Journal articles on the topic 'Mac users'

To see the other types of publications on this topic, follow the link: Mac users.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mac users.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Frances Webber. "Mac users." Socialist Lawyer, no. 66 (2014): 46. http://dx.doi.org/10.13169/socialistlawyer.66.0046a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena, and Evangelos Pallis. "Traffic-Based S-MAC." International Journal of Wireless Networks and Broadband Technologies 4, no. 1 (January 2015): 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.

Full text
Abstract:
Mobile Peer-to-Peer (MP2P) is a networking paradigm that will be exploited in the future to support technological advances and systems for the efficient provision of multiple services to mobile users. In a general context, the mobile community seeks to invest in on-the-fly services, by minimizing the effort and the increasing mobile users' performance. In this framework, the mobile Ad-Hoc Networks provide mobile nodes the flexibility of operating as flexible networking points, without the use of a centralized entity, where issues such as the energy consumption and the data packets transmission failure arise along with many more. Towards minimizing the factors that contribute to the increased consumption of the energy and the resources, as well as the loss of data, a Traffic-based S-MAC protocol is proposed in this paper to increase the data exchange and preserve the energy conservation, among the nodes in mobile Ad-Hoc Networks. The performance of the proposed protocol was thoroughly evaluated, by conducting multiple experimental results. The results verify the efficient performance of the protocol and indicate fields for further research and experimentation.
APA, Harvard, Vancouver, ISO, and other styles
3

سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي, سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي. "Intrusion Detection System for Misbehaving WLAN Users." journal of king abdulaziz university computing and information technology sciences 1, no. 1 (January 2, 2012): 55–81. http://dx.doi.org/10.4197/comp.1-1.3.

Full text
Abstract:
Wireless networks in the lives of people at work, at home, and in public places, plays a decisive role. Given the widespread demand for wireless networks, providers deploy wireless local area networks (WLAN) to provide access to broadband Internet Within the range of a public wireless LAN hotspot such as in airports or hotels, users can access their e-mails and browse the Internet either for free or, most often, against a fee. However, as the number of users rises, so does the risk that users may misbehave. Misbehaving users can to a large extent increase their share of bandwidth at the expense of other paid users by slightly modifying the driver of the network adapter. As the use of such networks grows, users will demand secure yet efficient, low-latency communications. Intruders’ detection is one of the key techniques that can be used to protect a network against outsiders. Many Intrusion Detection Systems (IDSs) have been designed for wired networks. Unfortunately, most of these IDSs do not give the expected results when used with wireless networks and are especially poor at addressing the Media Access Control (MAC) layer problem. In this sheet, we present the design and implementation of an IDS tool that is chosen for WLANs and addresses misbehavior at the MAC layer properly. Keywords: IDS, WLAN, MAC layer, Misbehavior
APA, Harvard, Vancouver, ISO, and other styles
4

Fenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye. "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 164–81. http://dx.doi.org/10.2478/popets-2021-0042.

Full text
Abstract:
Abstract Mobile device manufacturers and operating system developers increasingly deploy MAC address randomization to protect user privacy and prevent adversaries from tracking persistent hardware identifiers. Early MAC address randomization implementations suffered from logic bugs and information leakages that defeated the privacy benefits realized by using temporary, random addresses, allowing devices and users to be tracked in the wild. Recent work either assumes these implementation flaws continue to exist in modern MAC address randomization implementations, or considers only dated software or small numbers of devices. In this work, we revisit MAC address randomization by performing a cross-sectional study of 160 models of mobile phones, including modern devices released subsequent to previous studies. We tested each of these phones in a lab setting to determine whether it uses randomization, under what conditions it randomizes its MAC address, and whether it mitigates known tracking vulnerabilities. Our results show that, although very new phones with updated operating systems generally provide a high degree of privacy to their users, there are still many phones in wide use today that do not effectively prevent tracking.
APA, Harvard, Vancouver, ISO, and other styles
5

M, Anusha, Srikanth Vemuru, and T. Gunasekhar. "Transmission protocols in Cognitive Radio Mesh Networks." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 6 (December 1, 2015): 1446. http://dx.doi.org/10.11591/ijece.v5i6.pp1446-1451.

Full text
Abstract:
A Cognitive Radio (CR) is a radio that can adjust its transmission limit based on available spectrum in its operational surroundings. Cognitive Radio Network (CRN) is made up of both the licensed users and unlicensed users with CR enable and disabled radios. CR’S supports to access dynamic spectrum and supports secondary user to access underutilized spectrum efficiently, which was allocated to primary users. In CRN’S most of the research was done on spectrum allocation, spectrum sensing and spectrum sharing. In this literature, we present various Medium Access (MAC) protocols of CRN’S. This study would provide an excellent study of MAC strategies.
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Min Sheng, Hai Tao Tan, Meng Chen, and Xiang Li. "The Improvement of Preamble Mechanism and Addition of TDMA/CSMA Mechanism for B-MAC." Applied Mechanics and Materials 48-49 (February 2011): 1261–64. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.1261.

Full text
Abstract:
B-MAC was a kind of MAC protocol which was widely used in Wireless Sensor Networks (WSNs), and some high requirements had been provided for users. However, there were always challenges due to the high energy consumption and packets loss rate. A new MAC protocol called B-MAC++ based on B-MAC was proposed in this paper. The preamble mechanism was improved and funneling effect alleviation mechanism was brought out in B-MAC++. For the combination of the strengths of TDMA and CSMA, the preamble mechanism improvement achieved better energy-efficient, and made up to the weakness of WSNs, and a kind of CSMA/TDMA mechanism was introduced to alleviate funneling effect, and the sink-node’s packet loss had been reduced. Experiments show that B-MAC++ is better than B-MAC in the performance of energy consumption and packet loss rate.
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Chien-Min, Yen-Chun Kao, and Kai-Fu Chang. "A Multichannel MAC Protocol for IoT-enabled Cognitive Radio Ad Hoc Networks." Advances in Technology Innovation 5, no. 1 (January 1, 2020): 45–55. http://dx.doi.org/10.46604/aiti.2020.3946.

Full text
Abstract:
Cognitive radios have the ability to dynamically sense and access the wireless spectrum, and this ability is a key factor in successfully building Internet-of-Things (IoT)-enabled mobile ad hoc networks. This paper proposes a contention-free token-based multichannel MAC protocol for IoT-enabled Cognitive Radio Ad Hoc Networks (CRAHNs). In this, secondary users of CRAHNs detect activity on the wireless spectrum and then access idle channels licensed by primary users. CRAHNs are divided into clusters, and the channel to use for transmission is determined dynamically from the probability of finding idle primary-user channels. The token-based MAC window size is adaptive, with adjustment according to actual traffic, which reduces both end-to-end MAC contention delay and energy consumption. High throughput and spatial reuse of channels can also be achieved using a dynamic control channel and dynamic schemes for contention windows. We performed extensive simulations to verify that the proposed method can achieve better performance in mobile CRAHNs than other MAC schemes can.
APA, Harvard, Vancouver, ISO, and other styles
8

HU, VINCENT C., D. RICHARD KUHN, TAO XIE, and JEEHYUN HWANG. "MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES." International Journal of Software Engineering and Knowledge Engineering 21, no. 01 (February 2011): 103–27. http://dx.doi.org/10.1142/s021819401100513x.

