A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On modeling JANUS packet errors over a shallow water acoustic channel using Markov and hidden Markov models
2010
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
In this paper, we investigate how to represent the packet error process in a shallow water acoustic channel by means of Markov as well as hidden Markov models. ...
In particular, signal-to-noise ratio (SNR) time series show significant transitions of the average SNR on a large time scale, which motivates the use of hidden Markov models. ...
We considered Markov models with memory of both one and two past events, and a hidden Markov model (HMM), and compared them to data traces and a simpler iid error model. ...
doi:10.1109/milcom.2010.5680327
fatcat:lnpqpdxpnvhonf7f5qkgj67wei
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
2009
2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium
This performance degrades further for multi-hop scenarios due to the presence of hidden nodes. ...
In order to improve the system's scalability and reliability, we propose a Time-Synchronized Applicationlevel MAC protocol (TSAM) capable of operating on top of existing 802.11 protocols using commodity ...
Bianchi [5] was among the first to develop an analytical model for the behavior of 802.11 DCF. He used Markov processes to analyze the saturation throughput of IEEE 802.11 DCF. Jun et al. ...
doi:10.1109/rtas.2009.38
dblp:conf/rtas/KandhaluRRHY09
fatcat:jy4emgqn5ffanjq5dhnppk6sii
A Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked Control
[article]
2018
arXiv
pre-print
We obtain a sufficient condition for the stability of the networked control system by utilizing our probabilistic approach. ...
The control problem of a linear discrete-time dynamical system over a multi-hop network is explored. ...
We
also note that hidden Markov models naturally arise in the description of multi-hop
networks. For instance, l(·) may be the failure indicator of a path with multiple
links. ...
arXiv:1711.06855v3
fatcat:kraef7mnfvhfbj5heg4hlray3q
A survey on MAC protocols for complex self-organizing cognitive radio networks
2016
Complex Adaptive Systems Modeling
Funding This research is not funded by any national or international organization and none of the authors received any monetary support from any private or government organization for conducting this research ...
These intervals help achieve a shorter synchronization time, and nodes within one collision domain agree on a close-enough time point for transmission. ...
Using the Markov Chain Model, the authors have considered the ON-OFF alternating renewal process of PUs accessing the spectrum. ...
doi:10.1186/s40294-016-0030-y
fatcat:t3gphlrgv5csdebvvp57icq55e
RoombaNet - Testbed for Mobile Networks
2011
Electronic Communications of the EASST
The work here presents an approach for a fully automated real-world mobile network testbed where nodes are piggybacked on mobile robots. ...
In the past the research community based their decisions on development of new protocols on simulations exclusively. ...
ECEASST
Gaussian-Markov-Model (GM) The Gaussian-Markov-Model has been introduced for the evaluation of prognosis-algorithm for the position of any subscriber in mobile radio network [LH99] . ...
doi:10.14279/tuj.eceasst.37.464
dblp:journals/eceasst/HailPTDPH11
fatcat:hzufi3lsy5hlva74qfrwd7pvvu
Hidden Markov Model-Based Smart Annotation for Benchmark Cyclic Activity Recognition Database Using Wearables
2019
Sensors
The pipeline consists of three smart annotation approaches, namely edge detection of the pressure data, local cyclicity estimation, and iteratively trained hierarchical hidden Markov models. ...
We believe that this dataset and smart annotation pipeline are a good basis for creating a benchmark dataset for validation of other semi- and unsupervised algorithms. ...
We used the data from the 20 labeled subjects to train a hierarchical hidden Markov model (hHMM). This model we used to predict the next 10 subjects. ...
doi:10.3390/s19081820
fatcat:fgx4oszkpzhkhcfxbpbojqh6oi
Evolution of MAC Protocols in the Machine Learning Decade: A Comprehensive Survey
[article]
2023
arXiv
pre-print
MAC protocols play a critical role in defining the performance of wireless communication systems. ...
In this work, we fill this gap by surveying a long line of work in this era. We solidify the impact of machine learning on wireless MAC protocols. ...
This approach includes an unsupervised nonparametric Bayesian Hierarchical Dirichlet Process Hidden Markov Model (HDP-HMM) training method along with efficient HMM recursions for log classification, log ...
arXiv:2302.13876v1
fatcat:hcitdwtao5cbnj2uu57obcjuta
A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks
2011
International Journal of Computer Networks & Communications
To analyze the performance of the proposed cooperative protocol a Markov chain is introduced to model the behavior of the protocol. ...
According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated ...
Figure 8 . 8 Markov model for transmission Figure 9. Markov model for time slot. process over wireless fading channels.
Eqs. (6) and(7), we can get all state probability S i , for i=0,..., 15 . ...
doi:10.5121/ijcnc.2011.3502
fatcat:yhek6s5turat5i6pkv5y65ncue
RaPTEX
2010
ACM transactions on sensor networks
We use a hierarchical approach in the design of the toolbox to facilitate the composition of the network stack. ...
For fast exploration of the tradeoff space at design time, we build an analytical performance estimation model for energy consumption, delay, and throughput. ...
Kwon and Agha [2006] also used a discrete Markov chain with a specialized iLTL analyzer. ...
doi:10.1145/1806895.1806902
fatcat:fij2majnxfgyzauodnkz73vqeq
Network Performance Optimization for Low-Voltage Power Line Communications
2018
Energies
The current state of the game (e.g., the number of competitive stations) for each station is estimated by the hidden Markov model. ...
LVPLC cobweb, wherein the learning-based hybrid time-division-multiple-access (TDMA)/carrier-sense-multiple-access (CSMA) protocol, the asymmetrical network system, is modeled as a discrete Markov decision ...
Probabilities π 0 and π 1 are used in the dynamic game of the hidden Markov prediction model. ...
doi:10.3390/en11051266
fatcat:sey7mwiew5delbqivwp2vdraga
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
2017
Sensors
A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. ...
In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. ...
Synchronized MAC A multi-transceiver protocol is Synchronized MAC (SYN-MAC), [81] , and it works for multi-hop CRN. SYNC-MAC operation does not require the existence of CCC. ...
doi:10.3390/s17092136
pmid:28926952
pmcid:PMC5621038
fatcat:qpoc54mmh5ajna7fl5x2w2hl5u
Evaluating resistance to jamming and casual interception in mobile wireless networks
2012
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '12
We evaluate the vulnerability of a network to jamming and casual interception with two different routing strategies for the Hybrid Wireless Mesh Protocol (HWMP). ...
In this paper we propose a probabilistic formal method, based on a process algebraic approach, targeted at the analysis of connectivity and the evaluation of interference in mobile networks. ...
Specifically, we encoded two protocols used for the routing in MANETs and modelled a simplified scenario with both static a mobile nodes. ...
doi:10.1145/2387238.2387265
dblp:conf/mswim/GallinaRMR12
fatcat:nxata5kwrrhmxlkhkgz6vu4rte
A Real Time Priority Based Scheduler for Low Rate Wireless Sensor Networks
2017
International Journal of Computer Networks & Communications
This paper presents a priority approach for censorious real-time traffic which flows particularly for low data rate wireless sensor and actor network (LR-WSAN). ...
The high priority transient traffic suffers less delay and presents effective packet delivery ratio compared with traditional approaches. ...
ACKNOWLEDGEMENTS The paper authors would like to take an opportunity to thank all reviewers for their valuable time for model discussion and constructive comments. ...
doi:10.5121/ijcnc.2017.9306
fatcat:ylxix27mtbfkpjf4eey6idzofi
Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach
2021
IEEE Access
Numerous academics have identified Markov Decision Systems (MDSs) as one of the most appropriate decision-making techniques for a random dynamic approach to solve this problem. ...
The authors in [18] offered a Markov chainbased approach for studying blockchains, which was used to dissect the consistency of PoW-based systems with an astonishing and precise assertion. ...
doi:10.1109/access.2021.3098933
fatcat:4b3hanssxbctneiz5nuny65j3y
IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation
2018
IEEE Communications Surveys and Tutorials
We believe this work will help to identify the merits of IEEE 802.15.4e and to contribute towards a faster adoption of this technology as a supporting communication infrastructure for future industrial ...
We believe this work will help to identify the merits of IEEE 802.15.4e and to contribute towards a faster adoption of this technology as a supporting communication infrastructure for future industrial ...
ACKNOWLEDGEMENTS This work was partially supported by National Funds through FCT/MEC (Portuguese Foundation for Science and Technology) and co-financed by ERDF (European Regional Development Fund) under ...
doi:10.1109/comst.2018.2800898
fatcat:wjkmtm3xzjczviketwapfk2b5y
« Previous
Showing results 1 — 15 out of 883 results