouver, ISO, and other styles
34

Roberts, N., B. Bradley, and D. Williams. "Use of SMS and tablet computer improves the electronic collection of elective orthopaedic patient reported outcome measures." Annals of The Royal College of Surgeons of England 96, no. 5 (July 2014): 348–51. http://dx.doi.org/10.1308/003588414x13946184900769.

Full text
Abstract:
Introduction Electronic patient reported outcome measures (PROMs) enable real time reporting back to the patient and medical team, comparison between similar patient cohorts and long-term cost effective outcome measurement. The primary objective of this three-phase pilot study was to measure uptake using a web-based PROM system following the introduction of two separate process improvements. Methods Eighty consecutive new elective orthopaedic patients in a single surgeon’s practice were recruited for the study. Patients in Group 1 (n=26) received only a letter reminding them to complete a symptom score. Those in Group 2 (n=31) also received a reminder SMS (short message service) message via their mobile or home telephone and those in Group 3 (n=23) also had access to a tablet computer in clinic. Results The mean patient age in Group 1 was 55 years (range: 24–80 years), in Group 2 it was 60 years (range: 23–85 years) and in Group 3 it was 58 years (range: 37–78 years) (p>0.05). Overall, 79% of patients had internet access, and 35% of Group 1, 55% of Group 2 and 74% of Group 3 recorded an electronic PROM score (p=0.02). In Group 3, 94% of patients listed for an operation completed an electronic PROM score (p=0.006). Conclusions Collecting PROM data effectively in everyday clinical practice is challenging. Electronic collection should meet that challenge and improve healthcare delivery but it is in its infancy. This pilot study shows that the combination of an SMS reminder and access to a Wi-Fi enabled tablet computer in the clinic setting enabled 94% of patients listed for an operation to complete a score on a web-based clinical outcomes system. Additional staff training and telephone call reminders may further improve uptake.
APA, Harvard, Vancouver, ISO, and other styles
35

Ghazali, Syafii, Roni Putra, and Hasdi Putra. "Online Monitoring of Grid Connected Residential Photovoltaic System using Zigbee and Web Server." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 668. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp668-675.

Full text
Abstract:
<p><em>T</em>he paper presents grid-tied PV monitoring system using wireless sensor networks. The temperature and humidity parameters were measured using DHT22. While ACS 712 5A current sensor and Arduino voltage sensor modules were used to measure photovoltaic output current and voltage respectively. Web application has been developed in the base station using PHP programming web server to access the sensor nodes through Zigbee wireless data communication. The user can access the HTML web interface of Photovoltaic monitoring system through local Ethernet or Wi-Fi connection. The residential 1.25 kWp grid connected photovoltaic system used to test the developed monitoring system. The data received exactly same as data sensed from remote area with average delay time 3 to 4 seconds. The result shows the photovoltaic power generation caracteristics under clear sky, cloud cover, and rainy weather conditions. The power 608.12 Wp has been generated by the solar panel from 7.00 am to 6.00 pm or 6.7 kWh per day during clear sky. During intermittent cloud covered the photovoltaic power graph have shown fluctuation power profile and energy conversion were decreased as well as in raining weather condition. The electrical power has been generated by photovoltaic for almost 12 hours per day in tropics area, but energy conversion is highly influenced by weather conditions, especially cloud cover, overcast and rainy.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Oyelude, Adetoun A. "What’s trending in libraries from the internet cybersphere – alternate technology use – 03 – 2016." Library Hi Tech News 33, no. 10 (November 7, 2016): 15–16. http://dx.doi.org/10.1108/lhtn-11-2016-0056.

Full text
Abstract:
Purpose This last edition of the column begins with the disadvantages of sleeping in the library and ends with 60-year-old overdue loans, but in between are alternate ways of using different technology to access information! Design/methodology/approach Sleeping in the library is trending on the internet, not because it is a nice pastime, but because it is one of the most viral trends of the year. Findings The real advice is that falling asleep in public places such as libraries is not good. A lot of wild reactions to the picture of a girl sleeping in a university library has caused all sorts, as “photo-shoppers”have had a field day, putting the sleeper in all sorts of situations – in Drake’s “Hotline Bling” music video, dancing with Michael Jackson and more. Social implications Derrick Lewis on 26th August reported that an Orange County library had made wi-fi devices available for rural internet users. Originality/value It is helping rural families make faster connections, and it is free to try the device which can be borrowed for 3 weeks and renewed twice if no one else has booked to use it.
APA, Harvard, Vancouver, ISO, and other styles
37

Rao, Velamala Ranga. "Citizen Relationship and Grievance Management System (CiR&GMS) through Multi-Channel Access for e-Government Services." International Journal of E-Services and Mobile Applications 7, no. 2 (April 2015): 43–67. http://dx.doi.org/10.4018/ijesma.2015040103.

