• Nenhum resultado encontrado

[PDF] Top 20 An Efficient Collision Detection Scheme for Generation-2 RFID Systems

Has 10000 "An Efficient Collision Detection Scheme for Generation-2 RFID Systems" found on our website. Below are the top 20 most common "An Efficient Collision Detection Scheme for Generation-2 RFID Systems".

An Efficient Collision Detection Scheme for Generation-2 RFID Systems

An Efficient Collision Detection Scheme for Generation-2 RFID Systems

... a collision by analyzing the radar cross-section (RCS) state in the tag signal ...enables detection of up to 4 collided tags, however, requires support of professional tools, like the NI-PXI hardware for ... See full document

11

ANALYSIS OF BIT GROUPING ALGORITHM FOR COLLISION RESOLUTION IN PASSIVE RFID TAGS

ANALYSIS OF BIT GROUPING ALGORITHM FOR COLLISION RESOLUTION IN PASSIVE RFID TAGS

... (RFID) systems consist of radio frequency (RF) tags and networked electromagnetic ...more efficient when RFID systems are ...all RFID systems is the collision of ... See full document

13

An Efficient Architecture in Next Generation Wireless Networks

An Efficient Architecture in Next Generation Wireless Networks

... wireless systems, ...4G systems will lead to an enormous increase in both the number of mobile subscribers and mobile ...wireless systems can be highlighted as quality of service (QoS) ... See full document

7

Avaliação de um ELISA para detecção de anticorpos contra Babesia bigemina em bovinos e sua aplicação em um inquérito sorológico no Brasil.

Avaliação de um ELISA para detecção de anticorpos contra Babesia bigemina em bovinos e sua aplicação em um inquérito sorológico no Brasil.

... The preparation of the indirect fluorescet antibody test (IFAT) antigen, as well as the test procedure, were described elsewhere (Madruga et al. 1986). Briefly, blood from splenectomized calves with 5.0% B. bigemina ... See full document

5

An Efficient Bayesian Nearest Neighbor Search Using Marginal Object Weight Ranking Scheme in Spatial Databases

An Efficient Bayesian Nearest Neighbor Search Using Marginal Object Weight Ranking Scheme in Spatial Databases

... In this study, we efficiently performed the NN search in spatial database from distributed server by professionally introducing the proposed BNN search using MOW ranking scheme. The proposed BNN search rank the ... See full document

6

Lightweight Intrusion Detection Scheme for Wireless Sensor Networks

Lightweight Intrusion Detection Scheme for Wireless Sensor Networks

... Intrusion detection and response systems should be both distributed and cooperative for the needs of sensor ...our scheme, IDS agent is located in every sensor ...has an intrusion module ... See full document

8

An Optimization Scheme for Energy Efficient Ad-hoc Wireless Networks Operating in Error-prone Channel Conditions

An Optimization Scheme for Energy Efficient Ad-hoc Wireless Networks Operating in Error-prone Channel Conditions

... In the IEEE 802.11 standards [1], the Distributed Coordination Function (DCF) based on CSMA/CA with binary slotted exponential backoff, is the fundamental access method used to support asynchronous data transfer. ... See full document

5

ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

... In S-MAC protocol, sensor node first sends SYNC packet to form virtual clustering and CTS/RTS/ACK technique for contention for the medium, and subsequently makes communication with the right user. If a sender occupies ... See full document

6

The immobilized NaHSO4·H2O on activated charcoal: a highly efficient promoter system for N-formylation of amines with ethyl formate

The immobilized NaHSO4·H2O on activated charcoal: a highly efficient promoter system for N-formylation of amines with ethyl formate

... of 2- and 4-aminophenols, O-formylation of phenolic substitution did not any take ...also efficient and produced the corresponding formamides in 85-91% yields (Table 2, entries 18 and ... See full document

8

PROPEC-Programa de Pós Graduação em Engenharia Cívil :: APPROACHES FOR AUTOMATED DAMAGE DETECTION IN STRUCTURAL HEALTH MONITORING

PROPEC-Programa de Pós Graduação em Engenharia Cívil :: APPROACHES FOR AUTOMATED DAMAGE DETECTION IN STRUCTURAL HEALTH MONITORING

... In an automated manner, the first clustering analysis indicates which estimates correspond to physical ...the detection of spurious modes or the loss of physical ones, a second clustering step is then ... See full document

142

A Power Efficient Back-off Scheme for Wireless Sensor Networks

A Power Efficient Back-off Scheme for Wireless Sensor Networks

... There are a number of MAC layer protocols available for energy efficient sensor networks. Typical examples include S-MAC, T-MAC, and H-MAC protocols [2,3,4]. However, their backoff algorithm is based on IEEE ... See full document

8

A spectrally efficient transmission scheme for signals with large bandwidth

A spectrally efficient transmission scheme for signals with large bandwidth

... P detection stages, one for each ...the detection of the pth user employs the structure depicted in Fig. 2, where we have one length-N frequency-domain feedforward filter, followed by a decimation ... See full document

5

Saccharin derivative synthesis via [1,3] thermal sigmatropic rearrangement: a multistep organic chemistry experiment for undergraduate students

Saccharin derivative synthesis via [1,3] thermal sigmatropic rearrangement: a multistep organic chemistry experiment for undergraduate students

... laboratory classes for synthesis of related heterocyclic compounds and as a derivatizing agent. In this work saccharin is used as starting material to synthesize an allyl derivative, O-cinnamylsaccharin [3-(3- ... See full document

12

Automatic eye localization in color images

Automatic eye localization in color images

... In this paper, we present a new efficient method for accurate eye localization in color images. Our algorithm is based on robust feature filtering and explicit geometric clustering. This combination enhances ... See full document

8

Wavelet Based Fault Detection, Classification in Transmission System with TCSC Controllers

Wavelet Based Fault Detection, Classification in Transmission System with TCSC Controllers

... transmission systems employing flexible alternating current transmission controllers such as Thyristor Controlled Series Capacitor ...presents an efficient method based on wavelet transforms both ... See full document

5

Some methods for sensitivity analysis of systems / networks

Some methods for sensitivity analysis of systems / networks

... Morris method (Morris, 1991; Xu et al., 2004) maps the domain of each parameter into [0, 1] and discretizes the interval, such that each parameter takes values in {0,1/(p-1),2/(p-1),...,1}, where p is the number ... See full document

8

An Authenticated Key Distribution Scheme

An Authenticated Key Distribution Scheme

... paper, an integrated security system has been developed. Initially, an authenticated key agreement protocol is used to establish a shared session key between two entities or ...signcryption scheme is ... See full document

5

Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

... covering an area of 800 * 800 m 2 and a test bed of 20 nodes randomly and uniformly distributed in the entire ...and an idle time of ...in an inbuilt energy model of NS - 2 that uses a ... See full document

6

Highly efficient and enzymatic regioselective undecylenoylation of gastrodin in 2-methyltetrahydrofuran-containing systems.

Highly efficient and enzymatic regioselective undecylenoylation of gastrodin in 2-methyltetrahydrofuran-containing systems.

... exhibited an excellent selectivity for primary hydroxyl at the glucose moiety ...have an easier access to the active site of lipases to attack the acyl-enzyme intermediate than 60-OH of the sugar moiety, ... See full document

7

Efficient online detection of temporal patterns

Efficient online detection of temporal patterns

... history scheme here is inefficient: Roughly speaking, as the graph gets richer with more max and min constraints, the history scheme becomes more plausible, since the preprocessing phase will yield much ... See full document

21

Show all 10000 documents...