Rate prioritized power adaptation a throughput maximizing power conservation algorithm for IEEE 802 11 WLANs

Báo cáo khoa học: "A Unified Single Scan Algorithm for Japanese Base Phrase Chunking and Dependency Parsing" pdf

Báo cáo khoa học: "A Unified Single Scan Algorithm for Japanese Base Phrase Chunking and Dependency Parsing" pdf

... bunsetsu-based representation in Figure Figure 3: Pseudo code for base phrase chunking and dependency parsing 4.2 Pseudo Code for the Proposed Algorithm The algorithm that we propose is based on ... observation Conclusion and Future Work Table 3: Performance change depending on the context window size We have described a novel algorithm that combines Japanese base p...
Ngày tải lên : 17/03/2014, 02:20
  • 4
  • 287
  • 0
Báo cáo khoa học: "A Semantic-Head-Driven Generation Algorithm for Unification-Based Formalisms" potx

Báo cáo khoa học: "A Semantic-Head-Driven Generation Algorithm for Unification-Based Formalisms" potx

... problem premise that accounts for the profligacy of these approaches w h e n used for generation Thus for generation, we want a traversal order geared to the premise of the generation problem, that ... ends in the generation process Also, the rules are sound for generation but not for analysis, because they not enforce the constraint that every occurrence of a variable in l...
Ngày tải lên : 17/03/2014, 20:20
  • 11
  • 273
  • 0
A novel supervised machine learning algorithm for intrusion detection k Prototype+ID3

A novel supervised machine learning algorithm for intrusion detection k Prototype+ID3

... 1.0, replicates a 3.5 hour attack scenario in which a trainee attacker starts a Distributed Denial of Service (DDOS) attack against a raw adversary The second data set, LLS DDOS 2.0.2, is a two hour ... 0.2 K- Means ID3 K- Means ID3 K- Means+ID3 K- Means+ID3 Fig Performance of K- Means, ID3, K- Means+ID3, and the KPrototype+ID3 over the NAD 1998 test data set Fig Performance o...
Ngày tải lên : 06/06/2014, 20:56
  • 6
  • 337
  • 0
Báo cáo hóa học: " Dynamic tuning of the IEEE 802.11 distributed coordination function to derive a theoretical throughput limit" pot

Báo cáo hóa học: " Dynamic tuning of the IEEE 802.11 distributed coordination function to derive a theoretical throughput limit" pot

... In IEEE 802.11, when a node completes its data transmission, it obtains another Backoff value via the Backoff procedure before it starts another round of data transmission If the Backoff value ... because there are k nodes on average trying to transmit data packets simultaneously, and hence k nodes on average may obtain a Backoff value of The DCW did not take the phenomen...
Ngày tải lên : 20/06/2014, 22:20
  • 12
  • 358
  • 0
Báo cáo hóa học: " A new modified block iterative algorithm for uniformly quasi-j-asymptotically nonexpansive mappings and a system of generalized mixed equilibrium problems" ppt

Báo cáo hóa học: " A new modified block iterative algorithm for uniformly quasi-j-asymptotically nonexpansive mappings and a system of generalized mixed equilibrium problems" ppt

... set of a family of closed and uniformly quasi-j-asymptotically nonexpansive mappings, and the solution set of variational inequalities for an a- inverse strongly monotone mapping in a 2 -uniformly ... from nonexpansive mappings, relatively quasi -nonexpansive mappings or quasi-j -nonexpansive mappings and a finite family of closed relatively quasi -none...
Ngày tải lên : 21/06/2014, 01:20
  • 24
  • 336
  • 0
Báo cáo hóa học: " Research Article Design and Implementation of a Lightweight Security Model to Prevent IEEE 802.11 Wireless DoS Attacks" pdf

Báo cáo hóa học: " Research Article Design and Implementation of a Lightweight Security Model to Prevent IEEE 802.11 Wireless DoS Attacks" pdf

... IEEE 802.11 standard, except for the unicast data and management frames that are transmitted in the normal data rates, the other frames including multicast, broadcast, and control frames are transmitted ... ability to prevent both wireless DoS attacks and synchronization attacks as the following scenarios 5.3.1 DoS Attacks The details of the strategy to conduct variety...
Ngày tải lên : 21/06/2014, 05:20
  • 16
  • 648
  • 1
Báo cáo hóa học: " Research Article Impact of LQI-Based Routing Metrics on the Performance of a One-to-One Routing Protocol for IEEE 802.15.4 Multihop Networks" docx

Báo cáo hóa học: " Research Article Impact of LQI-Based Routing Metrics on the Performance of a One-to-One Routing Protocol for IEEE 802.15.4 Multihop Networks" docx