Full text
Abstract:
Citizens are demanding greater access to interaction with government through their preferred channels or devices. The private sector uses different channels for their services, citizens except same level of services from the public sector. Therefore public sector needs to focus on creating multiple delivery channels (Traditional such as face to face, Telephone and Modern channels such as Website, E-mail, SMS), so that citizens can have ‘channels of choice', depending on specific needs, demands and preferences in order to increase citizens' participation and satisfaction. For this reason, the paper's purpose is 1) To understand multi-channel architecture, Integration, Management and its Strengths & Weakness 2) To develop a frame work for Citizen Relationship and Grievance Management System (CiR&GMS) for a single view 3) By applying proposed framework, To identify what types of channels are providing to access public services at National, State and Local level governments in India as a case study 4) To find out challenges and issues in implementation of multi-channel service delivery. The key findings of the case study are: a) There is no declining in providing traditional channels after introducing modern channels b) Many departments are offering mixed channels c) Usage of Mobile/SMS, Social media and Wi-Fi hotspots based channels are in initial stage d) t-Government channel is not yet initiated in any department e) Multi-channel integration and management is not yet initiated by many departments, these departments are managed channels as separate silos. The proposed framework may provide some guidance to the decision and policy makers in the public sector. However, such initiatives have many challenges to the developing countries like India.
APA, Harvard, Vancouver, ISO, and other styles
38

Brody, Paul, and Veena Pureswaran. "The next digital gold rush: how the internet of things will create liquid, transparent markets." Strategy & Leadership 43, no. 1 (January 19, 2015): 36–41. http://dx.doi.org/10.1108/sl-11-2014-0094.

Full text
Abstract:
Purpose – The article analyses the market changes that are likely to be produced by and Internet of Things comprised of hundreds of billions of connected devices. Design/methodology/approach – Based on an IBM study, the authors foresee an Internet of Things emerging as a low-cost, private-by-design “democracy of devices” that will enable new digital economies and create new value, while offering consumers and enterprises fundamentally better products and user experiences. Findings – The IoT creates the ability to digitize, sell and deliver physical assets as easily as with virtual goods today. Using everything from Bluetooth beacons to Wi-Fi-connected door locks to allow customer access, many physical assets will become digital services. Practical implications – In a device-driven democracy, conference rooms, hotel rooms, cars and warehouse bays can themselves report capacity, utilization and availability in real-time. By taking raw capacity and making it easy to be utilized commercially, the IoT can remove barriers to fractionalization of industries that would otherwise be impossible. Originality/value – The article paints a compelling picture of a future in which the Internet of Things initiates five vectors of disruption by: Unlocking excess capacity of physical assets. 2. Creating liquid, transparent marketplaces. 3. Radical re-pricing of credit and risk. 4. Improving operational efficiency. 5. Digitally integrating value chains.
APA, Harvard, Vancouver, ISO, and other styles
39

Gozali, Ferrianto, and Billion Lo. "Sistem Pengalokasian Dinamik VLAN Dalam Mendukung Proses Belajar Terdistribusi." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 1, no. 1 (March 8, 2012): 69. http://dx.doi.org/10.23887/janapati.v1i1.9781.