Full text
Abstract:
Mandatory access control (MAC) mechanisms control which users or processes have access to which resources in a system. MAC policies are increasingly specified to facilitate managing and maintaining access control. However, the correct specification of the policies is a very challenging problem. To formally and precisely capture the security properties that MAC should adhere to, MAC models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a standardized structure for MAC models, providing for both property verification and automated generation of test cases. The approach expresses MAC models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify the integrity, coverage, and confinement of these properties for the MAC models and finally generates test cases via combinatorial covering array for the system implementations of the models.
APA, Harvard, Vancouver, ISO, and other styles
9

Ausaf, Asfund, Mohammad Zubair Khan, Muhammad Awais Javed, and Ali Kashif Bashir. "WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications." Future Internet 12, no. 1 (January 11, 2020): 11. http://dx.doi.org/10.3390/fi12010011.

Full text
Abstract:
Internet of Things (IoT)-based devices consist of wireless sensor nodes that are battery-powered; thus, energy efficiency is a major issue. IEEE 802.15.4-compliant IoT devices operate in the unlicensed Industrial, Scientific, and Medical (ISM) band of 2.4 GHz and are subject to interference caused by high-powered IEEE 802.11-compliant Wireless Local Area Network (WLAN) users. This interference causes frequent packet drop and energy loss for IoT users. In this work, we propose a WLAN Aware Cognitive Medium Access Control (WAC-MAC) protocol for IoT users that uses techniques, such as energy detection based sensing, adaptive wake-up scheduling, and adaptive backoff, to reduce interference with the WSN and improve network lifetime of the IoT users. Results show that the proposed WAC-MAC achieves a higher packet reception rate and reduces the energy consumption of IoT nodes.
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Xiaofeng, Xianzhong Xie, and Ting Song. "Cross-Layer Performance Analysis of the Unreliable Data Transmission for Decentralized Cognitive MAC Protocol under Multiple Secondary Users Scenario." Journal of Systems Science and Information 1, no. 1 (February 25, 2013): 74–85. http://dx.doi.org/10.1515/jssi-2013-0074.

Full text
Abstract:
AbstractThe effect of multiple secondary users detecting the same primary user channel during a minor period on the performance of traditional energy detection is investigated. In order to achieve the target probability of detection, the minimum sampling time (MST) for energy detection is derived under the limitation of energy detection (LED), when the random arrival of the secondary users is taken into account. Jointly considering both spectrum sensing and access, we derive the probability of unreliable data transmission for decentralized cognitive MAC (DC-MAC) protocol based on MST under LED. The numerical results show that the simulation and theoretical analysis match very well. The reliability of data transmission is significantly degraded by the secondary users’ traffic. With the target probability of detection increasing, the reliable throughput reduces.
APA, Harvard, Vancouver, ISO, and other styles
11

Ma, Yue Huai, Wei Zhang, Wen Hua Wang, and Yue Xuan Liu. "An Efficient Packet Scheduling and Resource Allocation Algorithm for Practical Multi-Layer Systems." Advanced Materials Research 926-930 (May 2014): 2951–54. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2951.

Full text
Abstract:
In this paper, we research the wireless resource allocation problem with packet scheduling in both MAC layer and physical layer in multi-user orthogonal frequency division multiplexing (OFDM) systems. Under the practical environment where mobile users receiving signal with different SNR levels in a cell or around a Wi-Fi hot spot, our designed algorithm can execute relatively fair packet scheduling from MAC layer consideration and make efficient use of wireless resources at physical layer. simulation results show that our proposed scheme satisfy most users in various SNR and have better average performance in packet drop rate, packet delay and total throughput.
APA, Harvard, Vancouver, ISO, and other styles
12

Hovden, Robert. "Running Digital Micrograph on Linux and Mac OSX." Microscopy Today 20, no. 2 (February 28, 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.

Full text
Abstract:
Gatan Digital Micrograph (DM) software is considered an industry standard among microscopists. The offline DM application is freely available from Gatan. Unfortunately, DM software has been designed to run only on Microsoft Windows operating systems, thus distancing the microscopy community from popular Unix-based systems, such as Linux or Mac OSX. An ad hoc solution to this problem has required a virtualized Windows operating system running on top of the user's native operating system. This is not only slow, having to emulate each processor instruction, but also requires installation and licensing of Windows and the virtualization software. However, with the aid of open-source resources, it is possible to run DM natively on Linux and Mac OSX (Figure 1). This article was written as a guide with easy-to-follow installation instructions to liberate users from the Windows emulation pidgeonhole and enable them to freely analyze data on Unix-based systems.
APA, Harvard, Vancouver, ISO, and other styles
13

Jain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (May 16, 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.

Full text
Abstract:
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Liu, and Paolini. "A Dynamic Access Probability Adjustment Strategy for Coded Random Access Schemes." Sensors 19, no. 19 (September 27, 2019): 4206. http://dx.doi.org/10.3390/s19194206.

Full text
Abstract:
In this paper, a dynamic access probability adjustment strategy for coded random accessschemes based on successive interference cancellation (SIC) is proposed. The developed protocolconsists of judiciously tuning the access probability, therefore controlling the number of transmittingusers, in order to resolve medium access control (MAC) layer congestion states in high load conditions.The protocol is comprised of two steps: Estimation of the number of transmitting users during thecurrent MAC frame and adjustment of the access probability to the subsequent MAC frame, based onthe performed estimation. The estimation algorithm exploits a posteriori information, i.e., availableinformation at the end of the SIC process, in particular it relies on both the frame configuration(residual number of collision slots) and the recovered users configuration (vector of recovered users)to effectively reduce mean-square error (MSE). During the access probability adjustment phase, atarget load threshold is employed, tailored to the packet loss rate in the finite frame length case.Simulation results revealed that the developed estimator was able to achieve remarkable performanceowing to the information gathered from the SIC procedure. It also illustrated how the proposeddynamic access probability strategy can resolve congestion states efficiently.
APA, Harvard, Vancouver, ISO, and other styles
15

Ullah, Niamat, M. Sanaullah Chowdhury, Mosaddique Al Ameen, and Kyung Sup Kwak. "Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 504946. http://dx.doi.org/10.1155/2012/504946.

