Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407323
K. M. Morshed, D. Karmokar, A. Mobin
This paper presents the numerical simulations of Inverted-L and stair inverted-L antennas capable of generating high gain with less than 1.5 dBi gain variation within the −10 dB return loss bandwidth for 5.5 GHz wireless-fidelity (Wi-Fi) operation with and without resistor-inductor-capacitor (RLC) impedance matching network. Moreover, the proposed antennas can provide bandwidth of 510 and 120 MHz respectively, making it easily cover the required bandwidths for Wi-Fi operation in the 5.5 GHz band. In application of matching network, the input impedance of the antennas well matched to the feeding cable, also improvement in return loss and voltage standing wave ratio (VSWR) is achieved.
{"title":"Numerical analysis of impedance matched Inverted-L antennas for Wi-Fi operations","authors":"K. M. Morshed, D. Karmokar, A. Mobin","doi":"10.1109/ICCIT.2009.5407323","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407323","url":null,"abstract":"This paper presents the numerical simulations of Inverted-L and stair inverted-L antennas capable of generating high gain with less than 1.5 dBi gain variation within the −10 dB return loss bandwidth for 5.5 GHz wireless-fidelity (Wi-Fi) operation with and without resistor-inductor-capacitor (RLC) impedance matching network. Moreover, the proposed antennas can provide bandwidth of 510 and 120 MHz respectively, making it easily cover the required bandwidths for Wi-Fi operation in the 5.5 GHz band. In application of matching network, the input impedance of the antennas well matched to the feeding cable, also improvement in return loss and voltage standing wave ratio (VSWR) is achieved.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407178
A. J. U. Jamali, A. Grosso, M. Locatelli, F. Schoen
Packing problems have mathematical as well as practical application point of interest. We present, here, Monotonic Basin Hopping heuristic approach to solve the problem of packing identical circles within a minimum size of circular container. Extensive computational experiments have been performed for analyzing the problem as well as for choosing an appropriate way the parameter values for the proposed methods. Several improvements with respect to the best results reported in the literature have been detected.
{"title":"Packing identical circles in a minimized circular container by Monotonic Basin Hopping heuristic approach","authors":"A. J. U. Jamali, A. Grosso, M. Locatelli, F. Schoen","doi":"10.1109/ICCIT.2009.5407178","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407178","url":null,"abstract":"Packing problems have mathematical as well as practical application point of interest. We present, here, Monotonic Basin Hopping heuristic approach to solve the problem of packing identical circles within a minimum size of circular container. Extensive computational experiments have been performed for analyzing the problem as well as for choosing an appropriate way the parameter values for the proposed methods. Several improvements with respect to the best results reported in the literature have been detected.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407269
Saleh Ahmed, Md. Rashedul Islam, M. S. Azam
This paper presents Bangla numeral Character Recognition System using supervised locally linear embedding algorithm and Support Vector Machine (SVM). The locally linear embedding (LLE) algorithm is an unsupervised technique proposed for nonlinear dimensionality reduction. In this paper, we describe its supervised variant (SLLE). Where class membership information is used to map overlapping high dimensional data into disjoint clusters in the embedded space. we combined it with support vector machine (SVM) for classifying handwritten digits from the On-Line Handwritten Bangla Numeral Database.
{"title":"Bangla Hand Written digit recognition using supervised locally linear embedding algorithm and Support Vector Machine","authors":"Saleh Ahmed, Md. Rashedul Islam, M. S. Azam","doi":"10.1109/ICCIT.2009.5407269","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407269","url":null,"abstract":"This paper presents Bangla numeral Character Recognition System using supervised locally linear embedding algorithm and Support Vector Machine (SVM). The locally linear embedding (LLE) algorithm is an unsupervised technique proposed for nonlinear dimensionality reduction. In this paper, we describe its supervised variant (SLLE). Where class membership information is used to map overlapping high dimensional data into disjoint clusters in the embedded space. we combined it with support vector machine (SVM) for classifying handwritten digits from the On-Line Handwritten Bangla Numeral Database.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125671303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407120
M. Akhtaruzzaman, Nurul Izzati Bt Samsuddin, Norsofiana Bt Umar, Mozasser M. Rahman
The Robot, named as TRAIN WALL BOT, is designed to navigate on smooth vertical surfaces with the capability to avoid obstacles and overcome if the height is about 1cm. The design is inspired from train steel wheel movement that contains two actuated legs with rotary motion provided by a DC motor. The Robot uses pneumatic system and the suction force is supplied by an air compressor that turns on intermittently. The suction force ensures the attachment of the robot with the wall by using 3 vacuum valves and 6 vacuum pads. The robot is controlled using PIC 16F877A. Two limit switches are used to acknowledge the contact with its navigating surface. Vacuum suction is controlled based on the ON OFF priority of the limit switches. Though the design is quiet simple but it is capable to walk, climb vertical smooth surfaces and avoid obstacles. Forward and backward movements are also faster, smoother and more stable (because of the coupling design) than other existing wall climbing Robots. In this paper, various aspects of prototype design and development of the Climbing Robot are conveyed including the body, leg, feet design and gait dynamics.
