Chittagong University of Engineering & Technology

Displaying 1-4 of 4 results

  • White Papers // Oct 2012

    Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks

    Cognitive radio technology has been developed in recent years to make efficient use of the wireless spectrum especially for opportunistic spectrum access. Cognitive radio technology enables the secondary (cognitive) users to use the unused licensed spectrum of the primary users. Medium Access Control (MAC) protocol plays a vital role in...

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Sep 2012

    The Influence of Autonomous Information on Artificial Intelligence

    In recent years, much research has been devoted to the analysis of link-level acknowledgements; however, few have simulated the development of erasure coding. Given the current status of efficient modalities, mathematicians compellingly desire the deployment of public-private key pairs. The authors construct new interactive archetypes (OldLapful), disconfirming that Byzantine fault...

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Sep 2012

    Algorithm for Linear Number Partitioning into Maximum Number of Subsets

    The number partitioning problem is to decide whether a given multi-set of integers can be partitioned into two "Halves" of given cardinalities such that the discrepancy, the absolute value of the difference of their sums is minimized. While Partitioning problem is known to be NP-complete, only few studies have investigated...

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Dec 2010

    Security Enhancement & Solution for Authentication Frame Work in IEEE 802.16

    WIMAX- Worldwide Interoperability for Microwave Access is going to be an emerging wireless technology for the future. Wireless networking market is thriving because of increasing popularity of Broad Band internet. Wireless network is not completely secure because of rapid release of new technologies, lack of physical infrastructure and market competition....

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Sep 2012

    The Influence of Autonomous Information on Artificial Intelligence

    In recent years, much research has been devoted to the analysis of link-level acknowledgements; however, few have simulated the development of erasure coding. Given the current status of efficient modalities, mathematicians compellingly desire the deployment of public-private key pairs. The authors construct new interactive archetypes (OldLapful), disconfirming that Byzantine fault...

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Sep 2012

    Algorithm for Linear Number Partitioning into Maximum Number of Subsets

    The number partitioning problem is to decide whether a given multi-set of integers can be partitioned into two "Halves" of given cardinalities such that the discrepancy, the absolute value of the difference of their sums is minimized. While Partitioning problem is known to be NP-complete, only few studies have investigated...

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Oct 2012

    Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks

    Cognitive radio technology has been developed in recent years to make efficient use of the wireless spectrum especially for opportunistic spectrum access. Cognitive radio technology enables the secondary (cognitive) users to use the unused licensed spectrum of the primary users. Medium Access Control (MAC) protocol plays a vital role in...

    Provided By Chittagong University of Engineering & Technology

  • White Papers // Dec 2010

    Security Enhancement & Solution for Authentication Frame Work in IEEE 802.16

    WIMAX- Worldwide Interoperability for Microwave Access is going to be an emerging wireless technology for the future. Wireless networking market is thriving because of increasing popularity of Broad Band internet. Wireless network is not completely secure because of rapid release of new technologies, lack of physical infrastructure and market competition....

    Provided By Chittagong University of Engineering & Technology