Results 21 to 30 of about 36,089 (189)

Adaptive Strategy to Change Firing Phases of Collided Nodes in Extended-Desync TDMA-Based MANETs

open access: yesSensors, 2021
As a multi-hop extension of the desynchronization-based TDMA (Desync-TDMA), the extended Desync-TDMA (Ext-Desync) with self-adapting property is proposed to overcome the limitations of existing CSMA/CA and dynamic TDMA-based schemes for Mobile Ad-hoc ...
Cheol-Woong Lee   +2 more
doaj   +1 more source

Modeling, Simulation and Call Performance Analysis of a TDMA- Based Cognitive Radio Network with Different Slot Allocation Strategies

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi
Since the wireless spectrum is limited, the use of licensed channels for secondary purposes is seen as animportant solution to the spectrum scarcity problem.
Sedat Atmaca
doaj   +1 more source

Genotypic Differences in Dry Matter Accumulation, Nitrogen Use Efficiency and Harvest Index in Recombinant Inbred Lines of Rice under Hydroponic Culture

open access: yesPlant Production Science, 2009
To examine the possibility of breeding high-yielding cultivars with high nitrogen use efficiency for dry matter accumulation (NUEd) and to provide simple criteria for the selecting and breeding high-yielding cultivars with high NUEd as well as useful ...
Jing Ju   +6 more
doaj   +1 more source

Self-Organizing TDMA: A Distributed Contention-Resolution MAC Protocol

open access: yesIEEE Access, 2019
This paper presents a self-organizing time division multiple access (SO-TDMA) protocol for contention resolution aiming to support delay-sensitive applications.
Mahsa Derakhshani   +5 more
doaj   +1 more source

Underwater Acoustic Sensor Node Scheduling using an Evolutionary Memetic Algorithm

open access: yesJournal of Telecommunications and Information Technology, 2018
Underwater Acoustic Sensor Networks (UWASNs) play an important role in monitoring the aqueous environment which has created a lot of interest for researchers and scientists.
V. Sivakumar, D. Rekha
doaj   +1 more source

Over-the-Air Computation Strategy Using Space–Time Line Code for Data Collection by Multiple Unmanned Aerial Vehicles

open access: yesIEEE Access, 2021
In this study, we investigated a data collection system for multiple unmanned aerial vehicles (UAVs) in the sky. To reduce the required data collection time for a time-division multiple access (TDMA)-based protocol, an over-the-air computation (OAC ...
Jingon Joung, Jiancun Fan
doaj   +1 more source

Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks

open access: yes, 2018
This paper investigates the use of deep reinforcement learning (DRL) in a MAC protocol for heterogeneous wireless networking referred to as Deep-reinforcement Learning Multiple Access (DLMA). The thrust of this work is partially inspired by the vision of
Liew, Soung Chang   +2 more
core   +1 more source

Trade-off between end-to-end reliable and cost-effective TDMA/WDM passive optical networks [PDF]

open access: yes, 2012
Hybrid TDMA/VVDM (TWDM) Passive Optical Network (PON) is a promising candidate for Next-Generation PON (NG-PON) solutions. We propose end-to end reliable architectures for business users and a cost-effective network for residential users. We evaluate the
Colle, Didier   +4 more
core   +1 more source

EVC-TDMA: An enhanced TDMA based cooperative MAC protocol for vehicular networks [PDF]

open access: yesJournal of Communications and Networks, 2020
In order to optimize the communication mechanism in the vehicular adHoc networks (VANETs), this paper presents an enhanced TDMA based cooperative MAC protocol called EVC-TDMA. In EVC-TDMA, when the vehicles need to transmit multi-hop messages, they choose relay nodes dynamically according to the relative speeds and buffer lengths.
Tianjiao Zhang, Qi Zhu
openaire   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Home - About - Disclaimer - Privacy