{"title":"Design and development of a wall climbing Robot and its control system","authors":"M. Akhtaruzzaman, Nurul Izzati Bt Samsuddin, Norsofiana Bt Umar, Mozasser M. Rahman","doi":"10.1109/ICCIT.2009.5407120","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407120","url":null,"abstract":"The Robot, named as TRAIN WALL BOT, is designed to navigate on smooth vertical surfaces with the capability to avoid obstacles and overcome if the height is about 1cm. The design is inspired from train steel wheel movement that contains two actuated legs with rotary motion provided by a DC motor. The Robot uses pneumatic system and the suction force is supplied by an air compressor that turns on intermittently. The suction force ensures the attachment of the robot with the wall by using 3 vacuum valves and 6 vacuum pads. The robot is controlled using PIC 16F877A. Two limit switches are used to acknowledge the contact with its navigating surface. Vacuum suction is controlled based on the ON OFF priority of the limit switches. Though the design is quiet simple but it is capable to walk, climb vertical smooth surfaces and avoid obstacles. Forward and backward movements are also faster, smoother and more stable (because of the coupling design) than other existing wall climbing Robots. In this paper, various aspects of prototype design and development of the Climbing Robot are conveyed including the body, leg, feet design and gait dynamics.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132631556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407285
M. Murshed, M. Ali, Akber Dewan, O. Chae
In this paper, an edge based tracking algorithm is proposed. Our algorithm makes efficient use of edge-segment on the Canny edge map by utilizing the edge structure in the moving object region. Curvature-based features are used for moving edge registration. We use the maximum curvature correspondences between two edge segments then the 2D affine transformation computes their movement by solving a system of linear equations. The registration error is then minimized. A Kalman Filter is used to track each individual edge segments. Segments are clustered using a k-mean algorithm. Finally, a group motion tracker is used for tracking moving object from each cluster. Experiments show that our edge-segment based tracking algorithm can track moving objects efficiently under varying illumination conditions.
{"title":"Moving object tracking - a parametric edge tracking approach","authors":"M. Murshed, M. Ali, Akber Dewan, O. Chae","doi":"10.1109/ICCIT.2009.5407285","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407285","url":null,"abstract":"In this paper, an edge based tracking algorithm is proposed. Our algorithm makes efficient use of edge-segment on the Canny edge map by utilizing the edge structure in the moving object region. Curvature-based features are used for moving edge registration. We use the maximum curvature correspondences between two edge segments then the 2D affine transformation computes their movement by solving a system of linear equations. The registration error is then minimized. A Kalman Filter is used to track each individual edge segments. Segments are clustered using a k-mean algorithm. Finally, a group motion tracker is used for tracking moving object from each cluster. Experiments show that our edge-segment based tracking algorithm can track moving objects efficiently under varying illumination conditions.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130457971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407154
M. Hossain, Md. Rubaiyat H. Mondal
The effectiveness of different diversity combining techniques in improving the bit error rate (BER) performance of a direct- sequence code-division multiple-access (DS-CDMA) system is presented in this paper. The overall performance of a DS-CDMA system is degraded by multipath fading and additive white Gaussian noise (AWGN). To evaluate the degradation, the expression for the conditional BER, conditioned on a given level of fading is derived and then the unconditional BER is evaluated. This approach is also extended to estimate the BER performance of the system having multiple receiving antennas. The selection method and maximal ratio combining (MRC) method are employed as diversity combining schemes and it is found that both the schemes offer almost the same BER improvement. Moreover, convolutional channel coding is applied in the DS-CDMA system and it is noted to provide more enhancements in the system performance.