Full text
Abstract:
Critical infrastructure monitoring applications are rapidly increasing. Application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. These applications must also be able to operate in an extremely low-cost communication environment in order to be attractive to potential users. A low rate wireless personal area network can help control and manage the operations of such applications. In this paper, we present a medium access control (MAC) protocol for low-energy critical infrastructure monitoring (LECIM) applications. The proposed MAC protocol is based on a framed slotted aloha multiple access schemes. For downlink communication, we use a wakeup radio approach to avoid complex bookkeeping associated with the traditional MAC protocols. Analytical expressions for power consumption and delay are derived to analyze and compare the performance of our proposed protocol with the existing well-known T-MAC, B-MAC, X-MAC, ZigBee, and WiseMAC protocols. It is shown that our proposed protocol outperforms all the other protocols in terms of power consumption and delay.
APA, Harvard, Vancouver, ISO, and other styles
16

Nevid, Jeffrey S., and Amy Pastva. "“I'm a Mac” versus “I'm a PC”: Personality Differences between Mac and PC Users in a College Sample." Psychology & Marketing 31, no. 1 (December 20, 2013): 31–37. http://dx.doi.org/10.1002/mar.20672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Setiawan, Adi, Gyga Putra Parsaulian Hutauruk, and Tita Aisyah. "Prototipe Kelas Pintar dengan Absensi Otomatis MAC Address Gawai Berbasis IoT." INSOLOGI: Jurnal Sains dan Teknologi 2, no. 1 (February 28, 2023): 97–108. http://dx.doi.org/10.55123/insologi.v2i1.1400.

Full text
Abstract:
This IoT-based smart classroom prototype was built using the NodeMCU microcontroller ESP8266. The automation system works by checking if there are users connected to the access point in the classroom and the course scheduled to use it. The attendance check is done by fetching MAC address from a user's device automatically. Next, it will activate relay to turn on electrical facilities in the used classroom, such as lamps, fans, or air conditioners. The system also uses the website using MySQL database to monitor classroom conditions, edit class schedules, register user devices to the system and access attendance data. From the tests carried out, the system can run according to design. Among other things, the relay circuit can be arranged according to the schedule of activities and the whereabouts of the user. Attendance data can be displayed according to users who are connected and registered in the system. The calculations on total delay of system yield results that the delay to activate the classroom is 10.66 ± 0.87 seconds on the website and 14.55 ± 0.78 seconds on the relay. On the other hand, the delay needed to deactivate the classroom is 39.34 ± 3.69 seconds on the website and 36.26 ± 3.70 seconds on the relay.
APA, Harvard, Vancouver, ISO, and other styles
18

Rahim, Muddasir, Riaz Hussain, Irfan Latif Khan, Ahmad Naseem Alvi, Muhammad Awais Javed, Atif Shakeel, Qadeer Ul Hasan, Byung Moo Lee, and Shahzad A. Malik. "Self-Organized Efficient Spectrum Management through Parallel Sensing in Cognitive Radio Network." Wireless Communications and Mobile Computing 2021 (August 6, 2021): 1–22. http://dx.doi.org/10.1155/2021/5552012.

Full text
Abstract:
In this paper, we propose an innovative self-organizing medium access control mechanism for a distributed cognitive radio network (CRN) in which utilization is maximized by minimizing the collisions and missed opportunities. This is achieved by organizing the users of the CRN in a queue through a timer and user ID and providing channel access in an orderly fashion. To efficiently organize the users in a distributed, ad hoc network with less overhead, we reduce the sensing period through parallel sensing wherein the users are divided into different groups and each group is assigned a different portion of the primary spectrum band. This consequently augments the number of discovered spectrum holes which then are maximally utilized through the self-organizing access scheme. The combination of two schemes augments the effective utilization of primary holes to above 95%, even in impasse situations due to heavy primary network loading, thereby achieving higher network throughput than that achieved when each of the two approaches are used in isolation. By efficiently combining parallel sensing with the self-organizing MAC (PSO-MAC), a synergy has been achieved that affords the gains which are more than the sum of the gains achieved through each one of these techniques individually. In an experimental scenario with 50% primary load, the network throughput achieved with combined parallel sensing and self-organizing MAC is 50% higher compared to that of parallel sensing and 37% better than that of self-organizing MAC. These results clearly demonstrate the efficacy of the combined approach in achieving optimum performance in a CRN.
APA, Harvard, Vancouver, ISO, and other styles
19

Sum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang, and Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space." ISRN Communications and Networking 2011 (June 28, 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.

Full text
Abstract:
This paper proposes the design of enabling technologies for practical wireless communication systems operating in the TV white space (TVWS). The main objective of this paper is to cover a macro perspective on the system design blocks including: (a) targeted use case applications and governing regulations, (b) channelization, physical (PHY) layer and medium access control (MAC) layer designs, and (c) achievable throughput and range. It is the intention of this paper to serve as a general guideline for designing wireless communication systems operating in TVWS. The core system design addresses both PHY and MAC layer issues with realistic system considerations. In the PHY layer, a channelization design that fits into the area-specific TV channels and a transceiver that enables data exchange in the TV bands are designed. In the MAC layer, a cognitive engine that manages access to vacant TV channels and MAC functionalities that facilitate effective medium access are also proposed. As a result, the system is capable of supporting up to a typical throughput of 80 Mbps, and a maximum number of 40 users, assuming all users performing the most bandwidth-hungry application in the use case scenario. The corresponding operating range is found reach up to 400 m.
APA, Harvard, Vancouver, ISO, and other styles
20

Subramanyam, Radha, S. Rekha, P. Nagabushanam, and Sai Krishna Kondoju. "Optimization Techniques in Cooperative and Distributed MAC Protocols." International Journal of Intelligent Information Technologies 20, no. 1 (January 7, 2024): 1–23. http://dx.doi.org/10.4018/ijiit.335523.

Full text
Abstract:
The tremendous increase in wireless network application finds distributed allocation of resources allocation very useful in the network. Packet delivery ratio and delay can be improved by concentrating on payload size, mobility, and density of nodes in the network. In this article, a survey is carried out on different cooperative and distributed MAC protocols for communication and optimization algorithms for various applications and the mathematical issues related to game theory optimizations in MAC protocol. Spatial reuse of channel improved by (3-29) % and multi-channel improves throughput by 8% using distributed MAC protocol. The energy utility of individual players can be focused to get better network performance with NASH equilibrium. Fuzzy logic improves channel selection by 17% and secondary users' involvement by 8%. Jamming, interference problems can be addressed using cross layer approach in the MAC and simultaneous data, voice transmissions in IoT; WSN applications can be attained using hybrid distributed MAC protocol.
APA, Harvard, Vancouver, ISO, and other styles
21

Nasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (April 8, 2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.

