Communications

The software industry is a very flexible phenomenon. Adding network concepts to this industry means we have countless actors with different roles on a single ground. Its players include software developers, customers, users, and software components. The purpose of this article is to create a better way to communicate between these actors.We can imagine software engineering different and more effective than the current situation.

Categories:
239 Views

RSSI-Dataset

The RSSI-Dataset provides a comprehensive set of Received Signal Strength Indication (RSSI) readings from within two indoor office buildings. Four wireless technologies were used:

  • Zigbee (IEEE 802.15.4),
  • WiFi (IEEE 802. 11),
  • Bluetooth Low Energy (BLE) and
  • Long Range Area-Wide Network (LoRaWAN).

For experimentation Arduinos Raspberry Pi, XBees, Gimbal beacons Series 10 and Dragino LoRa Shield were also used.  

Categories:
1893 Views

Expansion of wireless body area networks (WBANs) applications such as health-care, m-banking, and others  has lead to vulnerability of privacy and personal data. An effective and unobtrusive natural method of authentication is therefore a necessity in such applications. Accelerometer-based gait recognition has become an attractive solution, however, continuous sampling of accelerometer data reduces the battery life of wearables. This paper investigates the usage of received signal strength indicator (RSSI) as a source of gait recognition.

Categories:
599 Views

    A large frequency interval dual-band high-gain slot array antenna based on SIW (substrate integrated waveguide) for simultaneous microwave and millimeter wave application is proposed in this paper. The designed antenna consists of 2 arrays working on 9.86 GHz ~ 10.2 GHz and 25.9 GHz ~ 39.53 GHz, which can meet demand on X- and Ka-band, respectively. Two substrates sandwiched between three layers of metal are employed, and all slots are located on the second metal layer.

Categories:
252 Views

NA

x

Categories:
216 Views

Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victim’s encrypted network traffic in order to identify user’s parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual Private Network (VPN) or even change protocols parameters to protect his/her privacy.

Categories:
1161 Views

In this letter, a compact pattern reconfigurable filtering microstrip antenna is presented with broad bandwidth, good selectivity at the passband edge, and flat gain frequency response. The pattern reconfigurable filtering antenna has four resonant modes which can be adjusted independently, three of them are created by multi-mode resonator (MMR) and the other one is by radiator. The four resonant modes are well distributed in desired band and the resonant mode of radiator is located between the first two resonant modes of MMR.

Categories:
403 Views

In this paper, we present the Tree Exploration Discovery Protocol (TEDP), proving that shortest paths can be built at the same time that the topology information is gathered, without extra messages compared to LLDP.

Categories:
343 Views

The MATLAB program provides the performance of a sliding window based detection for a pulse radar signal.

Categories:
907 Views

Pages