نتایج جستجو برای: time slots
تعداد نتایج: 1893979 فیلتر نتایج به سال:
Radio frequency identification (RFID) technology is becoming increasingly attractive because of its high storage capacity and reprogrammability. There is a challenge to be overcome when a reader needs to read a number of tags within the reader’s interrogation zone at the same time. In this paper, we present an anti-collision scheme in a RFID system. The scheme is based on the dynamic framed ALO...
IEEE 802.15.4 protocol is designed for low-rate Wireless Personal Area Networks with very low cost and power consumption. IEEE 802.15.4 provides Guaranteed Time Slots (GTSs) which allow a device to operate on the channel within a portion of the superframe that is dedicated exclusively to that device. The GTSs always appear at the end of the active superframe starting at a slot boundary immediat...
Urban areas are experiencing a substantial increase in parking demand, which creates an imbalance due to the limited availability of facilities. To address this issue, effective management is necessary. Shared alternative solution that utilizes private plots vacant during day serve needs users engaged nearby activities. While current approaches have achieved high utilization rates for available...
To avoid collisions in WiMAX networks, the connections in Subscriber Stations (SSs) use a request–grant process to acquire transmission resources from the Base Station (BS). In accordance with the IEEE 802.16 standard, the request–grant process is accomplished using either a unicast polling method or a contention request method. In WiMAX systems, the number of bandwidth-request (BR) slots per f...
In this paper we analyze a system with a number of users communicate using unlicensed spectrum. The time is divided into frames, which are further divided into slots. In each frame a user has limited energy which is allocated to the slots in the frame. Each user tries to maximize his throughput by selecting the best power allocation. The system is modeled using game theory. First an analysis is...
We investigate the correlation between pitch accents and semantic slots in human-machine speech. Using an automatic pitch accent detector on the ATIS corpus, we find that most words labelled with semantic slots also carry a pitch accent. Most of the pitch accented words that are not associated with a semantic label are still meaningful, pointing towards the speaker’s intention. Our findings sho...
Introduction Linguistic background Like some other countries which were colonized by the British or the French, Israel founded a language academy which is taken seriously by the population. The academy makes strong pronouncements, and even has radio slots to publicize them in prime time. While the radio slots are primarily used to publicize syntactic, lexical or morphological ‘rules’, all the b...
Whenever tasks of an application are scheduled in Heterogeneous Distributed Computing environment, idle slots on processors are efficiently utilized to minimize the overall running time. Since task assignment problem has been proved to be NP-complete problem, many heuristics
A Dynamic MAC protocol is developed for WCDMA wireless multimedia networks. It uses multiple slots per frame allowing multiple users to transmit simultaneously using their own CDMA codes. The proposed MAC protocol is based on contention .If there is low contention users can access any slots and if there is high level contention the owners of the slots have priority to access slots .If the owner...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید