Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








883 Hits in 5.2 sec

On modeling JANUS packet errors over a shallow water acoustic channel using Markov and hidden Markov models

Beatrice Tomasi, Paolo Casari, Lorenzo Finesso, Giovanni Zappa, Kim McCoy, Michele Zorzi
2010 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE  
In this paper, we investigate how to represent the packet error process in a shallow water acoustic channel by means of Markov as well as hidden Markov models.  ...  In particular, signal-to-noise ratio (SNR) time series show significant transitions of the average SNR on a large time scale, which motivates the use of hidden Markov models.  ...  We considered Markov models with memory of both one and two past events, and a hidden Markov model (HMM), and compared them to data traces and a simpler iid error model.  ... 
doi:10.1109/milcom.2010.5680327 fatcat:lnpqpdxpnvhonf7f5qkgj67wei

Real-Time Video Surveillance over IEEE 802.11 Mesh Networks

Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar, Chingchun Huang, Chao-Chun Yeh
2009 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium  
This performance degrades further for multi-hop scenarios due to the presence of hidden nodes.  ...  In order to improve the system's scalability and reliability, we propose a Time-Synchronized Applicationlevel MAC protocol (TSAM) capable of operating on top of existing 802.11 protocols using commodity  ...  Bianchi [5] was among the first to develop an analytical model for the behavior of 802.11 DCF. He used Markov processes to analyze the saturation throughput of IEEE 802.11 DCF. Jun et al.  ... 
doi:10.1109/rtas.2009.38 dblp:conf/rtas/KandhaluRRHY09 fatcat:jy4emgqn5ffanjq5dhnppk6sii

A Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked Control [article]

Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa
2018 arXiv   pre-print
We obtain a sufficient condition for the stability of the networked control system by utilizing our probabilistic approach.  ...  The control problem of a linear discrete-time dynamical system over a multi-hop network is explored.  ...  We also note that hidden Markov models naturally arise in the description of multi-hop networks. For instance, l(·) may be the failure indicator of a path with multiple links.  ... 
arXiv:1711.06855v3 fatcat:kraef7mnfvhfbj5heg4hlray3q

A survey on MAC protocols for complex self-organizing cognitive radio networks

Munam Ali Shah, Sijing Zhang, Muhammad Kamran, Qaisar Javaid, Bahjat Fatima
2016 Complex Adaptive Systems Modeling  
Funding This research is not funded by any national or international organization and none of the authors received any monetary support from any private or government organization for conducting this research  ...  These intervals help achieve a shorter synchronization time, and nodes within one collision domain agree on a close-enough time point for transmission.  ...  Using the Markov Chain Model, the authors have considered the ON-OFF alternating renewal process of PUs accessing the spectrum.  ... 
doi:10.1186/s40294-016-0030-y fatcat:t3gphlrgv5csdebvvp57icq55e

RoombaNet - Testbed for Mobile Networks

Mohmaed Ahmed Hail, Jan Pinkowski, Torsten Teubler, Maick Danckwardt, Dennis Pfisterer, Horst Hellbrück
2011 Electronic Communications of the EASST  
The work here presents an approach for a fully automated real-world mobile network testbed where nodes are piggybacked on mobile robots.  ...  In the past the research community based their decisions on development of new protocols on simulations exclusively.  ...  ECEASST Gaussian-Markov-Model (GM) The Gaussian-Markov-Model has been introduced for the evaluation of prognosis-algorithm for the position of any subscriber in mobile radio network [LH99] .  ... 
doi:10.14279/tuj.eceasst.37.464 dblp:journals/eceasst/HailPTDPH11 fatcat:hzufi3lsy5hlva74qfrwd7pvvu

Hidden Markov Model-Based Smart Annotation for Benchmark Cyclic Activity Recognition Database Using Wearables

Christine F. Martindale, Sebastijan Sprager, Bjoern M. Eskofier
2019 Sensors  
The pipeline consists of three smart annotation approaches, namely edge detection of the pressure data, local cyclicity estimation, and iteratively trained hierarchical hidden Markov models.  ...  We believe that this dataset and smart annotation pipeline are a good basis for creating a benchmark dataset for validation of other semi- and unsupervised algorithms.  ...  We used the data from the 20 labeled subjects to train a hierarchical hidden Markov model (hHMM). This model we used to predict the next 10 subjects.  ... 
doi:10.3390/s19081820 fatcat:fgx4oszkpzhkhcfxbpbojqh6oi

Evolution of MAC Protocols in the Machine Learning Decade: A Comprehensive Survey [article]

Mostafa Hussien, Islam A.T.F. Taj-Eddin, Mohammed F. A. Ahmed, Ali Ranjha, Kim Khoa Nguyen, Mohamed Cheriet
2023 arXiv   pre-print
MAC protocols play a critical role in defining the performance of wireless communication systems.  ...  In this work, we fill this gap by surveying a long line of work in this era. We solidify the impact of machine learning on wireless MAC protocols.  ...  This approach includes an unsupervised nonparametric Bayesian Hierarchical Dirichlet Process Hidden Markov Model (HDP-HMM) training method along with efficient HMM recursions for log classification, log  ... 
arXiv:2302.13876v1 fatcat:hcitdwtao5cbnj2uu57obcjuta

A TDMA-Based MAC Protocol Supporting Cooperative Communications in Wireless Mesh Networks

Hongzhi Jiao, Frank Y. Li
2011 International Journal of Computer Networks & Communications  
To analyze the performance of the proposed cooperative protocol a Markov chain is introduced to model the behavior of the protocol.  ...  According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated  ...  Figure 8 . 8 Markov model for transmission Figure 9. Markov model for time slot. process over wireless fading channels. Eqs. (6) and(7), we can get all state probability S i , for i=0,..., 15 .  ... 
doi:10.5121/ijcnc.2011.3502 fatcat:yhek6s5turat5i6pkv5y65ncue

RaPTEX

Jun Bum Lim, Beakcheol Jang, Suyoung Yoon, Mihail L. Sichitiu, Alexander G. Dean
2010 ACM transactions on sensor networks  
We use a hierarchical approach in the design of the toolbox to facilitate the composition of the network stack.  ...  For fast exploration of the tradeoff space at design time, we build an analytical performance estimation model for energy consumption, delay, and throughput.  ...  Kwon and Agha [2006] also used a discrete Markov chain with a specialized iLTL analyzer.  ... 
doi:10.1145/1806895.1806902 fatcat:fij2majnxfgyzauodnkz73vqeq

Network Performance Optimization for Low-Voltage Power Line Communications

Ying Cui, Xiaosheng Liu, Jian Cao, Dianguo Xu
2018 Energies  
The current state of the game (e.g., the number of competitive stations) for each station is estimated by the hidden Markov model.  ...  LVPLC cobweb, wherein the learning-based hybrid time-division-multiple-access (TDMA)/carrier-sense-multiple-access (CSMA) protocol, the asymmetrical network system, is modeled as a discrete Markov decision  ...  Probabilities π 0 and π 1 are used in the dynamic game of the hidden Markov prediction model.  ... 
doi:10.3390/en11051266 fatcat:sey7mwiew5delbqivwp2vdraga

Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

Mahdi Zareei, A. Islam, Sabariah Baharun, Cesar Vargas-Rosales, Leyre Azpilicueta, Nafees Mansoor
2017 Sensors  
A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.  ...  In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol.  ...  Synchronized MAC A multi-transceiver protocol is Synchronized MAC (SYN-MAC), [81] , and it works for multi-hop CRN. SYNC-MAC operation does not require the existence of CCC.  ... 
doi:10.3390/s17092136 pmid:28926952 pmcid:PMC5621038 fatcat:qpoc54mmh5ajna7fl5x2w2hl5u

Evaluating resistance to jamming and casual interception in mobile wireless networks

Lucia Gallina, Gian-Luca Dei Rossi, Andrea Marin, Sabina Rossi
2012 Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '12  
We evaluate the vulnerability of a network to jamming and casual interception with two different routing strategies for the Hybrid Wireless Mesh Protocol (HWMP).  ...  In this paper we propose a probabilistic formal method, based on a process algebraic approach, targeted at the analysis of connectivity and the evaluation of interference in mobile networks.  ...  Specifically, we encoded two protocols used for the routing in MANETs and modelled a simplified scenario with both static a mobile nodes.  ... 
doi:10.1145/2387238.2387265 dblp:conf/mswim/GallinaRMR12 fatcat:nxata5kwrrhmxlkhkgz6vu4rte

A Real Time Priority Based Scheduler for Low Rate Wireless Sensor Networks

Sambhaji Sarode, Jagdish Bakal
2017 International Journal of Computer Networks & Communications  
This paper presents a priority approach for censorious real-time traffic which flows particularly for low data rate wireless sensor and actor network (LR-WSAN).  ...  The high priority transient traffic suffers less delay and presents effective packet delivery ratio compared with traditional approaches.  ...  ACKNOWLEDGEMENTS The paper authors would like to take an opportunity to thank all reviewers for their valuable time for model discussion and constructive comments.  ... 
doi:10.5121/ijcnc.2017.9306 fatcat:ylxix27mtbfkpjf4eey6idzofi

Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach

Saad M. Darwish
2021 IEEE Access  
Numerous academics have identified Markov Decision Systems (MDSs) as one of the most appropriate decision-making techniques for a random dynamic approach to solve this problem.  ...  The authors in [18] offered a Markov chainbased approach for studying blockchains, which was used to dissect the consistency of PoW-based systems with an astonishing and precise assertion.  ... 
doi:10.1109/access.2021.3098933 fatcat:4b3hanssxbctneiz5nuny65j3y

IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation

Harrison Kurunathan, Ricardo Severino, Anis Koubaa, Eduardo Tovar
2018 IEEE Communications Surveys and Tutorials  
We believe this work will help to identify the merits of IEEE 802.15.4e and to contribute towards a faster adoption of this technology as a supporting communication infrastructure for future industrial  ...  We believe this work will help to identify the merits of IEEE 802.15.4e and to contribute towards a faster adoption of this technology as a supporting communication infrastructure for future industrial  ...  ACKNOWLEDGEMENTS This work was partially supported by National Funds through FCT/MEC (Portuguese Foundation for Science and Technology) and co-financed by ERDF (European Regional Development Fund) under  ... 
doi:10.1109/comst.2018.2800898 fatcat:wjkmtm3xzjczviketwapfk2b5y
« Previous Showing results 1 — 15 out of 883 results