count: 8
simulation and visualization of strange attractors.
controlled pseudo-random trash generation using bézier parametric curves
simulation of various diversity combining strategies
simulation of code division multiple access using walsh codes
multi-armed bandit algorithms for wireless resource allocation
implementation of automatic repeat request protocols
rfid-based toll collection system simulation
graph neural networks for wireless network optimization