Full text
Abstract:
Address Resolution Protocol (ARP) is used to resolve a host’s MAC address, given its IP address. ARP is stateless, as there is no authentication when exchanging a MAC address between the hosts. Hacking tactics using ARP spoofing are constantly being abused differently; many previous studies have prevented such attacks. However, prevention requires modification of the underlying network protocol or additional expensive equipment, so applying these methods to the existing network can be challenging. In this paper, we examine the limitations of previous research in preventing ARP spoofing. In addition, we propose a defense mechanism that does not require network protocol changes or expensive equipment. Before sending or receiving a packet to or from any device on the network, our method checks the MAC and IP addresses to ensure they are correct. It protects users from ARP spoofing. The findings demonstrate that the proposed method is secure, efficient, and very efficient against various threat scenarios. It also makes authentication safe and easy and ensures data and users’ privacy, integrity, and anonymity through strong encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
22

Jouma Ali AlMohamad, Jouma Ali AlMohamad. "Build Encrypted Interconnection Networks by application of IP Security and Mac Address Filtering Authentication Methods: بناء شبكات ربط مشفرة من خلال تطبيق أساليب مصادقة أمان IP وتصفية عنوان Mac." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 66–56. http://dx.doi.org/10.26389/ajsrp.m280321.

Full text
Abstract:
To improve the security in data networks we use of IP Security and MAC Address Filtering authentication methods on network devices is very useful to be able to protect, verify and filter company data especially if data contain sensitive information like credit cards while using public data network. IP Security authentication provides integrity between connections, then Filtering MAC Address can help the router task to be able recognize users on the network, So that expected the combination between IP Security and Mac Address Filtering will provide security for every transfer and receive data from Headquarter to branch office, then the company doesn't have to worry about data package being robbed or manipulated by the unauthorized parties.
APA, Harvard, Vancouver, ISO, and other styles
23

Firmin, Michael W., Whitney L. Muhlenkamp Wood, Ruth L. Firmin, and Jordan C. Wood. "Self‐admitted pretensions of Mac users on a predominantly PC university campus." Educational Media International 47, no. 1 (March 2010): 1–17. http://dx.doi.org/10.1080/09523981003654944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jin, Youngmi, George Kesidis, and Ju Wook Jang. "A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users." IEEE Journal on Selected Areas in Communications 30, no. 1 (January 2012): 128–37. http://dx.doi.org/10.1109/jsac.2012.120112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Singhal, Chetna, and Thanikaiselvan V. "Cross Layering using Reinforcement Learning in Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network." International journal of Computer Networks & Communications 14, no. 4 (July 31, 2022): 1–17. http://dx.doi.org/10.5121/ijcnc.2022.14401.

Full text
Abstract:
The coupling of multiple protocol layers for a Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network, enables better interaction, coordination, and joint optimization of different protocols in achieving remarkable performance improvements. In this paper, network, and medium access control (MAC) layer functionalities are cross-layered by developing the joint strategy of routing and effective spectrum sensing and Dynamic Channel Selection (DCS) using the Reinforcement Learning (RL) algorithm. In an industrial ad-hoc scenario, the network layer utilizes the sensed spectrum and selected channel by MAC layer for next-hop routing. MAC layer utilizes the lowest known transmission delay of a channel for a single hop as computed by the network layer, which improves the MAC channel selection operation. The applied RLbased technique (Q learning) enables the CR Secondary Users (SUs) to sense, learn, and make the optimal decision on their environment of operations. The proposed RLCLD schemes improve the SU network performance up to 30% as compared to conventional methods.
APA, Harvard, Vancouver, ISO, and other styles
26

Dunaytsev, R., and A. Shabanova. "On the Use of Wi-Fi in Marketing." Telecom IT 7, no. 4 (December 31, 2019): 37–42. http://dx.doi.org/10.31854/2307-1303-2019-7-4-37-42.

Full text
Abstract:
During the last decade, we have witnessed an ever-growing increase in the use of Wi-Fi in geomarketing and advertising in the form of Wi-Fi analytics and hyperlocal targeting. Using a special device installed in a store, cafe, etc., the MAC addresses of mobile users who walked by or entered inside are collected. Further, the collected MAC addresses are used either to measure traffic intensity or to display targeted commercials of these establishments, as well as their goods and services. This paper discusses business opportunities of Wi-Fi in marketing.
APA, Harvard, Vancouver, ISO, and other styles
27

Yash, Sharma, and Pandey Neeraj Kumar. "MAC Based Security Integration using Face Recognition in Cloud Environment." Journal of Physics: Conference Series 2089, no. 1 (November 1, 2021): 012005. http://dx.doi.org/10.1088/1742-6596/2089/1/012005.

Full text
Abstract:
Abstract The major challenges, which come across face recognition system, are to find the age and gender in 2D/3D image of the person specifically in cloud environment. This paperis centered on face detection with MAC (Media Access Control) and biometric technology. Face scanning along with machine’s MAC address and biometric technologies has been shown to improve security controls. Face recognition can be used to search and label users and their assigned machines for sensitive purposes. Following that, it was stored in a specific database with their unique ID. In addition, the verification process has begun by comparing the models in the database. Face scanning along with speech and biometric technologies is used to improve security controls. Face recognition system may also be set up in high security machines to improve protection by allowing only registered individuals or others users. Related strategies for determining the age and gender and 2D/3D image from a specific picture are explored, as well as several modern methods for preserving protection. In this paper, the full model is explored independently with security implemented in cloud environment. The proposed model of the paper provides the integrated security features using MAC address of machine and face recognition of the machine user.
APA, Harvard, Vancouver, ISO, and other styles
28

Tarafder, Pulok, and Wooyeol Choi. "MAC Protocols for mmWave Communication: A Comparative Survey." Sensors 22, no. 10 (May 19, 2022): 3853. http://dx.doi.org/10.3390/s22103853.

Full text
Abstract:
With the increase in the number of connected devices, to facilitate more users with high-speed transfer rate and enormous bandwidth, millimeter-wave (mmWave) technology has become one of the promising research sectors in both industry and academia. Owing to the advancements in 5G communication, traditional physical (PHY) layer-based solutions are becoming obsolete. Resource allocation, interference management, anti-blockage, and deafness are crucial problems needing resolution for designing modern mmWave communication network architectures. Consequently, comparatively new approaches such as medium access control (MAC) protocol-based utilization can help meet the advancement requirements. A MAC layer accesses channels and prepares the data frames for transmission to all connected devices, which is even more significant in very high frequency bands, i.e., in the mmWave spectrum. Moreover, different MAC protocols have their unique limitations and characteristics. In this survey, to deal with the above challenges and address the limitations revolving around the MAC layers of mmWave communication systems, we investigated the existing state-of-the-art MAC protocols, related surveys, and solutions available for mmWave frequency. Moreover, we performed a categorized qualitative comparison of the state-of-the-art protocols and finally examined the probable approaches to alleviate the critical challenges in future research.
APA, Harvard, Vancouver, ISO, and other styles
29

Adami, Fardiansyah. "Throughput Analysis on LTE Network for Multicast D2D System." Jurnal Inotera 4, no. 1 (June 26, 2019): 7. http://dx.doi.org/10.31572/inotera.vol4.iss1.2019.id69.

