Direction Finding Application for GSM Networks Final Year Project Spring 2005 - 2006

نویسندگان

  • Zaher Dawy
  • Mazen Saghir
  • Mohamad Mahdi Kassir
چکیده

Acknowledgement This is one step in the process of building our engineering personality. This step as everything else is possible only by Allah's will. We would like to thank Dr. Mazen Saghir and Dr. Zaher Dawy for their insightful feedback and continuous support throughout the development of this project. Thanks to Siemens for their willingness to support this project. And thanks to the ECE department at AUB for their care and effort to make our Final Year Projects as valuable as possible.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Algorithm to Obtain Possibly Critical Paths in Imprecise Project Networks

  We consider criticality in project networks having imprecise activity duration times. It is well known that finding all possibly critical paths of an imprecise project network is an NP-hard problem. Here, based on a method for finding critical paths of crisp networks by using only the forward recursion of critical path method, for the first time an algorithm is proposed which can find all pos...

متن کامل

RFC 4215 IPv 6 Transition in 3 GPP Networks

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document analyzes the transition to IPv6 in Third Generation Partnership Project (3GPP) packet networks. These networks are based on General Packet Radio Service (GPRS) technology, and the radio network archite...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Applications of Resource Optimization in Wireless Networks

The demand for wireless communications is increasing every year, but the available resources are not increasing at the same rate. It is very important that the radio resources are used in an efficient way allowing the networks to support as many users as possible. The three types of networks studied in this thesis are frequency hopping GSM networks, ad hoc multi-hop networks and WCDMA networks....

متن کامل

Application of artificial neural networks on drought prediction in Yazd (Central Iran)

In recent decades artificial neural networks (ANNs) have shown great ability in modeling and forecasting non-linear and non-stationary time series and in most of the cases especially in prediction of phenomena have showed very good performance. This paper presents the application of artificial neural networks to predict drought in Yazd meteorological station. In this research, different archite...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005