Skip to main content
. 2020 Sep 7;20(18):5101. doi: 10.3390/s20185101

Figure 24.

Figure 24

A close look of the asynchronous protocol, where each transmitter being activated after a random length of time window, and the receiver firstly listens for an identifier, then samples the strength after an identifier is received.