2021
DOI: 10.1049/cmu2.12199
|View full text |Cite
|
Sign up to set email alerts
|

MAC layer performance modelling for IEEE 802.15.7 based on discrete‐time Markov chain

Abstract: Potential lack of enough wireless frequency spectrum has guided researchers towards visible light communication (VLC), emerging as a sturdy support to Wi-Fi. Though the IEEE 802.15.7 standard has comprehensive medium access control (MAC) and physical (PHY) layer specifications, the emerging VLC technology still faces MAC challenges. Further, throughput is one of the major concerns for the VLC personal area network (VPAN) as it directly impacts the network speed. We propose a novel Markov chain model with two c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…e state space of risk grade I is set as low, medium, and high. Table 1 shows the conditional probability distribution column of initial risk state of risk source R2 [16].…”
Section: Eoretical Preparation (1) Bayesian Networkmentioning
confidence: 99%
“…e state space of risk grade I is set as low, medium, and high. Table 1 shows the conditional probability distribution column of initial risk state of risk source R2 [16].…”
Section: Eoretical Preparation (1) Bayesian Networkmentioning
confidence: 99%
“…In order to verify the false alarm performance of the detection method proposed by the author, at 03 : 00, 06 : 00, 09 : 00, 12 : 00, 15 : 00, 18 : 00, 21 : 00, 24 : 00 on September 20, respectively, construct 500 normal data that meet the normal measurement error requirements at any time, and the detection method proposed by the author is used for detection, of which only 1.35% of the data is misjudged as false data, indicating that the detection method proposed by the author has very superior false alarm performance [22]. In order to verify the detection performance of the detection method proposed by the author with the change of attack intensity, the detection probability of the attack vector group a 1 − a 8 with the change of attack intensity is calculated, and the results are shown in Figure 6.…”
Section: Fdia Detectionmentioning
confidence: 99%
“…After determining college students' innovation and entrepreneurship quality model, the Markov chain and fuzzy algorithm in artificial intelligence technology are used to construct the evaluation model of college students' innovation and entrepreneurship quality [25]. The specific process is as follows.…”
Section: Construction Of College Students' Innovation and Entrepreneu...mentioning
confidence: 99%