نتایج جستجو برای: mac protocols
تعداد نتایج: 126544 فیلتر نتایج به سال:
Energy eeciency is an important issue in mobile wireless networks since the battery life of mobile terminals is limited. Conservation of battery power has been addressed using many techniquessuch as variable speed CPUs, ash memory, disk spindowns, and so on. We believe that energy conservation should be an important factor in the design of networking protocols for mobile wireless networks. In p...
Ad hoc networks consist of a group of wireless nodes that dynamically form a multihop network via shared communication channels. For each node, channel access is managed by a media access control (MAC) protocol. MAC protocols can be classified into three broad categories: contention, allocation, and hybrid protocols that combine the contention and allocation access schemes. ADAPT is a hybrid pr...
Wireless sensor networks (WSN) are very popular area of interest both in academic studies and industrial applications since they can work individually without additional maintenance and can be deployed in diverse applications. However, the limited source of the nodes cannot guarantee a sufficient level of security and also complicates the design and the implementation of the algorithms/protocol...
Wireless sensor networks (WSNs) have become relatively common in recent years with application scenarios ranging from low-traffic soil condition sensing to high-traffic video surveillance networks. Each of these applications has its own specific structure, goals, and requirements. Medium access control (MAC) protocols play a significant role in WSNs and should be tuned to the particular applica...
Wireless body area networks (WBANs) are expected to play a significant role in smart healthcare systems. One of the most important attributes of WBANs is to increase network lifetime by introducing novel and low-power techniques on the energy-constrained sensor nodes. Medium access control (MAC) protocols play a significant role in determining the energy consumption in WBANs. Existing MAC proto...
This paper investigates the use of deep reinforcement learning (DRL) in the design of a “universal” MAC protocol referred to as Deep-reinforcement Learning Multiple Access (DLMA). The design framework is partially inspired by the vision of DARPA SC2, a 3-year competition whereby competitors are to come up with a clean-slate design that “best share spectrum with any network(s), in any environmen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید