Global System for Mobile (GSM) Communication Overview Year by year, the GSM system improves and its subscribers increases around the world. It divides into three main parts that are OSS, SS, and BSS.
Computer Science Essays
Search here to find a specific article or browse from the list below:
Performance Analysis of One Dimension FDTD Code Implementation of parallel processing in FDTD method is proposed in this paper. The implementation depends mainly on computer architecture and…
Novel Elliptic-function Low-pass Filter (LPF) A novel elliptic-function low-pass filter (LPF) is Presented, which consists of a Electromagnetic band gap on the ground plane. The Electromagnetic band…
Packet Classification: Problem and Resolution This chapter covers the introduction to packet classification. Problems for packet classification, objectives to overcome the problem involved in…
Dual Band Bandpass Filter Using Meandered Ring Resonator In this paper, a dual band filter designed by embedded resonator loaded with ring resonator DGS was presented. A t-shaped embedded resonator with…
Methods for Routing Improvement in WSNs The aim of designing the Directed-Diffusion is efficiency in energy consumption, thereby increasing life expectancy network. In order to reduce energy…
Compensation techniques for 50 Gbps Duobinary System In this paper, we investigate the behavior of Pre, Post and Mix compensation techniques on the basis of quality factor and bit error rate at 50 Gbps…
Adaptive Energy Efficient Transmission in WSNs In wireless sensor networks (WSNs), sensor nodes work on finite capacity batteries. So, in order to increase network lifetime the mobile sensor nodes…
Development of a Resilient Wireless Sensor Network In this paper, we analyze the causes of poor link quality, received signal strength and packet reception rate due to factors such as shadowing, fading…
Passive Optical Networks (PON) With the popularity of broadband services of the terminal users the demands for bandwidth in the access network is rapidly increasing…
Decentralized Approach for Achieving Seamlessness The major outcome of this research effort is to analyse the feasibility and benefits of achieving seamlessness with the proposed decentralized approach…
Algorithm to Enhance Radio Wave Propagation Strength In this paper, we investigate path loss propagation inside and outside buildings and we identify and categorize these problems. We then apply our path…
Implementation of User-Pairing Algorithm for OFDMA Orthogonal frequency division multiple access (OFDMA) is an encouraging technology that supports high data rate transmission. The blend of OFDMA with…
P2 Cycle in WDM Networks We address The P2- cycle in mesh networks can be analysed by using single link failure. We further propose two P2-cycle based heuristic algorithms…
Ultra Wideband (UWB) Innovation Ultra wideband (UWB) innovation is right now being examined as a promising answer for transfer speed, expense, power utilization, and physical size…
Modification of Power Series Expansion The paper explains about the implementation of power and log function based on a simple modification of power series expansion of Taylor series.
Evolution of Substrate Integrated Waveguide (SIW) In this paper, various evolving structures of SIW which had been implemented for various practical applications like filters, couplers, antennas are…
Nonlinear Generalized Companding Transform In this paper a novel non-linear generalized companding scheme called “Quadrilateral Companding Transform (QCT)” has been proposed to reduce the…
Software Architecture Design Approach After we have our initial hypothesis we have to determine how to identify if design satisfies the quality benchmark expected from the application.
Content-Based Video Retrieval Method In this paper, we propose a CBVR (content based video retrieval) method for retrieving a desired object from the abstract video dataset.
Application Performance Optimization and Load Balancing The primary goal of this paper is to exemplify the details of successfully solving the I/O problems of a database application in a consistent fashion…
Variable Length Hash Algorithm Using RC6 In this paper, we present a hash algorithm using RC6 that can generate hash value of variable length. Hash algorithms play major part in cryptographic…
Open Source Software: Advantages and Methods Open source software is treated as the software which is freely accessed by anyone. The source code of the software is publically accessible by anyone…
Face Image Retrieval With Attribute Based Search Efficient face image retrieval from large scale database using attribute based search and ranking developed using java and the modules display as…
Inverse Matrix Condition Number In this framework, a system is provided with an input, called a stimulus, and the resulting response of the system is measured.