RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode
نویسندگان
چکیده
منابع مشابه
Multi-hop Wireless Relay Using Bluetooth Specification
This thesis presents BlueRelay, a novel protocol that extends the Bluetooth specification to support multi-hop wireless communication. Bluetooth is a wireless communication protocol originally designed for point-to-point communication within a small network called a piconet, where a master has centralized coordination over slave devices. The purpose of BlueRelay is to enable inter-piconet commu...
متن کاملConsensus Seeking Using Multi-Hop Relay Protocol
We consider the problem of average consensus seeking in networked multi-agent systems. Based on local information and a simple distributed algorithm, states of all agents automatically converge to the average value of the initial conditions, where the convergence speed is determined by the algebraic connectivity of the underlying communication network. In order to achieve an average consensus q...
متن کاملCapacity Analysis for Multi-hop WiMAX Relay
Wireless relay has been proposed as the solution to extend the coverage of a single base station. In this paper, capacity degradation due to multi-hop relay has been analyzed in a WiMAX relay system. It has been shown that the achievable user access capacity decreases dramatically with the increase of hop number. Moreover, using higher-level modulation or higher turbo-coding rate can significan...
متن کاملDual Hop Relay with Cooperative Diversity and Relay Selection
As wireless communication becomes more prevalent, the demand for higher data rates and uninterrupted connectivity is increasing. Future wireless systems are provisioned to be highly heterogeneous and interconnected. On one side, wireless ad hoc networks are emerging for a wide range of new applications, on the other side; infrastructure based broadband wireless systems are expanding to provide ...
متن کاملA Two-Hop Multi-Relay Secure Transmission with Improved Suboptimal Relay Selection Scheme
—This work studies the use of relay selection in reducing the capability of a hidden eavesdropper to intercept the confidential message transmitted between information source and legitimate receiver. Specifically, an improved version of the suboptimal selection with jamming scheme (SSJ) is proposed. To achieve a secure transmission system, we propose the choice of best relay node that will for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Networking and Computing
سال: 2014
ISSN: 2185-2839,2185-2847
DOI: 10.15803/ijnc.4.2_355