Full text
Abstract:
Seiring perkembangan pendidikan, penggunaan ICT sangatlah besar dalam proses perkembangan tersebut. Dengan penggunaan ICT ini, memungkinkan distance learning diimplementasi dimana proses belajar mengajar tidak harus lagi berada dikelas seperti pada pendidikan yang konvensional. Dengan adanya distance learning dapat memecahkan masalah spasial baik dari ukuran ruangan terhadap jumlah murid dan keterbatasan untuk dapat hadir kedalam ruang perkuliahan. Karena itulah, Sistem Pengalokasian Virtual Local Area Network (VLAN) secara Dinamis dibutuhkan. Sistem ini merupakan sistem yang berbasis protokol Radius yang dapat membantu untuk mengotentikasi dan memindahkan client antar sub jaringan (VLAN) didalam jaringan internal suatu perkuliahan.Perancangan sistem digunakan aplikasi berbasis open source. Pada perancangan sistem Dinamik VLAN ini, penulis menggunakan sistem otentikasi berdasarkan MAC-Address dari client yang akan dimapping kedalam VLAN yang akan dituju. MAC-Address dan VLAN yang akan dituju disimpan didalam database. Untuk skema jaringannya, server dan client akan terhubung menggunakan manageable switch.Mekanisme kerja dari sistem pengalokasian VLAN secara dinamis ini terdiri dari 3 (tiga) tahap yaitu: tahap penerimaan request dari Network Access Server (NAS), pengecekan MAC-Address terhadap VLAN yang dituju dan persetujuan otentikasi dan otorisasi. Untuk mendukung proses pembelajaran jarak jauh, digunakan Web Conference dan aplikasi seperti file sharing pada jaringan VLAN tersebut. Untuk pengujian sistem tersebut, kita menggunakan applikasi Web Conference dengan cara membandingkan performa jaringan pada saat dengan dan tanpa sistem tersebut.Dalam mengimplementasikan sistem ini, terbilang murah karena suatu perusahaan hanya membutuhkan sebuah server dengan Sistem Operasi yang gratis dan aplikasi yang gratis dan dapat diimplementasikan langsung ke dalam jaringan perusahaan tanpa perubahan topologi jaringan yang menyeluruh.Namun dalam sistem ini masih terdapat kekurangan, dimana sistem ini hanya dapat diaplikasikan dengan menggunakan Manageable Switch dan belum dapat digunakan untuk Wi-fi dan Unmanageable Switch.
APA, Harvard, Vancouver, ISO, and other styles
40

Suzuki, Koshiro. "<i>Caveat Emptor</i>: A new form of participatory mapping and its ethical implications for Participatory GIS." Proceedings of the ICA 2 (July 10, 2019): 1–8. http://dx.doi.org/10.5194/ica-proc-2-126-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> Since the 1990s, the consolidation of technological platforms for geographic information has expanded the possibilities of geospatial analysis in conjunction with GIS. Even ordinary people have become capable of interactive web communication with electronic maps thanks to the emergence of smartphones compatible with GeoAPI (application programming interface) and Wi-Fi access. Many studies have described the progress that built a solid foundation of web democracy by embodying people-powered mapping circumstances in the so-called Web 2.0. However, we have yet to acquire geographic information ethics that sufficiently respond to new threats stemming from these circumstances. In the present paper, the author instantiated a user-generated online mapping website named Caveat Emptor (a.k.a. Oshimaland) to investigate the necessity of a geographic information ethics 2.0. By incorporating Suler’s (2004) concept of online disinhibition effects, the author clarified that people can utilise new technologies both in good ways and bad, from behind the safety of a mask. Despite the omnoptic mutual surveillance environment, the associated participants in actual scenes of cyberspace are not always restrained. This explains why it is necessary to update geographic information ethics to be compatible with Web 2.0 circumstances. Four types of ethical challenges were identified that are concerned with (1) the extent to which volunteered geographic information (VGI) should be recruited in constructing collective knowledge, (2) how to build a renewed geographic information ethics in general, (3) how to construct a gradation in geographic information ethics in practice, and (4) what scientific knowledge should be referred to in the contiguous areas of specialisation.</p>
APA, Harvard, Vancouver, ISO, and other styles
41

Reach, Gérard, Sophie Bentégeat, Isabelle Mounier-Emeury, Brigitte Le Cossec, Sadiyé Yesilmen, Vincent Hirsch, Yohann de Oliveira Granja, and Audrey Minetti. "Pedagogical value of a hospitality awards programme." BMJ Open Quality 8, no. 3 (September 2019): e000576. http://dx.doi.org/10.1136/bmjoq-2018-000576.