... enable the calculation of the cost of a path, based on the LQI values of all links Therefore, we chose to evaluate the performance of these LQI-based routing metrics for NST-AODV Note that the PATH-DR ... data transmission rate for each node to allow for a link quality estimation [5] 4.5 MultiHopLQI One of the first attempts at a link quality estimat...
Ngày tải lên : 21/06/2014, 11:20
  • 20
  • 397
  • 0
Báo cáo hóa học: " Research Article A Fast Network Configuration Algorithm for TDMA Wireless Sensor Networks" pot

Báo cáo hóa học: " Research Article A Fast Network Configuration Algorithm for TDMA Wireless Sensor Networks" pot

... before issuing a DSC packet Once again, it Table 1: Relevant simulation parameters CSMA/CA Parameter macMinBE macMaxBE MaxCSMABackoffs AckWaitDuration macMaxFrameRetries Value ms PHY layer and ... resolution algorithm, namely, simplicity and fairness We took the configuration phase of SAMAC (a TDMA- based synchronous MAC protocol) as a case study and carried out a performance evaluat...
Ngày tải lên : 21/06/2014, 11:20
  • 10
  • 520
  • 0
báo cáo hóa học:" Research Article Design and Implementation of a Testbed for IEEE 802.15.4 (Zigbee) Performance Measurements" doc

báo cáo hóa học:" Research Article Design and Implementation of a Testbed for IEEE 802.15.4 (Zigbee) Performance Measurements" doc

... for that particular packet All of these packets are picked up by BaseStation.java listening on the USB port and it saves each consecutive packet in a file for future analysis A new file is created ... created for each trial A second Java program (Analyze.java) was developed to analyze the saved files containing the received packets Since the transmitted data is known, this progra...
Ngày tải lên : 21/06/2014, 18:20
  • 11
  • 521
  • 0
Báo cáo hóa học: " Research Article Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks" pptx

Báo cáo hóa học: " Research Article Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks" pptx

... the number of active STA in receiving On the other hand, inferring the number of active STA involved in transmitting uplink frame to AP differs from that in receiving downlink frame because the STA ... STA as in [14] The number of active STA involved in receiving downlink frame from AP can be easily inferred by counting the receiver address field in downlink data frames EURASIP Jou...
Ngày tải lên : 21/06/2014, 23:20
  • 15
  • 303
  • 0
Báo cáo hóa học: " Research Article A Simplified Constant Modulus Algorithm for Blind Recovery of MIMO QAM and PSK Signals: A Criterion with Convergence Analysis" ppt

Báo cáo hóa học: " Research Article A Simplified Constant Modulus Algorithm for Blind Recovery of MIMO QAM and PSK Signals: A Criterion with Convergence Analysis" ppt

... to CMA The major advantage of SCMA is its low complexity compared to that of CMA and MMA Because, instead of using both real and imaginary parts as in CMA and MMA, only one dimension, the real ... 3E a2 R −E a4 R (13) = −κaR > 0, and κaR = E [a4 ] − 3E2 [a2 ] represents the kurtosis of the real R R parts of the symbols It is always negative in the case of PSK and QA...
Ngày tải lên : 22/06/2014, 06:20
  • 13
  • 444
  • 0
Báo cáo hóa học: " CSMA/CCA: A Modified CSMA/CA Protocol Mitigating the Fairness Problem for IEEE 802.11 DCF" docx

Báo cáo hóa học: " CSMA/CCA: A Modified CSMA/CA Protocol Mitigating the Fairness Problem for IEEE 802.11 DCF" docx

... example, the CSMA/CCA allowing for leakage yields worse fairness performance than the other two CSMA/CCA protocols The reason is that in the CSMA/CCA with leakage, after a successful data frame ... another data frame With the CSMA/CA protocol in use, the DCF provides both a DATA-ACK two-way handshaking basic access mechanism and an RTS-CTS-DATA-ACK four-way handshaking...
Ngày tải lên : 22/06/2014, 22:20
  • 12
  • 302
  • 0
a contrast pattern based clustering algorithm for categorical data

a contrast pattern based clustering algorithm for categorical data

... State University, 2010 A Contrast Pattern based Clustering Algorithm for Categorical Data The data clustering problem has received much attention in the data mining, machine learning, and pattern ... SPECT HEART DATASET The SPECT Heart dataset is an example of image data that has been preprocessed into categorical attributes (the preprocessed data is available...
Rate prioritized power adaptation a throughput maximizing power conservation algorithm for IEEE 802 11 WLANs

Rate prioritized power adaptation a throughput maximizing power conservation algorithm for IEEE 802 11 WLANs

... Rate/ Power Adaptation 1.1.2 Fundamentals of Rate and Power Adaptation This section explains the effect of rate and power adaptation algorithms on the bandwidth utilization and power conservation ... data rate update interval, analyze and evaluate the performance of two joint rate/ power adaptation algorithms in a fading environment: optimal spreading factor -pow...
Ngày tải lên : 16/10/2015, 15:35
  • 79
  • 183
  • 0
Từ khóa: