Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
A Review on Data Securing Techniques using Internet of Medical Things
Volume-3 | Issue-3
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
Maximizing the Prediction Accuracy in Tweet Sentiment Extraction using Tensor Flow based Deep Neural Networks
Volume-3 | Issue-2
DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING
Volume-1 | Issue-1
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]
Volume-2 | Issue-3
Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3
Volume - 2 | Issue - 2 | june 2020
Published
01 June, 2020
The paper puts forward an optimal time assignment for the bilateral relay system in order to heighten the total amount of data conveyed through it. To have an optimal time assignment the conveyance rate of the two way transmission is obtained using the successful conveyance probability and the destined data rate. Taking into consideration the acquired particulars of data conveyance the paper has proposed an optimal time assignment for every connection. The results observed on evaluating the performance proved that the bilateral relay system with the optimal time assignments has improved the coverage, reliability and the throughput of the wireless communication system.
KeywordsWireless Communication System Bilateral Relay System Data Conveyance Rate Optimal Time Assignment Performance Improvement
Full Article PDF Download Article PDF