Full text
Abstract:
ObjectiveAssistance Publique-Hôpitaux de Paris (AP-HP), the leading university hospital in France, proposed to offer its services to candidate on a voluntary basis for a hospitality award, certifying compliance to a 240-item home-made questionnaire designed by healthcare providers and patients’ representatives. It combined an objective examination of the services and patients’ questionnaires, covering seven domains: reception and information from admission to discharge; cleanliness, comfort and environment; proposed services (eg, access to Wi-Fi); culture, relaxation and well-being; meals; linen and relationship quality with hospital staff. The procedure was completed in two steps: an initial self-evaluation to detect improvable deficiencies, followed by an awarding visit. A service received the hospitality award if at least 80% of the reference criteria were met during this second evaluation. Here, we describe the construction of this hospitality awards programme and present a comparison of the scores obtained during the two steps.Design and methodsRetrospective comparison by usual statistical tests.SettingAP-HP, grouping 39 university hospitals (21 000 beds, 8 million annual patient visits).ParticipantsThe 211 services from 29 different hospitals engaged in the procedure (2017–2019).ResultsOnly one service did not get the award (self-evaluation 83%, visit score 79%). The score was higher during the awarding visit (89.0%±5.6%) than during self-evaluation (85.5%±4.3%, n=211, p<0.00001), with increased scores for the following domains (p<0.005): patient reception and information; cleanliness, comfort and environment; proposed services; culture, relaxation and well-being.Conclusion(1) Internal self-evaluation is feasible. (2) By diffusing criteria of hospitality, the procedure had a pedagogical value leading to rapid and significant improvements. (3) This quality assessment procedure results in an award that can be posted in the departments. By appealing to pride, this procedure should promote hospitality in hospitals.
APA, Harvard, Vancouver, ISO, and other styles
42

Nieto, Claudia, Isabel Valero, Norma Buenrostro, Karen Álvarez, Abad García, Bárbara Mendoza, Laura Ordaz, Lizbeth Tolentino-Mayo, and Simón Barquera. "Children and Adolescents’ Exposure to Digital Food and Beverage Marketing in Mexico During COVID-19 Times." Current Developments in Nutrition 5, Supplement_2 (June 2021): 562. http://dx.doi.org/10.1093/cdn/nzab043_014.

Full text
Abstract:
Abstract Objectives Characterize children's and adolescent's exposure of Digital Marketing (DM) and identify DM strategies of advertised food and beverages Methods This was a cross-sectional study. We used a crowdsourcing strategy to recruit children and adolescents around Mexico. Those with home access to Wi-Fi, with mobile capacity to record their habitual internet usage, and with abilities to upload their videos of exposure in a cloud were included. Once the videos were received, we performed a content analysis using the protocol for Monitoring of Marketing of Unhealthy Products to Children and Adolescents of the World Health Organization (Europe Office). The protocol and template were adapted to the Mexican context and then piloted in a sample of 20 children. We included an item to explore if COVID was used as a marketing strategy. Data was captured in an excel spreadsheet and then transferred to Stata 14. Results We received 45 minutes of internet exposure recordings from 348 children and adolescents. Overall, 45% of children and adolescents were exposed to food and beverage DM. Most of the DM was made of unhealthy food categories: fast food 17%, sweet snacks 10%, cakes and pastries 7%, among others. From the food and beverage advertising (f&b ads) 38% had at least one element to attract children, and 43% attracted adolescents. Brand characters were displayed on 10% of the ads; while licensed characters were displayed on 3.6%. We found that COVID19 was mentioned or illustrated in 3% of the f&b ads and that 67% f&b ads included an incentive to purchase or consume; such as: a person eating the product, or a f&b product served on a plate ready to eat. Conclusions A restriction of unhealthy food and beverage digital marketing aimed at children and adolescents should be considered in the current Mexican advertising regulation. Funding Sources This project was funded by UNICEF México and Bloomberg Philanthropies. The presenting author was funded by CONACYT México and was awarded with the Healthy Food Policy Fellowship.
APA, Harvard, Vancouver, ISO, and other styles
43

Bailey, Julia V., Rosie Webster, Rachael Hunter, Mark Griffin, Nicholas Freemantle, Greta Rait, Claudia Estcourt, et al. "The Men’s Safer Sex project: intervention development and feasibility randomised controlled trial of an interactive digital intervention to increase condom use in men." Health Technology Assessment 20, no. 91 (December 2016): 1–124. http://dx.doi.org/10.3310/hta20910.

