point configuration
Recently Published Documents


TOTAL DOCUMENTS

80
(FIVE YEARS 10)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Mario M. Vargas ◽  
Stephen T. McClain ◽  
Emilio J. Borges ◽  
Andy P. Broeren

Author(s):  
Hakan Guler ◽  
Bill Jackson ◽  
Anthony Nixon

Abstract A linearly constrained framework in $\mathbb{R}^d$ is a point configuration together with a system of constraints that fixes the distances between some pairs of points and additionally restricts some of the points to lie in given affine subspaces. It is globally rigid if the configuration is uniquely defined by the constraint system. We show that a generic linearly constrained framework in $\mathbb{R}^2$ is globally rigid if and only if it is redundantly rigid and “balanced”. For unbalanced generic frameworks, we determine the precise number of solutions to the constraint system whenever the rigidity matroid of the framework is connected. We obtain a stress matrix sufficient condition and a Hendrickson type necessary condition for a generic linearly constrained framework to be globally rigid in $\mathbb{R}^d$.


2019 ◽  
Vol 2 (1) ◽  
pp. 155-164
Author(s):  
Ichsan Wiratama ◽  
Putu Sugiartawan

The access point configuration used for wireless connections in Amikom is manually configured one by one. Each access point is configured using several SSIDs based on the department that will connect to the access point. The use of multiple SSIDs in one access point turned out to have a bad effect on network performance, from the test results, for access points configured with more than four SSIDs, the connection was very slow. The security standard used for connection from the user to the access point is WPA Personal, where WPA Personal can be said to be very weak because for each SSID it will use the same user and password for all users, this is often the cause of access leaks. To improve network security and make it easier for the author to do maintenance on the network, the author tries to use the IEEE 802.1X protocol that is connected with RADIUS and access point controllers so that the configuration and maintenance of wireless networks can be centralized, user administration and passwords can also be centralized server radius and also a better level of security using WPA Enterprise security in the IEEE 802.1X protocol.


Sign in / Sign up

Export Citation Format

Share Document