{"title":"Effectiveness of selection and maximal ratio combining diversity techniques on a DS-CDMA wireless communication system impaired by fading","authors":"M. Hossain, Md. Rubaiyat H. Mondal","doi":"10.1109/ICCIT.2009.5407154","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407154","url":null,"abstract":"The effectiveness of different diversity combining techniques in improving the bit error rate (BER) performance of a direct- sequence code-division multiple-access (DS-CDMA) system is presented in this paper. The overall performance of a DS-CDMA system is degraded by multipath fading and additive white Gaussian noise (AWGN). To evaluate the degradation, the expression for the conditional BER, conditioned on a given level of fading is derived and then the unconditional BER is evaluated. This approach is also extended to estimate the BER performance of the system having multiple receiving antennas. The selection method and maximal ratio combining (MRC) method are employed as diversity combining schemes and it is found that both the schemes offer almost the same BER improvement. Moreover, convolutional channel coding is applied in the DS-CDMA system and it is noted to provide more enhancements in the system performance.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407143
Moshaddek Hasan, A. Islam, A. Chowdhury
Reversible logic plays an important role in the synthesis of circuits having application in quantum computing, low power CMOS design and nanotechnology-based system. In this paper, we have proposed the online testability of reversible sequential circuits, which is first ever proposed in literature. On the way to propose the online testability of reversible sequential circuits, we have proposed an improved Rail-check circuit that significantly improves the performance of the overall circuit in terms of gate cost and garbage cost parameters. We have also used our improved and efficient rail-check circuit to realize the testability of different benchmark circuits.
{"title":"Design and analysis of online testability of reversible sequential circuits","authors":"Moshaddek Hasan, A. Islam, A. Chowdhury","doi":"10.1109/ICCIT.2009.5407143","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407143","url":null,"abstract":"Reversible logic plays an important role in the synthesis of circuits having application in quantum computing, low power CMOS design and nanotechnology-based system. In this paper, we have proposed the online testability of reversible sequential circuits, which is first ever proposed in literature. On the way to propose the online testability of reversible sequential circuits, we have proposed an improved Rail-check circuit that significantly improves the performance of the overall circuit in terms of gate cost and garbage cost parameters. We have also used our improved and efficient rail-check circuit to realize the testability of different benchmark circuits.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"35 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128771328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407292
Shareeful Islam, S. Houmb, Daniel Mendez-Fernandez, Md. Mahbubul Alam Joarder
Offshore-outsourced software development is gaining popularity because companies are continuously forced to reduce production costs while keeping sustainable competitive strength. However, this trend of software development increases projects' complexity and brings up risks to the overall project environment. Therefore, risks of offshore software development require to be managed as early as possible for a successful project. This paper considers a risk management model from a holistic perspective to manage offshore software development risk, integrated into early stages of development. The approach effectively identifies and specifies the goals of a project and the related risk factors. This is done at the basis of selected software development components within the running project. We show how to trace and control these risks already during early requirements engineering activities. The model at hand is implemented into an ongoing offshore software development project to (1) identify goals and risk factors from the local context and finally (2) to determine its applicability of the approach in offshore software development projects from a vendor's perspective.
{"title":"Offshore-outsourced software development risk management model","authors":"Shareeful Islam, S. Houmb, Daniel Mendez-Fernandez, Md. Mahbubul Alam Joarder","doi":"10.1109/ICCIT.2009.5407292","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407292","url":null,"abstract":"Offshore-outsourced software development is gaining popularity because companies are continuously forced to reduce production costs while keeping sustainable competitive strength. However, this trend of software development increases projects' complexity and brings up risks to the overall project environment. Therefore, risks of offshore software development require to be managed as early as possible for a successful project. This paper considers a risk management model from a holistic perspective to manage offshore software development risk, integrated into early stages of development. The approach effectively identifies and specifies the goals of a project and the related risk factors. This is done at the basis of selected software development components within the running project. We show how to trace and control these risks already during early requirements engineering activities. The model at hand is implemented into an ongoing offshore software development project to (1) identify goals and risk factors from the local context and finally (2) to determine its applicability of the approach in offshore software development projects from a vendor's perspective.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126883267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407268
Md. Al Imran, J. Hossain, T. Dey, B. K. Debroy, Ahsan Habib Abir
Optical Character Recognition is one of the challenging fields in recognition of printed Bangla text. The main difficulties are that there are no precise techniques or algorithms for separating lines, words, and characters from printed Bangla text and efficiently recognize these separate characters. In this paper, we introduce new methods to separate lines, words, and characters from printed Bangla text. We also propose Outer Shape Detection Technique (OSDT), a new technique to recognize each character based on its outer shape which is unique. To successfully accomplish this, proposed technique scans each character both from its left side and right side. Finally our experimental results are compared with some prevalent ones which precisely show that our approach performs smoothly on different font sizes and number of characters.