Full text
Abstract:
BackgroundThis report details the development of the Men’s Safer Sex website and the results of a feasibility randomised controlled trial (RCT), health economic assessment and qualitative evaluation.Objectives(1) Develop the Men’s Safer Sex website to address barriers to condom use; (2) determine the best design for an online RCT; (3) inform the methods for collecting and analysing health economic data; (4) assess the Sexual Quality of Life (SQoL) questionnaire and European Quality of Life-5 Dimensions, three-level version (EQ-5D-3L) to calculate quality-adjusted life-years (QALYs); and (5) explore clinic staff and men’s views of online research methodology.Methods(1) Website development: we combined evidence from research literature and the views of experts (n = 18) and male clinic users (n = 43); (2) feasibility RCT: 159 heterosexually active men were recruited from three sexual health clinics and were randomised by computer to the Men’s Safer Sex website plus usual care (n = 84) or usual clinic care only (n = 75). Men were invited to complete online questionnaires at 3, 6, 9 and 12 months, and sexually transmitted infection (STI) diagnoses were recorded from clinic notes at 12 months; (3) health economic evaluation: we investigated the impact of using different questionnaires to calculate utilities and QALYs (the EQ-5D-3L and SQoL questionnaire), and compared different methods to collect resource use; and (4) qualitative evaluation: thematic analysis of interviews with 11 male trial participants and nine clinic staff, as well as free-text comments from online outcome questionnaires.Results(1) Software errors and clinic Wi-Fi access presented significant challenges. Response rates for online questionnaires were poor but improved with larger vouchers (from 36% with £10 to 50% with £30). Clinical records were located for 94% of participants for STI diagnoses. There were no group differences in condomless sex with female partners [incidence rate ratio (IRR) 1.01, 95% confidence interval (CI) 0.52 to 1.96]. New STI diagnoses were recorded for 8.8% (7/80) of the intervention group and 13.0% (9/69) of the control group (IRR 0.75, 95% CI 0.29 to 1.89). (2) Health-care resource data were more complete using patient files than questionnaires. The probability that the intervention is cost-effective is sensitive to the source of data used and whether or not data on intended pregnancies are included. (3) The pilot RCT fitted well around clinical activities but 37% of the intervention group did not see the Men’s Safer Sex website and technical problems were frustrating. Men’s views of the Men’s Safer Sex website and research procedures were largely positive.ConclusionsIt would be feasible to conduct a large-scale RCT using clinic STI diagnoses as a primary outcome; however, technical errors and a poor response rate limited the collection of online self-reported outcomes. The next steps are (1) to optimise software for online trials, (2) to find the best ways to integrate digital health promotion with clinical services, (3) to develop more precise methods for collecting resource use data and (4) to work out how to overcome barriers to digital intervention testing and implementation in the NHS.Trial registrationCurrent Controlled Trials ISRCTN18649610.FundingThis project was funded by the NIHR Health Technology Assessment programme and will be published in full inHealth Technology Assessment; Vol. 20, No. 91. See the NIHR Journals Library website for further project information.
APA, Harvard, Vancouver, ISO, and other styles
44

Landau, Heather J., Gunjan L. Shah, Morgan Reeds, Patrick Hilden, Marci Andrejko, Alison Applebaum, Jason Batalha, et al. "Homebound Autologous Hematopoietic Cell Transplantation for Plasma Cell Disorders in an Urban Setting Is Safe for Patients and Preferred By Patients and Caregivers." Blood 132, Supplement 1 (November 29, 2018): 2258. http://dx.doi.org/10.1182/blood-2018-99-120049.

