Search alternatives:
"hops" » "hopes" (Expand Search), "shops" (Expand Search), "ops" (Expand Search)
"hop" » "shop" (Expand Search)
"hope" » "shope" (Expand Search), "home" (Expand Search)
"homes" » "home" (Expand Search), "comes" (Expand Search), "hopes" (Expand Search)
"hops" » "hopes" (Expand Search), "shops" (Expand Search), "ops" (Expand Search)
"hop" » "shop" (Expand Search)
"hope" » "shope" (Expand Search), "home" (Expand Search)
"homes" » "home" (Expand Search), "comes" (Expand Search), "hopes" (Expand Search)
-
161
Hackathons as Participatory Design: Iterating Feminist Utopias
Published 2020Get full text
Working Paper -
162
Ambiguity Aversion and Household Portfolio Choice Puzzles: Empirical Evidence
Published 2016Subjects: Get full text
Get full text
Journal Article -
163
Gobo: A System for Exploring User Control of Invisible Algorithms in Social Media
Published 2020Get full text
Article -
164
-
165
Guaranteeing safe drinking water services for public schools in Kenya (Briefing Note)
Published 2024Working paper -
166
-
167
Policy reform to deliver safely managed drinking water services for schools in rural Bangladesh
Published 2021Journal article -
168
-
169
Media Cloud: Massive Open Source Collection of Global News on the Open Web
Published 2024Get full text
Article -
170
Challenges and opportunities for NMR calculations: general discussion
Published 2024Journal article -
171
15.021J / 11.433J Real Estate Economics, Spring 2004
Published 2004Subjects: Get full text
Learning Object -
172
-
173
Wearable technology for holistic entertainment experience
Published 2016Subjects: “…DRNTU::Engineering::Electrical and electronic engineering::Home entertainment systems…”
Get full text
Final Year Project (FYP) -
174
Comparison of some time slot allocation schemes in TDD-CDMA multihop cellular networks
Published 2009“…One of the proposed solutions is to combine the idea of ad hoc networks and cellular networks to design a cellular system that can support multi-hop transmission. These systems are called Multi-hop Cellular Networks (MCN). …”
Get full text
Thesis -
175
Exploiting LoRaWAN for efficient and resilient IoT networks
Published 2020“…First, it studies how to use the one-hop LoRaWAN to build out-of-band control planes for the low-power multi-hop wireless networks to improve their efficiency and resilience. …”
Get full text
Thesis-Doctor of Philosophy -
176
Epidemiology of injuries in street dancers
Published 2019“…Background: Street dance (also known as hip-hop dance) has rapidly grown in popularity since its origination in the 1970s and is now practiced by millions of people worldwide. …”
Get full text
Final Year Project (FYP) -
177
Analysis of influence and its applications in social advertising
Published 2022“…To improve the efficiency in the sampling process of influence estimation, we propose a new sampling method, called 2-hop+. Our method generates only the samples spreading influence beyond the source with at least one 2-hop live path. …”
Get full text
Thesis-Doctor of Philosophy -
178
Performance study of routing protocols for wireless sensor network applications - 1
Published 2014“…A program was created to summarize the data collected to produce the route establishment time, packet delivery ratio and the packet delay parameters for one, two and three hops. Test results were then analysed and recommendations for future works were given.…”
Get full text
Final Year Project (FYP) -
179
HAPS-based relaying for integrated space-air-ground networks with hybrid FSO/RF communication : a performance analysis
Published 2021“…Thus, we propose single-hop and SAGIN-based dual-hop system models for uplink satellite communication with hybrid FSO/RF links and the performance is investigated using analytical and simulation results. …”
Get full text
Journal Article -
180
Security study in wimax mesh networks
Published 2011“…WiMax Mesh mode allows direct communication between Subscriber Stations (SS) without the need of the Base Station (BS), thus improved network coverage. In Multi hop wireless systems such as WiMax Mesh Networks, security emerges as a vital requirement from the threats of both Malicious Sponsor Node (SN) and Candidate Node (CN). …”
Get full text
Final Year Project (FYP)