Full text
Abstract:
One of the features applied to fifth generation (5G) technology is Device-to-Device (D2D) communication. The D2D communication can occur directly without going through evolved Node B (eNB). Therefore, that it can reduce traffic density on cellular network communications. However, the application of D2D communication has constrained by the limited transmission distance and multi-user service at the same source. Modelling and simulating the LTE D2D multicast network using software is an effectively and efficiently ways for analyzing mac throughput. The testing of network aims to observe and to analyze the mac throughput using two parameters, the transmission distance and the number of users, based on the utilization of the Channel Quality Indicator (CQI) index. The number of user is 20 and distance is 25 meters then mac throughput in index CQI 13 greater than CQI 4 and CQI 7 is 2150.14 Kbps. But the number of user is 20 and distance is 150 meters then CQI 13 smaller than CQI 4 and CQI 7 is 271.22 Kbps. The result of simulation shows that both distance and the number of user have influence mac throughput. The selection of CQI index is the most important factor to maintain the transmission quality and mac throughput.
APA, Harvard, Vancouver, ISO, and other styles
30

Songzuo, Liu, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao, and Feng Zhou. "Full Duplex Physical and MAC Layer-Based Underwater Wireless Communication Systems and Protocols: Opportunities, Challenges, and Future Directions." Journal of Marine Science and Engineering 9, no. 5 (April 27, 2021): 468. http://dx.doi.org/10.3390/jmse9050468.

Full text
Abstract:
Underwater wireless communication has gained a great deal of attention in the last couple of decades because of its applications in the military, industrial, and monitoring sectors. Despite the extreme physical and MAC layer difficulties, acoustics are used for various applications among the various modes of underwater communication technologies used. While significant research efforts have been made to address these issues, the bottleneck remains in achieving high bandwidth, high throughputs, and data rate. Researchers have begun to look into full duplex (FD) implementation to improve bandwidth efficiency and increase data rate and throughput. Users can send and receive data simultaneously over the FD links, maximizing bandwidth utilization and increasing throughput. As a result, we thoroughly reviewed various FD physical layered UWAC systems and MAC layered protocols for underwater communication. The various problems that the aforementioned systems and protocols have faced, as well as the solutions suggested in previous works to solve each problem, are also highlighted. Various metrics are used to compare the performance of various physical layered FD systems and FD MAC protocols. We also explore some of the open research questions in these FD-physical layered and MAC layered protocols, as well as future research directions. Based on ample information, we suggest a cross-layered architecture based on various IBFD-SI cancellations, DA-CSMA, and FD-MAC protocols. This review provides a broad view of the current FD physical and MAC layered protocols based on acoustic communication, as well as recommendations.
APA, Harvard, Vancouver, ISO, and other styles
31

Dai, Bin, and Yong Tao Wang. "Discrete Memoryless Multiple-Access Wiretap Channel with Non-Cooperative Encoders." Applied Mechanics and Materials 433-435 (October 2013): 1502–6. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1502.

Full text
Abstract:
In this paper, the discrete memoryless multiple-access wiretap channel (MAC-WT) with non-cooperative encoders is studied, where two users (cooperation between the users is not allowed) transmit their corresponding confidential messages (no common message) to a legitimate receiver, while an additional wiretapper wishes to obtain the messages via a wiretap channel. The inner and outer bounds on the capacity-equivocation region are provided forthis new model, and the result is further explained via a binary example.
APA, Harvard, Vancouver, ISO, and other styles
32

Tlouyamma, Joseph, and Mthulisi Velempini. "Channel Selection Algorithm Optimized for Improved Performance in Cognitive Radio Networks." Wireless Personal Communications 119, no. 4 (April 26, 2021): 3161–78. http://dx.doi.org/10.1007/s11277-021-08392-5.

Full text
Abstract:
AbstractA major concern in the recent past was the traditional static spectrum allocation which gave rise to spectrum underutilization and scarcity in wireless networks. In an attempt to solve this challenge, cognitive radios technology was proposed. It allows a spectrum to be accessed dynamically by Cognitive radio users or secondary users (SU). Dynamic access can efficiently be achieved by making necessary adjustment to some Medium access control (MAC) layer functionalities such as sensing and channel allocation. MAC protocols play a central role in scheduling sensing periods and channel allocation which ensure that the interference is reduced to a tolerable level. In order to improve the accuracy of sensing algorithm, necessary adjustments should be made at MAC layer. Sensing delays and errors are major challenges in the design of a more accurate spectrum sensing algorithm. This study focuses on designing a channel selection algorithm to efficiently utilize the spectrum. Channels are ordered and grouped to allow faster discovery of channel access opportunities. The ordering is based on descending order of channel’s idling probabilities. Grouping of channels ensured that channels are sensed simultaneously. These two techniques greatly reduce delays and maximized throughput of SU. Hence, Extended Generalized Predictive Channel Selection Algorithm, a proposed scheme has significantly performed better than its counterpart (Generalized Predictive Channel Selection Algorithm). Matlab simulation tool was used to simulate and plot the results of the proposed channel selection algorithm.
APA, Harvard, Vancouver, ISO, and other styles
33

Baidari, Ishwar, S. P. Sajjan, and Ajeet Singh. "Improving WLAN Quality of Services (Qos) Using Opnet." Oriental journal of computer science and technology 9, no. 3 (September 16, 2016): 204–11. http://dx.doi.org/10.13005/ojcst/09.03.06.

Full text
Abstract:
Wireless local area networks (WLANs) are in a period of great expansion and there is a strong need for them to support multimedia applications. With the increasing demand and penetration of wireless services, users of wireless networks now expect Quality of Service (QoS) and performance comparable to what is available from fixed networks. Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium Access Control (MAC) functions. This research is done to study, the presently implemented schemes (the Point Coordination Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordination Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11), solves these issues and what can be done to improve them further. The metrics used were Throughput, Data Drop, Retransmission and Medium Access Delay, to analyze the performance of various MAC protocols in providing QoS to users of WLAN. Two scenarios, with same Physical and MAC parameters, one implementing the DCF and other EDCF, were created in the network simulation tool (OPNET MODELER) to obtain the results. The results showed that the performance of EDCF was better in providing QoS for real-time interactive services (like video conferencing) as compared to DCF, because of its ability to differentiate and prioritize various services. Index Terms - Wireless local area networks (WLANs),
APA, Harvard, Vancouver, ISO, and other styles
34

Hardeep Singh Saini, Prabhjot Kaur,. "“Hybrid MAC Methodology for Improving the QOS in Fiber Wireless Network”." Journal of Electrical Systems 20, no. 2s (April 4, 2024): 293–305. http://dx.doi.org/10.52783/jes.1140.

Full text
Abstract:
The Fi-Wi (Fiber-Wireless) approach stands out as a crucial element in the realm of networks, demonstrating superiority over various technologies. With the exponential growth in Internet users, significant strides have been made in the evolution of Fi-Wi networking systems in recent years. This mechanism offers broader bandwidth and network stability, ensuring high-speed connectivity with "Anytime Anywhere" availability for end users. However, the escalating energy demand in networking systems poses a constraint on the network's lifespan, impacting transmission. Over the years, researchers have proposed and tested various Media Access Control (MAC) protocols to address transmission and energy consumption issues. Despite these efforts, existing protocols have encountered challenges such as overheating, delays, throughput issues, and collisions. This research paper introduces a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) to tackle associated challenges. The primary objective is to enhance throughput and reduce delays in Fi-Wi networks. To achieve this goal, the study employs techniques that involve and Utilizing an Orthogonal Frequency Division Multiplexing (OFDM) modulator, a free-space optical (FSO) communication channel, an OFDM demodulator, and Opti-system for the analysis and enhancement of received signals, our study demonstrates that the proposed MAC protocol surpasses conventional MAC protocols in terms of delay, data throughput, and transmission efficiency.
APA, Harvard, Vancouver, ISO, and other styles
35

Hardeep Singh Saini, Prabhjot Kaur ,. "“Hybrid MAC Methodology for Improving the Qos in Fiber Wireless Network”." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 819–32. http://dx.doi.org/10.52783/jes.824.

Full text
Abstract:
The Fi-Wi (Fiber-Wireless) approach stands out as a crucial element in the realm of networks, demonstrating superiority over various technologies. With the exponential growth in Internet users, significant strides have been made in the evolution of Fi-Wi networking systems in recent years. This mechanism offers broader bandwidth and network stability, ensuring high-speed connectivity with "Anytime Anywhere" availability for end users. However, the escalating energy demand in networking systems poses a constraint on the network's lifespan, impacting transmission. Over the years, researchers have proposed and tested various Media Access Control (MAC) protocols to address transmission and energy consumption issues. Despite these efforts, existing protocols have encountered challenges such as overheating, delays, throughput issues, and collisions. This research paper introduces a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) to tackle associated challenges. The primary objective is to enhance throughput and reduce delays in Fi-Wi networks. To achieve this goal, the study employs techniques that involve and Utilizing an Orthogonal Frequency Division Multiplexing (OFDM) modulator, a free-space optical (FSO) communication channel, an OFDM demodulator, and Opti-system for the analysis and enhancement of received signals, our study demonstrates that the proposed MAC protocol surpasses conventional MAC protocols in terms of delay, data throughput, and transmission efficiency.
APA, Harvard, Vancouver, ISO, and other styles
36

Paul, Rajib, Jiwoon Jang, and Young-June Choi. "Channel-Hopping Sequence and Rendezvous MAC for Cognitive Radio Networks." Sensors 22, no. 16 (August 9, 2022): 5949. http://dx.doi.org/10.3390/s22165949.

Full text
Abstract:
In cognitive radio networks (CRNs), two secondary users (SUs) need to meet on a channel among multiple channels within a finite time to establish a link, which is called rendezvous. For blind rendezvous, researchers have devised ample well-grounded channel hopping (CH) sequences that guarantee smaller time-to-rendezvous. However, the best part of these works lacks the impact of network factors, particularly channel availability and collision during rendezvous. In this study, a new CH scheme is investigated by jointly considering the medium access control (MAC) protocol for single-hop multi-user CRNs. The analysis of our new variable hopping sequence (V-HS) guarantees rendezvous for the asymmetric channel model within a finite time. Although this mathematical concept guarantees rendezvous between two SUs, opportunities can be overthrown because of the unsuccessful exchange of control packets on that channel. A successful rendezvous also requires the exchange of messages reliably while two users visit the same channel. We propose a MAC protocol, namely ReMAC, that can work with V-HS and CH schemes. This design allows multiple rendezvous opportunities when a certain user visits the channel and modifies the conventional back-off strategy to maintain the channel list. Both simulation and analytical results exhibited improved performance over the previous approaches.
APA, Harvard, Vancouver, ISO, and other styles
37

Biswas, Abhijit, and Dushyanta Dutta. "Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308311.

Full text
Abstract:
It is projected that communication among cognitive machine-to-machine (M2M) in smart grid networks is necessary and vital in forthcoming years. The objective of this paper is to bring out the significance of cognitive medium access control (MAC) protocol focusing on the distinctive characteristics of the devices in M2M and requirements of the smart grid communication. Therefore, developing a cognitive radio system which supports dynamic access to the spectrum available that is recently considered as a novel solution for extending wireless systems. In this paper, MAC layer sensing approaches in cognitive radio networks are investigated by considering both proactive and reactive sensing. To evaluate the performance, analytical modeling and simulation studies are carried out by comparing with state of art methods. As a result, the proposed HCM2M-MACachieves 687.3 kbps of blocking probability, 368.6kbps of dropping probability, 96.4% bandwidth utilization, 67.3% end to end delay and 89.3% of throughput.
APA, Harvard, Vancouver, ISO, and other styles
38

Siddik, Abubakar, Jakia Akter Nitu, Natasha Islam, Anju Ara Hasi, Jannatun Ferdous, Mizanur Rahman, and Nahid Sultan. "Effects of Mac Parameters on the Performance of IEEE 802.11 DCF in NS-3." International Journal of Wireless & Mobile Networks 13, no. 6 (December 31, 2021): 1–20. http://dx.doi.org/10.5121/ijwmn.2021.13601.

Full text
Abstract:
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
APA, Harvard, Vancouver, ISO, and other styles
39

Firmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.

Full text
Abstract:
The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
APA, Harvard, Vancouver, ISO, and other styles
40

Firmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.

Full text
Abstract:
The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
APA, Harvard, Vancouver, ISO, and other styles
41

Ku, Jennifer, Emily Henkle, Kathleen F. Carlson, Miguel Marino, Sarah K. Brode, Theodore K. Marras, Kevin L. Winthrop, and Kevin L. Winthrop. "192. Tolerability Outcomes of Multi-drug Antibiotic Treatment for Pulmonary Nontuberculous Mycobacterial Disease due to Mycobacterium avium Complex in U.S. Medicare Beneficiaries with Bronchiectasis." Open Forum Infectious Diseases 8, Supplement_1 (November 1, 2021): S116—S117. http://dx.doi.org/10.1093/ofid/ofab466.192.

Full text
Abstract:
Abstract Background Nontuberculous mycobacteria (NTM), most frequently Mycobacterium avium complex (MAC), cause increasingly common pulmonary infections. Treatment interruptions and early discontinuation are common in MAC therapy, but population-based data on treatment outcomes are severely lacking. We examined tolerability outcomes of guideline-based 3-drug therapies (GBT) targeted for pulmonary MAC infection. Methods Among beneficiaries with bronchiectasis (ICD-9-CM 494.0 or 494.1) in U.S. Medicare data (01/2006 – 12/2014), we identified first-time MAC GBT therapy users, excluding those with cystic fibrosis, HIV, or a history of organ transplant. MAC GBT was defined as an overlapping prescription of ≥ 28-day supply of a macrolide, ethambutol and rifamycin. Using Cox regression methods, we compared time-to-regimen change or discontinuation within 12 months of therapy start in the following groups: 1) azithromycin-ethambutol-rifamycin vs. clarithromycin-ethambutol-rifamycin; 2) macrolide-ethambutol-rifampin vs. macrolide-ethambutol-rifabutin; and 3) azithromycin-ethambutol-rifampin vs. clarithromycin-ethambutol-rifabutin. Results We identified 4,626 GBT therapy users (mean 77.9 years [s.d. 6.1], female [77.7%], and non-Hispanic white [87.2%]). Overall, the rate of regimen change or discontinuation was higher in the clarithromycin-based regimens compared to azithromycin-containing regimens, and in rifabutin-containing regimens compared to rifampin-containing regimens. The rate of drug regimen change or discontinuation was 65% greater in the clarithromycin-ethambutol-rifabutin group compared to the azithromycin-ethambutol-rifampin group (adjusted hazard ratio: 1.64, 95% CI: 1.43, 1.64) (Table 1, Figure 1). Conclusion Azithromycin-based regimens and rifampin-containing regimens were less likely to be changed or discontinued within 12 months of therapy compared to clarithromycin-based regimens and rifabutin-containing regimens, respectively. More research is needed to identify factors associated with early treatment change or discontinuation. Disclosures Emily Henkle, PhD, MPH, AN2 (Consultant, Advisor or Review Panel member)Zambon (Advisor or Review Panel member) Theodore K. Marras, MD, Astra Zeneca (Speaker’s Bureau)Insmed (Scientific Research Study Investigator)Novartis (Speaker’s Bureau)RedHill (Consultant)Spero (Consultant) Kevin L. Winthrop, MD, MPH, Insmed (Consultant, Grant/Research Support)Paratek (Consultant)RedHill (Consultant)Spero (Consultant) Kevin L. Winthrop, MD, MPH, Insmed (Consultant, Research Grant or Support)Paratek (Consultant)RedHill Biopharma (Consultant)Spero (Consultant)
APA, Harvard, Vancouver, ISO, and other styles
42

Perković, T., A. Dagelić, M. Bugarić, and M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science." Security and Communication Networks 2020 (September 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.

Full text
Abstract:
A plethora of organizations, companies, and foremost universities and educational institutions are using WPA2-Enterprise protocol to allow their end-users to connect to provided Wi-Fi networks. When both the provider’s and the end-user’s devices are configured properly, it is considered one of the safest Wi-Fi connection protocols with the added benefits of having a unique password for every Wi-Fi user. However, a known evil twin attack can be performed to steal users’ Wi-Fi login credentials, if the devices are not configured correctly. Considering the widespread use of Wi-Fi-enabled smartphones and rising concerns regarding users’ privacy, we focus on the privacy aspects of WPA2-Enterprise vulnerabilities mainly on the widespread Eduroam network. We show that device deanonymization is a concerning liability of many Eduroam networks. More than 87% of 1650 devices collected during a two-month test on our university are vulnerable to MAC address deanonymization attack. Furthermore, by analyzing the Eduroam Configuration Assistant Tool of 1066 different institutions around the world, 67% of exported Eduroam profiles having the Wi-Fi device reveal the user’s identity in the clear, thus linking the users with the device’s MAC address. Indeed, the analysis of the configuration profiles has been confirmed by performing the deanonymization attack on a large-scale international music festival in our country, where 70% of the devices have been vulnerable. Additionally, we showcase the psychological aspects of secure Eduroam users, where some are willing to modify secure configuration profiles to gain aspects to certain blocked features. As a result, the attacker is granted with user credentials and IMSI number and provided with access to all Eduroam-related services.
APA, Harvard, Vancouver, ISO, and other styles
43

Shahi, Sara, Daniela Tuninetti, and Natasha Devroye. "The Strongly Asynchronous Massive Access Channel." Entropy 25, no. 1 (December 29, 2022): 65. http://dx.doi.org/10.3390/e25010065.

Full text
Abstract:
This paper considers the Strongly Asynchronous, Slotted, Discrete Memoryless, Massive Access Channel (SAS-DM-MAC) in which the number of users, the number of messages, and the asynchronous window length grow exponentially with the coding blocklength with their respective exponents. A joint probability of error is enforced, ensuring that all the users’ identities and messages are correctly identified and decoded. Achievability bounds are derived for the case that different users have similar channels, the case that users’ channels can be chosen from a set which has polynomially many elements in the blocklength, and the case with no restriction on the users’ channels. A general converse bound on the capacity region and a converse bound on the maximum growth rate of the number of users are derived. It is shown that reliable transmission with an exponential number of users with an exponential asynchronous exponent with joint error probability is possible at strictly positive rates.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Wenjie, Chai Kiat Yeo, and Yifan Li. "A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary Users." IEEE Transactions on Mobile Computing 12, no. 4 (April 2013): 621–32. http://dx.doi.org/10.1109/tmc.2012.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Febrianto, Teddy, Jiancao Hou, and Mohammad Shikh-Bahaei. "Cooperative Full-Duplex Physical and MAC Layer Design in Asynchronous Cognitive Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/8491920.