Full text
Abstract:
Abstract Background: Autologous hematopoietic stem cell transplantation (AHCT) is a mainstay of therapy for eligible patients with multiple myeloma (MM) and light chain (AL) amyloidosis and confers a progression free and overall survival benefit in most studies. Yet, AHCT requires specialized care at a transplant center and investment from patients and caregivers. To decrease the burden of therapy and increase access to AHCT, we studied the safety and feasibility of delivering transplant care in a homebound setting. Methods: Eligible MM and AL patients undergoing AHCT resided in designated zip codes, had 24hr caregiver support, adequate Wi-Fi connection, Sorror Co-morbidity index ≤ 3 and Karnofsky performance status ≥ 80. Following high-dose melphalan (day -2) and stem cell reinfusion (day 0) in the outpatient clinic, protocol-specific homecare commenced (day +1) until engraftment. Care included daily assessments by advanced practice providers and interventions were delivered by registered nurses in the afternoons. Attending physicians communicated through telemedicine daily. Due to regulation, blood products required infusion in the outpatient clinic. Patient and caregiver quality-of-life (QOL) and satisfaction were assessed using patient/caregiver reported outcome instruments (Functional Assessment of Cancer Therapy (FACT)-General and FACT-Bone Marrow Transplant (FACT-BMT) questionnaires, MD Anderson Symptom Inventory (MDASI), Caregiver QOL Index--Cancer (CQOL-C) and satisfaction surveys). Video diaries and one-on-one interviews provided detailed qualitative evaluations. The primary objective was feasibility defined by readmission within 21 days of AHCT. Descriptive statistics were used to describe the population, toxicities and QOL measures. Results: Between 2/2016 - 5/2018, 15 patients (60% MM; 40% AL) and caregivers met inclusion criteria. Patient median age was 62 years (range 40-71) with 80% male. AHCT was part of 1st line therapy in most patients (N=13); 2 with MM underwent 1st AHCT as part of salvage. Melphalan dose was 200mg/m2 (N=11) or less (N=4) in patients ≥70 or AL. All patients received pegfilgrastim 6mg on day +1; thereafter, intravenous fluids and electrolytes were the most common interventions administered at home. During homecare, a median of 2 (range 1-3) visits to clinic were required for platelet transfusions and only 1 patient required 1 red cell transfusion. Median time to neutrophil and platelet engraftment was 9 (range 8-10) and 18 (range 11-22) days, respectively. Overall 7/15 (47%) (95% CI; 0.21-0.73) of patients were admitted for a median of 4 (range 3-10) days. Admission occurred on day +7 (N=5), day +8 (N=1) and day +12(N=1). Reasons for admission included neutropenic fever (NF) (N=2), fever attributed to engraftment syndrome (N=2), diarrhea (N=2), and dehydration (N=1). Only 1 (7%) patient had a documented infection (C. difficile) and 1 admitted for NF required ICU care (2 days) for GI bleed. Overall, 47% of patients experienced grade ≥ 3 non-hematologic toxicities. There were no deaths on study. Results of thematic content analysis of transcripts for patient-caregiver dyads demonstrate that while feeling challenged, caregivers derived satisfaction from assisting with the patient's recovery through maintaining hygiene of the home environment, managing dietary needs and responding to symptoms. Caregivers reported that living with the patient during AHCT strengthened their relationship by being able to provide for one another in unanticipated ways. Patients reported positive support from the medical team, connection to the world and the ability to engage in relaxing activities and physical exercise as important during AHCT. Caregivers and patients unanimously described the homebound program as preferable to a hypothesized experience in the hospital and satisfaction surveys indicated favorable responses (Figure). Symptom burden and QOL data are being analyzed. Conclusion: Homebound AHCT is safe and feasible with less than half of patients requiring inpatient admission. Patients required an average of two outpatient visits while receiving homebound care for blood products. Qualitative evaluations of the program by patients and caregivers were overwhelmingly positive. Based on these results we intend to expand the homebound program and investigate other potential biologic (microbiota diversity preservation) and economic benefits. Disclosures No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
45

Krueger, Stephanie. "LIS Students at a Japanese University Use Smartphones for Social Communication more often than for Educational Purposes." Evidence Based Library and Information Practice 13, no. 3 (September 13, 2018): 97–99. http://dx.doi.org/10.18438/eblip29412.

