Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    Quintuple Band Antenna for Wireless Applications with Small Form Factor

    Amir Haider1, Tayyaba Khan2, MuhibUr Rahman3, Byung Moo Lee1, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2241-2251, 2021, DOI:10.32604/cmc.2021.013908

    Abstract A coplanar waveguide-fed quintuple band antenna with a slotted circular-shaped radiator for wireless applications with a high isolation between adjacent bands is presented in this paper. The proposed antenna resonates at multiple frequencies with corresponding center frequencies of 2.35, 4.92, 5.75, 6.52, and 8.46 GHz. The intended functionality is achieved by introducing a circular disc radiator with five slots and a U-shaped slot in the feed. The proposed antenna exhibits coverage of the maximum set of wireless applications, such as satellite communication, worldwide interoperability for microwave access, wireless local area network (WLAN), long-distance radio telecommunications, and X-band/Satcom wireless applications. The… More >

  • Open Access

    ARTICLE

    A Position Self-Adaptive Method to Detect Fake Access Points

    Ping Lu1,2,*

    Journal of Quantum Computing, Vol.2, No.2, pp. 119-127, 2020, DOI:10.32604/jqc.2020.09433

    Abstract In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from many existing methods, our method… More >

  • Open Access

    ARTICLE

    West Indian avocado: where did it originate?

    Galindo-Tovar1 ME, AM Arzate-Fernández2

    Phyton-International Journal of Experimental Botany, Vol.79, pp. 203-207, 2010, DOI:10.32604/phyton.2010.79.203

    Abstract Origin of West Indian avocado has been explained by current-day factors, such as abundance patterns; however, it is still unclear where it originated. Anyhow, there is a history behind the species that reflects, in one way or another, the present geographic distribution and species characteristics. We examined paleohistorical and paleoecological data to explore the West Indian avocado origin. Our results suggest that West Indian avocado originated by domestication and ecological adaptation in the Maya Lowland area; this is where this botanical variety of avocado has an ancient history. More >

  • Open Access

    ARTICLE

    A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

    Xin Jiang1, Mingzhe Liu1,*, Chen Yang1, Yanhua Liu1, Ruili Wang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 45-59, 2019, DOI:10.32604/cmc.2019.03863

    Abstract In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public… More >

Displaying 11-20 on page 2 of 14. Per Page