نتایج جستجو برای: mac method
تعداد نتایج: 1654775 فیلتر نتایج به سال:
7% paper presenh a new model correlation technique based on an iteration of the MAC meficient. The validation of II complex model such IIS rl complete rotating machine cm be very di#icult. It depends upon cmwct loadiwtion of modelling errors which few existing cow&ion methods hmv succeeded. ‘Ibe MAC value has been used in model correlation, but it is not suficiient to locate errors. A subsequen...
The long propagation delay in an underwater acoustic channel makes designing an underwater media access control (MAC) protocol more challenging. In particular, handshaking-based MAC protocols widely used in terrestrial radio channels have been known to be inappropriate in underwater acoustic channels, because of the inordinately large latency involved in exchanging control packets. Furthermore,...
A piece of user equipment (UE), typically, has access to multiple radio technologies (RATS). Moreover, apart from the standard primary cellular network, secondary networks can assist network in downlink UE communications. In this way, data reach through entities. This paper exploits entities’ idea by proposing a cross-layer scheme that combines improve block error rate (BLER) and throughput. Fo...
Given the worldwide industry progress in the construction of massive concrete structures, it would be a good idea to use concrete gravity base structures (GBS).In this regard, better understanding of thesestructuresregardingtheiradvantages and disadvantages in offshore areas seems necessary.The present study employed MacCammy-Fuchs method, which is based on the size of the structure to the wave...
Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are n...
Allocation or scheduling of resources among various entities contending for their access is one of the fundamental problem in engineering and operations research. To design a large, scalable networked systems, scheduling algorithms are required to be computationally very simple and distributed (or message passing). In this thesis, we present a novel method to design performance optimal, simple ...
Efficient MAC protocol has been paramount importance for improving the performance of WSN. In this paper, Boarder Node Medium Access Control (BN-MAC) mobility aware hybrid protocol is introduced for WSN. BNMAC controls overhearing, idle listening and congestion problem to save energy. BN-MAC mechanism is based on novel semi synchronous low duty cycle that takes less time for accessing channel a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید