SEARCH

Found 1996 related files. Current in page 1

pengertian wireless broadband dalam bahasa indonesia

Warnings about equipment online purchase scam

Online scams turn out to be more widespread in Jakarta, Indonesia and worldwide with the holidays and gift-buying season in full force. Authorities are notifying nations to an alert concerning fraudulent online postings.

Westward Group climate change   El Nino forhold

El Ninos, som er forarsaket av periodisk oppvarming av Stillehavet, oppstar hver to til sju ar og er knyttet til varmere-enn-gjennomsnittlig ar. Siden siste El Nino, Stillehavet har enten blitt i sin kjoler tilstand, kalt La Nina, eller noytral. Hendelsen kan fa mildere vintre til den nordlige USA samt torrere forhold til deler av Australia, Indonesia og nordostlige Brasil.

Preserving Equipment Safe1
by willh00p3r 0 Comments favorite 24 Viewed Download 0 Times

Equipment theft is an expensive matter to fleet managers, who not simply lose beneficial tools, then again pay the price of business interruption as well. This is proven by numerous consumer fraud review. This is becoming a rising trouble for fleets, including those in the construction industry in Jakarta Indonesia and worldwide.

Bell mobility careers
by LorenaBrady 0 Comments favorite 17 Viewed Download 0 Times

Cellcom website - is a licensed Bell distributor based in Montreal, Canada who specializes in the newest mobile phones, online and Telly technological innovation. The corporation began in 1985 and along both organization and customer. Making an investment in the wireless network industry has become main fascination of Cellcom.ca after its starting, and has now carried on to promote the firm to increase and expand.

State owned Telkom Indonesia to lead

JAKARTA: State-owned telecom firm PT Telekomunikasi Indonesia Tbk will take the lead in a $24 billion drive to expand Indonesia's broadband capacity over the next five years, the communication and information minister said.

Identifying Buyer Fraud
by aloisanapolitani 0 Comments favorite 14 Viewed Download 0 Times

Staging an accident is a type of fraud for example, when travelling in Jakarta, Indonesia and you made up a fake accident claim an insurance is a scam. Fabricating medical history is one of the most usual type of insurance fraud next is the above example. By excluding information like a smoking addiction or a pre-existing illness, the buyer wishes to contract the insurance policy for cut-rate compare to he would have otherwise pay.

Tags: Business,
Highly Improved Handoff Performance in MIMOEnabled CBTC System

Communication-Based Train Control (CBTC) system is an automated train control system to ensure the safe operation of rail vehicles using data communication. Bidirectional wireless train–ground communications is used to transfer control data between trains and wayside equipment. Wireless local area network (WLAN) based CBTC has impact on train control performance while taking handoff decisions. This may leads to communication interrupt and long latency. Inorder to minimize the handoff latency and to improve the performance, a handoff scheme in CBTC system based on WLANs with multiple-input-multiple-output is proposed.

Review on Cluster-head Election Mechanisms for  Clustering Based Routing in Mobile Ad-hoc Network

Wireless Ad hoc network is a set of wireless devices which move randomly and communicate with other node via radio signal. Ad-hoc networks may be logically represented as a set of clusters by grouping together nodes on the basis of different criteria such as 1-hop and k-hop that are in close boundary with one another. Clusters are formed by diffusing node identities along the wireless links. Different heuristics employ different policies to elect cluster heads. Several of these policies are biased in favour of some nodes. As a result, these nodes should greater responsibility and may deplete their energy faster, causing them to drop out of the network. Therefore, there is a need for load-balancing among cluster-heads to allow all nodes the opportunity to serve as a cluster-head. In this paper, different cluster head election mechanism are discussed in the one hop clustering approach.

Improving the Performance of Energy Attack Detection  in Wireless Sensor Networks by Secure forward

Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack the node only by sending protocol-compliant messages.

Performance Evaluation of Zigbee and Wimax

The world of wireless communications is quickly progressing. Technologies under research and development promise to deliver more services to more users in less time. Emerging wireless technologies: Wireless Local Area Networks (WiFi-802.11n), Wireless Personal Area Networks (ZigBee) and Wireless Metropolitan Area Networks (WiMAX).. In this paper physical layer parameters are tuned to study the characteristics of ZigBee and WiMAX technologies independently and proposes a study and comparison of two of most advancing communication technologies (Zigbee and WiMax). Both of these technologies are breakthrough in communication and both of them have their own positive and negative points. In some situations, in a near future highly advanced and area specific application of WSN will be required. We will analyze these two technologies, which would be appropriate for those applications & analyse weather, location and terrain conditions are capable for the communication

« previous  123456789