Search citation statements

Order By: Relevance
Select...
3
1
0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

0
5
0
Order By: Relevance
“…As an implementation of vehicle-to-vehicle (V2V) communication, we are considering spatial multiplexing zero-forcing Bell-labs layered space–time (ZF-VBLAST) via a Multiple-Input and Multiple-Output (MIMO) time-varying flat-fading channel. The authors of [ 61 ] propose a novel Full Duplex MAC protocol named priority-based multiple access (PBMA) which is based on prioritized messaging between different nodes.…”
Section: State-of-the-art Approaches For Mac-protocols Optimizationmentioning
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 7 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…As an implementation of vehicle-to-vehicle (V2V) communication, we are considering spatial multiplexing zero-forcing Bell-labs layered space–time (ZF-VBLAST) via a Multiple-Input and Multiple-Output (MIMO) time-varying flat-fading channel. The authors of [ 61 ] propose a novel Full Duplex MAC protocol named priority-based multiple access (PBMA) which is based on prioritized messaging between different nodes.…”
Section: State-of-the-art Approaches For Mac-protocols Optimizationmentioning
“…The second model will sense and advertise the channel load. The are many parameters the sensing will base on, for example, packet delivery ratio, transmitting time and so on to determine the congestion (Zhang et al, 2020). The threshold value is determined for channel bandwidth utilization.…”
Section: Cross-layer Approach For Congestion Detectionmentioning
“…In Section III, we have discussed state-of-the-art congestion detection techniques based on event-driven, priority, measurement, MAC blocking, cross-layer, dynamic, distributed, and location-based techniques, out of which, the cross-layer and location-based congestion detection techniques gained the most attention among researchers in recent times. The cross-layer congestion detection mechanism [61,62] monitors all TCP/IP layers to detect network congestion. In contrast, location-based congestion detection techniques provide statistical techniques to detect congestion in the region.…”
Section: Location-based Congestion Detection Techniquementioning
“…This module scans for an emergency and alerts a control center if any emergency message gets delivered. The second module channel senses the overall load of the channel [62]. Sensing is based on the assessment of dynamic threshold values, queue length, packet rate, scheduling time, delivery time, incoming and outgoing rate to determine congestion.…”
Section: Cross-layer-based Congestion Detection Techniquementioning