Full text
Abstract:
A Review of: Lau, K. P., Chiu, D. K. W., Ho, K. K. W., Lo, P., & See-To, E. W. K. (2017). Educational usage of mobile devices: Differences between postgraduate and undergraduate students. The Journal of Academic Librarianship, 43(3), 201-208. https://doi.org/10.1016/j.acalib.2017.03.004 Abstract Objective – To discover how undergraduate (UG) and graduate (G; “postgraduate” [PG] in the original article) students of library and information science (LIS) use mobile devices and to understand preferences and perceived barriers to educational use. Design – Survey questionnaire. Setting – University in Japan. Subjects – Ninety undergraduate students (30 male, 60 female) and 30 graduate students (13 male, 17 female). Nineteen additional recruits were excluded from the study due to incomplete surveys. Almost all subjects (>98%) were born between 1982 and 2002. Methods – Subjects were recruited without incentives from one LIS department. An online survey was conducted with the purpose of gathering information on how often devices were used for various activities, perceived barriers to mobile learning (m-learning), and demographic data. The survey was modeled on a 2015 study of LIS students in Hong Kong, Japan, and Taiwan (Ko, Chiu, Lo, & Ho, 2015). The Mann-Whitley U test was used to investigate possible significant differences between UG and G responses. Main Results – 94.2% of participants had smartphones with Internet access; both UG and G subjects reported weekly to daily use for social communications (email, short message service [SMS], chat, and social media) and for querying search engines. Both UG and G subjects reported using finance and banking services less than once a month. Other activities (shopping, finding locations, entertainment, sports, tools and productivity software, casual reading, academic reading, accessing reference materials, accessing libraries) for both groups fell within the range of less than once per month to weekly use. Unlike G subjects, UG subjects reported significant (p < 0.05) engagement with social media and marginal (p < 0.10) engagement with accessing libraries, and productivity tools. In terms of educational use, neither UG nor G subjects reported daily m-learning behaviors, instead reporting monthly to weekly browsing of online information and social networking sites, with far less (i.e., less than once a month) engagement with professional articles, e-books, learning management platforms, and several other activities (listening to podcasts, viewing videos, “other”). UG subjects reported significant marginal (p < 0.10) engagement with “other” materials, unlike G subjects. Library catalogs and databases were less likely to be used when compared to reference sources, with UG and G subjects reporting monthly or less use for these. When asked if they would use mobile library services, respondents answered “maybe interested if available”, with UG subject reporting significant marginal (p < 0.10) engagement vs. G subjects for several of these services. Regarding productivity activities, both UG and G subjects reported monthly or less use of note taking, word processing, and scheduling tools. For communication and sharing activities, subjects reported monthly or less activity for communicating with classmates, using email for study-related issues, posting to discussions on learning management platforms, posting or commenting about their studies on social networking sites, sending photos or videos to social media, moving document files, and scanning Quick Response (QR) codes. UG subjects were marginally (p < 0.10) more engaged in communicating with classmates than G subjects. Barriers to m-learning were not considered “high” barriers, with “low” to “medium” barriers for both UG and G subjects being small screen size, non-mobile format, difficulty typing, challenges with authentication, no Wi-Fi, difficulty reading, lack of specialized apps, and slow loading times. Conclusion – This study provides a snapshot of how participants used mobile devices at the time the survey was conducted. Both UG and G subjects used their devices for social communication more than for educational purposes.
APA, Harvard, Vancouver, ISO, and other styles
46

Kwon, Songhui, and Hyoung-Kee Choi. "Evolution of Wi-Fi Protected Access: Security Challenges." IEEE Consumer Electronics Magazine, 2020, 1. http://dx.doi.org/10.1109/mce.2020.3010778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Reva, Ivan Leonidovich, Alexey Aleksandrovich Bogdanov, and Ekaterina Andreevna Malakhova. "TO THE PROBLEM OF APPLYING WI-FI ACCESS POINTS FOR REGISTERING MOTION AT THE SITE IN THE ABSENCE OF A WI-FI MODULE." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, January 25, 2019, 73–78. http://dx.doi.org/10.24143/2072-9502-2019-1-73-78.

Full text
Abstract:
The article describes the problem of registration of human movement on the object and protection of the object against unauthorized access. Global Positioning System which is well proven in open field has low precision within the premises. Due to the rapid development of Wi-Fi technology and the need to organize monitoring of human motion in the protected premises, there is being developed a new approach to registering a person on site using Wi-Fi. The problem of registering unauthorized access to the object by means of Wi-Fi radio network has been considered, its strengths and weaknesses have been studied. Most organizations actively use corporative and public Wi-Fi networks and beneficially apply this well-developed infrastructure for detecting the human presence in the premises and determining their position. It has been stated that using Wi-Fi network is more profitable than installing a special access control system. The aim of the research is to develop a human motion registering system at the site protected without using a Wi-Fi-module. There have been presented experiment results of registering human motion by means of the well-developed Wi-Fi infrastructure, the experiments being conducted to analyze changes of a signal level at different positions of a single person or a number of persons in the premises. It has been inferred that the level of Wi-Fi signal changes when a person or a group of persons are present in the room, even if they don’t have a Wi-Fi-module; this fact helps register the human motion in the protected premises.
APA, Harvard, Vancouver, ISO, and other styles
48

Muis Rajab, Arini, MT,. "Pengujian Celah Keamanan 5 Jenis Metode Wireless LAN Security." JURNAL TEKNIK INFORMATIKA 4, no. 1 (October 6, 2015). http://dx.doi.org/10.15408/jti.v4i1.2011.