{"title":"OSDT: Outer Shape Detection Technique for Recognition of Bangla Optical Character","authors":"Md. Al Imran, J. Hossain, T. Dey, B. K. Debroy, Ahsan Habib Abir","doi":"10.1109/ICCIT.2009.5407268","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407268","url":null,"abstract":"Optical Character Recognition is one of the challenging fields in recognition of printed Bangla text. The main difficulties are that there are no precise techniques or algorithms for separating lines, words, and characters from printed Bangla text and efficiently recognize these separate characters. In this paper, we introduce new methods to separate lines, words, and characters from printed Bangla text. We also propose Outer Shape Detection Technique (OSDT), a new technique to recognize each character based on its outer shape which is unique. To successfully accomplish this, proposed technique scans each character both from its left side and right side. Finally our experimental results are compared with some prevalent ones which precisely show that our approach performs smoothly on different font sizes and number of characters.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407277
S. Chowdhury, Mohamamd Tauhidul Islam, Fariha Tasmin Jaigirdar, Md. Rokan Uddin Faruqui, S. Noor
Since its birth wireless communication became an indispensible part of the modern society. One major area that has a gigantic impact on the performance of wireless sensor networks (WSNs) is the Medium Access Control (MAC) layer. Many random access protocols exist in wireless sensor networks. Some of these protocols include Carrier Sense Multiple Access (CSMA), Multiple Access with Collision Avoidance (MACA), Multiple Access with Collision Avoidance for wireless (MACAW) and IEEE 802.11. All the protocols mentioned above except CSMA use Request To Send/Clear To Send (RTS/CTS) packets to avoid collisions (hidden terminal problem) which was a great problem for CSMA and that is the reason CSMA is almost obsolete for wireless communications. But after using RTS/CTS packets the protocols have to encounter some extra problems such as, energy consumption and end-to-end delay. The objective of this paper is to show the pros and cons of using RTS/CTS packets by comparing CSMA (does not use RTS/CTS) and IEEE 802.11 (uses RTS/CTS packets). We also portray that under some specific scenario the IEEE 802.11 is outperformed by CSMA which is also the novelty and contribution of this research work. This observation suggests that a lot of works have to be done to consider IEEE 802.11 an approximate perfect MAC layer protocol for WSNs.
{"title":"Performance study and simulation analysis of CSMA and IEEE 802.11 in wireless sensor networks and limitations of IEEE 802.11","authors":"S. Chowdhury, Mohamamd Tauhidul Islam, Fariha Tasmin Jaigirdar, Md. Rokan Uddin Faruqui, S. Noor","doi":"10.1109/ICCIT.2009.5407277","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407277","url":null,"abstract":"Since its birth wireless communication became an indispensible part of the modern society. One major area that has a gigantic impact on the performance of wireless sensor networks (WSNs) is the Medium Access Control (MAC) layer. Many random access protocols exist in wireless sensor networks. Some of these protocols include Carrier Sense Multiple Access (CSMA), Multiple Access with Collision Avoidance (MACA), Multiple Access with Collision Avoidance for wireless (MACAW) and IEEE 802.11. All the protocols mentioned above except CSMA use Request To Send/Clear To Send (RTS/CTS) packets to avoid collisions (hidden terminal problem) which was a great problem for CSMA and that is the reason CSMA is almost obsolete for wireless communications. But after using RTS/CTS packets the protocols have to encounter some extra problems such as, energy consumption and end-to-end delay. The objective of this paper is to show the pros and cons of using RTS/CTS packets by comparing CSMA (does not use RTS/CTS) and IEEE 802.11 (uses RTS/CTS packets). We also portray that under some specific scenario the IEEE 802.11 is outperformed by CSMA which is also the novelty and contribution of this research work. This observation suggests that a lot of works have to be done to consider IEEE 802.11 an approximate perfect MAC layer protocol for WSNs.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}