نتایج جستجو برای: packet modification
تعداد نتایج: 169396 فیلتر نتایج به سال:
Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem. Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...
This paper assumes each user has more than one queue, derives a new packet-dependant proportional fairness power allocation pattern based on the sum of weight capacity and the packet’s priority in users’ queues, and proposes 4 new cross-layer packet-dependant OFDM scheduling schemes based on proportional fairness for heterogeneous classes of traffic. Scenario 1, scenario 2 and scenario 3 lead r...
This paper invested a bilateral waveform similarity overlap-and-add algorithm for voice packet lost. Since Packet lost will cause the semantic misunderstanding, it has become one of the most essential problems in speech communication. This investment is based on waveform similarity measure using overlap-and-Add algorithm and provides the bilateral information to enhance the speech signal recons...
In wireless sensor networks the Packet Droppers and Modifiers are common attacks. It is very difficult to identify such attacks and this attack interrupts the communication in wireless multi hop sensor networks. In this we can identify the Packet Droppers and Packet Modifiers using ranking algorithms and packet marks. The Performance is represented using detection rate and false positive probab...
The IEEE 802.15.4 standard for wireless sensor networks (WSNs) can support energy efficient, reliable, and timely packet transmission by tuning the medium access control (MAC) parameters macMinBE;macMaxCSMABackoffs, and macMaxFrameRetries. Such a tuning is difficult, because simple and accurate models of the influence of these parameters on the probability of successful packet transmission, pac...
In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of pack...
today, one of the new technologies in the modern era is vehicular ad-hoc network which has takenenormous attention in the recent years. because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called v2v orvehicle to vehicle communication and vehicle to roadside infrastructure, called v2i. designin...
In this paper, we propose a real-time method for duration modification of speech for packet based communication system. While there is rich literature available on duration modification, it fails to clearly address the issues in real-time implementation of the same. Most of the duration modification methods rely on accurate estimation of pitch marks, which is not feasible in a real-time scenari...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید