نتایج جستجو برای: hidden node problem
تعداد نتایج: 1081759 فیلتر نتایج به سال:
Desynchronization is a biologically inspired primitive [8] for periodic but temporary exclusive access to a shared resource, like the transmission medium. In this paper, we recapitulate the single-hop desynchronization algorithm DESYNC [5, 2, 6] for Wireless Sensor Networks (WSNs) and identify its lack of handling hidden nodes in multi-hop environments. We explain in detail our decentralized an...
In this paper, we propose an autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting. In ad hoc multicasting, packet collisions due to hidden node problems at upstream nodes cause packet losses at all downstream nodes. Therefore, collision avoidance mechanisms are important to improve packet delivery ratio at destination nodes. In this paper, we extend an On...
The problem of content delivery with a required QoS is currently one of the most important. In ad-hoc networks it is IEEE 802.11 EDCA which tries to face this problem. This paper describes several EDCA line topology configurations with mixed priorities of nodes. Detailed conclusions about the innovative results help to understand the behavior of EDCA in the presence of hidden and exposed nodes....
This work presents computer modeling and simulation of the IEEE 802.11 standard to improve its Quality of Service (QoS) when different wireless stations are allowed for roaming. Request-to-Send and Clear-to-Send (RTS/CTS) frames are added as means to overcome the hidden node problem that could occur in wireless local area networks. The obtained simulation results are presented and discussed, in...
Many communication networks contain nodes which may misbehave, thus incurring a cost to the network operator. We consider the problem of how to manage the nodes when the operator receives a payoff for every moment a node stays within the network, but where each malicious node incurs a hidden cost. The operator only has some statistical information about each node’s type, and never observes the ...
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
Neuro-fuzzy modeling has been intensively studied since the early nineties. Recently a method has been disclosed, that uses a classical feedforward neural network with just one hidden layer. Nodes of the hidden layer use the logistic function as activation function meanwhile the output node has a linear activation function. This paper introduces a generalization of the logistic function and eva...
In this work we present a new approach to crossover operator in the genetic evolution of neural networks. The most widely used evolutionary computation paradigm for neural network evolution is evolutionary programming. This paradigm is usually preferred due to the problems caused by the application of crossover to neural network evolution. However, crossover is the most innovative operator with...
This paper presents a neural network with a novel neuron model. In this model, the neuron has two activation functions and exhibits a node-to-node relationship in the hidden layer. This neural network provides better performance than a traditional feedforward neural network, and fewer hidden nodes are needed. The parameters of the proposed neural network are tuned by a genetic algorithm with ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید