Login / Signup

Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes.

Sumudu WijetungeUpul GunawardanaRanjith Liyanapathirana
Published in: ISCIT (2011)
Keyphrases
  • mac protocol
  • comprehensive analysis
  • medium access control
  • pattern classification
  • hidden nodes
  • neural network
  • energy consumption