Full text
Abstract:
In asynchronous cognitive networks (CNs), where there is no synchronization between primary users (PUs) and secondary users (SUs), spectrum sensing becomes a challenging task. By combining cooperative spectrum sensing and full-duplex (FD) communications in asynchronous CNs, this paper demonstrates improvements in terms of the average throughput of both PUs and SUs for particular transmission schemes. The average throughputs are derived for SUs and PUs under different FD schemes, levels of residual self-interference, and number of cooperative SUs. In particular, we consider two types of FD schemes, namely, FD transmit-sense-reception (FDr) and FD transmit-sense (FDs). FDr allows SUs to transmit and receive data simultaneously, whereas, in FDs, the SUs continuously sense the channel during the transmission time. This paper shows the respective trade-offs and obtains the optimal scheme based on cooperative FD spectrum sensing. In addition, SUs’ average throughput is analyzed under different primary channel utilization and multichannel sensing schemes. Finally, new FD MAC protocol design is proposed and analyzed for FD cooperative spectrum sensing. We found optimum parameters for our proposed MAC protocol to achieve higher average throughput in certain applications.
APA, Harvard, Vancouver, ISO, and other styles
46

More, Kiran P., and Rajendrakumar A. Patil. "Transmission State Prediction from MAC in Cognitive Radio via Optimized Deep Learning Architecture." International Journal of Pattern Recognition and Artificial Intelligence 35, no. 09 (May 29, 2021): 2152012. http://dx.doi.org/10.1142/s0218001421520121.

Full text
Abstract:
Cognitive Radio (CR) is the hottest network paradigm, which permits the Secondary Users (SUs) like wireless devices/users for intelligent accessing of unallocated radio spectrum. Such accessing happens by enabling interference-free transmission of Primary Users (PUs), who are allotted with some deserved radio spectrum portions. This radio communication paradigm has effective usage in vehicular networks, where communication should be established from vehicles to static stations (vehicle-to-infrastructure) or within vehicles (vehicle-to-vehicle), without allotting dedicated frequencies. Nevertheless, the major issue in designing CR is that it must be built to aid in efficient transmitting and sensing of data through the available radio spectrum channels. This paper proposes a Model Predictive Control (MPC)-based prediction model, via a Deep Learning approach. Here, a Deep Belief Network (DBN) allows in predicting the PU transmission state as idle or busy. Moreover, this paper comes out with a new optimization concept that achieves more accurate and precise prediction. The weight of DBN is optimally selected to pave way for effective performance. Further, a new hybrid algorithm named as Cuckoo Search-Grasshopper Optimization Algorithm (CS-GOA) is proposed. The performance of the proposed model is compared over the other conventional models, in terms of channel utilization and back off, and proved for supremacy. The throughput of the proposed model, even at 50 SUs is better, when compared to other methods. CS-GOA achieved better channel utilization and backoff rate, as compared to ProMAC and NN, when the numbers of SUs and PUs in the architecture are varied with time.
APA, Harvard, Vancouver, ISO, and other styles
47

Latil, Céline. "Challenges in using moving images at the MAC/VAL, Vitry-sur-Seine." Art Libraries Journal 34, no. 3 (2009): 11–15. http://dx.doi.org/10.1017/s0307472200015959.

Full text
Abstract:
This article describes the documentation centre at the contemporary art museum MAC/VAL in Vitry-sur-Seine in the Val-de-Marne, outside Paris, and in particular its audiovisual collections. It outlines the problems that have to be faced when seeking to make this material – documentaries and artists’ videos, whether purchased or produced in-house, even the museum’s audiovisual archives – available to the centre’s users.
APA, Harvard, Vancouver, ISO, and other styles
48

Gao, Zi Long, Lian Fen Huang, Jing Wang, and Yan Yao. "Available Data Packet Size Policy for Unsolicited Grant Service in the Power Saving Multi-Channel MAC Protocol." Advanced Materials Research 204-210 (February 2011): 733–38. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.733.

Full text
Abstract:
With Multi-channel MAC protocols, transmission pairs can send data packet simultaneously. Hence, higher network throughput can be achieved. The developing of 802.11s standard provides the power saving model multi-channel MAC protocol (PSM-MMAC) framework, which divides into negotiation phase and data phase. All the users select appropriate channels to transmit data in dedicated channel during negotiation phase, then the users will switch the transceivers to the selected channel to transfer data packet by RTS/CTS handshake. While taking the size of data window constraints, therefore how to design the data packet size is the key issue of PSM-MMAC in saturation network case. In this paper, we propose a new policy that can adjust the size of data packet based on the channel occupancy and the fairness of user access for unsolicited Grand Service, which has strict requirements on the delay jitter and maximum reserved traffic rate. We also develop the probabilistic statistical analysis model to compare the performance of previous policy and our proposed policy. Simulation results verify our analysis model, and show our policy has the superior performance of the PSM-MMAC to the previous scheme.
APA, Harvard, Vancouver, ISO, and other styles
49

Lestari, Ayu Indah, and Hartosujono Hartosujono. "HUBUNGAN KONTROL DIRI DENGAN PERILAKU CYBERSEX REMAJA PADA PENGGUNA WARUNG INTERNET DI GLAGAH SARI YOGYAKARTA." JURNAL SPIRITS 4, no. 2 (April 25, 2017): 65. http://dx.doi.org/10.30738/spirits.v4i2.1116.

Full text
Abstract:
ABSTRACT The purpose of this study is finding the relationship between self-control with teen cybersex behaviors on the user's internet cafe. The hypothesis of is there is a negative relationship between self-control with teen cybersex behaviors on the user's internet cafe. The subjects were users of internet cafes (cafe) in Glagah Sari Yogyakarta, aged 12-23 years, male sex and women, as well as the use of internet services in internet cafes (cafe), amounting to 80 people. Measuring instruments used are teen cybersex behavior scale and the scale of self-control. Analysis of data using techniques Karl Pearson Product Moment Correlation with the help of the statistical program SPSS version 20 for Mac. Based on the correlation of test results obtained by the correlation between the maturity value and the emotional tendencies cybersex behavior of - .229 with p = 0.005 (p<0.05). This suggests that the hypothesis that there is a negative relationship between self-control teen cybersex behavior is acceptable. This means that the higher the self-control the behavior of the lower cybersex. Conversely the lower the higher the self-control teen cybersex behavior.Key words: Cybersex, self-control, internet users
APA, Harvard, Vancouver, ISO, and other styles
50

Martin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, and Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.

Full text
Abstract:
Abstract We investigate Apple’s Bluetooth Low Energy (BLE) Continuity protocol, designed to support interoperability and communication between iOS and macOS devices, and show that the price for this seamless experience is leakage of identifying information and behavioral data to passive adversaries. First, we reverse engineer numerous Continuity protocol message types and identify data fields that are transmitted unencrypted. We show that Continuity messages are broadcast over BLE in response to actions such as locking and unlocking a device’s screen, copying and pasting information, making and accepting phone calls, and tapping the screen while it is unlocked. Laboratory experiments reveal a significant flaw in the most recent versions of macOS that defeats BLE Media Access Control (MAC) address randomization entirely by causing the public MAC address to be broadcast. We demonstrate that the format and content of Continuity messages can be used to fingerprint the type and Operating System (OS) version of a device, as well as behaviorally profile users. Finally, we show that predictable sequence numbers in these frames can allow an adversary to track Apple devices across space and time, defeating existing anti-tracking techniques such as MAC address randomization.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography