[PDF][PDF] Performance Analysis and Energy Conservation of Cellular Mobile Networks 無線蜂巢網絡的性能分析和節能

電子工程系 - 2016 - ee.cityu.edu.hk
… facilitate the blocking probability estimation by the proposed … , and energy per connection
declined by 5% from 2009 to 2010… individual packet size, burst size, inter-arrival time of packets

一個高速端對端訊務偵測與防範系統之設計與雛型製作

蔡宗勳, 陳耀宗 - 2006 - ir.lib.nycu.edu.tw
… power, storage size, management control of connection, and even … network backbone and
calculating statistics on collected data, … evolved from regular fixed port-number to arbitrary port-…

具安全通訊與系統防護之無線微型感測網路研發與實作(I)

謝續平 - 2004 - ir.lib.nycu.edu.tw
… This is critical for sensor nodes due to its small RAM size. … sacrifice slight computation for
determining which node is the … The wireless link between sensor nodes is not as reliable as …

長距離次載波/分波多工光纖系統與混合光纖同軸擷取網路

陳威宏, 尉應時 - 2003 - ir.lib.nycu.edu.tw
… (SCM) provides an additional dimension of multiplexing to … ratio (NSR) is measured to
estimate the impact of NLDs. CW … /SCM/DWDM optical fiber links is investigated theoretically and …

適用於無線微型網路之省電傳輸方法

吳孝展, 謝續平 - 2004 - ir.lib.nycu.edu.tw
… This is critical for sensor nodes due to its small RAM size. … sacrifice slight computation for
determining which node is the … The wireless link between sensor nodes is not as reliable as …

[PDF][PDF] 同儕式三維資料串流

江振瑞 - 2009 - researchgate.net
… collection of 3D objects placed arbitrarily in space that are streamed … -size regions, which
makes determining the proper region … that the connections are relevant and bounded in size. To …

睡眠模式在綠能無線網路之建模, 設計, 與最佳化

張正義 - 2014 - tdr.lib.ntu.edu.tw
… We derive the optimal cell size for minimizing BS power … It is estimated that the cost spent in
electricity globally for … In this chapter, we investigate the uplink coverage-limited problem and …

高階調變多輸入多輸出正交分頻多工系統中基於機率資料聯結演算法之資料檢測方法

王冠群, 黃家齊 - 2008 - ir.lib.nycu.edu.tw
arbitrary wireless communication system, we consider a link … Note that, when we calculate
equation (3.9) in the GPDA … Since the dimension of the GPDA detector is two times as the …

在疊蓋式網路中的匿名且容錯的路由協定

吳佳貞, 謝續平 - 2007 - ir.lib.nycu.edu.tw
… Messages passed along the anonymous connection appear … allow compromised node
behave arbitrarily. Eavesdropper … initiator from the attacker with different path length and fraction

大規模M2M 行動網路之群體位置管理

黃冠銘 - 2012 - tdr.lib.ntu.edu.tw
… With little or even no human intervention, the interconnection … management for MSs, including
determining the TP LU and S … In our mobility models, the size of LAs are indirectly reflected …