Full text
Abstract:
Abstract— Wireless network offer many facilities and flexibility but to support them require high serious of security. Many types of Wireless LAN security mechanisms had implemented today such WEP (Wired Equivalent Privacy), WPA/WPA2 (Wi-Fi Protected Access), MAC Filtering, and Hidden SSID, or even used WPA2 combine with RADIUS. In this topic, we will look more depth the some weakness of the Wireless LAN (WLAN) security as the way to find the solution to obtain the security policy of our WLAN. By using some testing procedure and provided of the Open source tool, we found some weakness of security problem in WLAN. Keywords : Wireless LAN, WEP (Wired Equivalent Privacy), WPA/WPA2 (Wi-Fi Protected Access), MAC Filtering, Hidden SSID, WPA2-RADIUS
APA, Harvard, Vancouver, ISO, and other styles
49

Puspita Sari, Elsi, Muhammad Adri, and Khairi Budayawan. "ANALISIS KECEPATAN TRANSFER DATA NIRKABEL PADA LOCAL AREA NETWORK (LAN) DI JURUSAN TEKNIK ELEKTRONIKA FAKULTAS TEKNIK UNIVERSITAS NEGERI PADANG." Voteteknika (Vocational Teknik Elektronika dan Informatika) 2, no. 2 (November 16, 2018). http://dx.doi.org/10.24036/voteteknika.v2i2.3303.

Full text
Abstract:
Indoor access point (AP) causes the signal quality is reduced because it is hampered by a wall to access the outdoors. Wi-Fi is available for students only 3 APs, and IP availability is limited so it cannot meet all demand access. In addition, all the AP are connected only through the router without using the AP controller that can cause boottleneck. The lack of rule governing UNP Wi-Fi channel Processing, because the Wi-Fi is adjacent even the Wi-Fi uses the same channel so it can causes interference. The purpose of this study is to determine whether available Wi-Fi can cover areas in blocks of Electronical Engineering Department, to know the quality of the signal with InSSIDer Software Network Stumbler and, to know the results of the speed of traffic data at any Available Wi-Fi the Department of Electronical Engineering, and find out if an Access Point (AP) which affects the quality of the indoor signal to access the outdoors. This study classified into the descriptive study with a qualitative approaching using descriptive methods. Sampling technique in this study were 95 users whose population are Electronical Engineering and Electrical Engineering from 2009 to 2012 generation. The technique of collecting data was using questionnaires and observation. Data were analyzed by using the formula. The analysis shows that the network quality is good and no signal quality percentage below 50 %. Throughput values ​​for the uplink and downlink speeds are not always the same, regardless of the size of the data is same. Free Space Path Loss value’s depends on the distance of the user and access point. The greater the distance of the user to the AP the greater Multi Router Traffic Grapher (MRTG). It can be concluded that the average daily traffic, weekly, monthly, and yearly are differerent for the next daily, weekly, monthly, yearly trafics because it depends on the users and conditions. The Wi-Fi’s facility has a very important role to help students to fullfil their needs. Keywords : Wi-Fi, LAN, Throughput, Free Space Path Loss , MRTG.
APA, Harvard, Vancouver, ISO, and other styles
50

Minhas, Ketan, BCIT School of Health Sciences, Environmental Health, and Bobby Sidhu. "Wi-Fi radiation levels at BCIT." BCIT Environmental Public Health Journal, May 6, 2014. http://dx.doi.org/10.47339/ephj.2014.166.

Full text
Abstract:
Objective: To determine if there are any difference in the amount of EMF Wi-Fi radiation being emitted between three locations at the BCIT campus in Burnaby, BC. Background: Wi-Fi radiation is widely being used in today’s society for the quick access it gives us to connect to the internet. Some cities in the United Kingdom have installed many Wi-Fi devices throughout the public domain so people can be connected all the time. Furthermore, most schools are being outfitted with routers to provide internet access for their students. But, as this paper will show, new research is forcing a shift in the thinking of some policy makers in choosing to install these connections in the public domain. Method: To measure the amount of non-ionizing EMF radiation being absorbed by the body, an Extech RF meter was used. This instrument provides instantaneous and average readings for a particular area one measures. During the experiment, the RF meter was held stationary at one location for approximately 10-15 seconds in order to stabilize the reading. The average value was taken as the instantaneous reading was fluctuating. This process was done in 3 buildings at BCIT and in order to increase the reliability and validity, 30 data points were collected from each building. Results: The Tests of Assumption showed that the data was not normally distributed as there was more than one “Reject” at the 0.05 probability level. For analysis, the Krukal-Wallis One-Way ANOVA was utilized and results showed that due to a high probability level of 0.57, the H0 could not be rejected and as a result there are no differences in radiation levels being emitted into the buildings tested. Conclusion: The amount of Wi-Fi radiation in the three buildings tested at BCIT were not significantly different from one another.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography