Sub-communities within this community

  • Ravi Pendse [126]

    Selected works of Vice President Ravi Pendse

Collections in this community

Recent Submissions

  • QAcon: single model quality assessment using protein structural and contact information with machine learning techniques 

    Cao, Renzhi; Adhikari, Badri; Bhattacharya, Debswapna; Sun, Miao; Hou, Jie; Cheng, Jianlin (Oxford University Press, 2017-02-15)
    Motivation: Protein model quality assessment (QA) plays a very important role in protein structure prediction. It can be divided into two groups of methods: single model and consensus QA method. The consensus QA methods ...
  • An energy-efficient directory based multicore architecture with wireless routers to minimize the communication latency 

    Asaduzzaman, Abu; Chidella, Kishore K.; Vardha, Divya (IEEE, 2017-02-01)
    Multicore architectures suffer from high core-to-core communication latency primarily due to the cache's dynamic behavior. Studies suggest that a directory-approach can be helpful to reduce communication latency by storing ...
  • Seer Grid: privacy and utility implications of two-level load prediction in smart grids 

    Boustani, Arash; Maiti, Anindya; Jazi, Sina Yousefian; Jadliwala, Murtuza Shabbir; Namboodiri, Vinod (IEEE, 2017-02-01)
    We propose "Seer Grid", a novel two-level energy consumption prediction framework for smart grids, aimed to decrease the trade-off between privacy requirements (of the customer) and data utility requirements (of the energy ...
  • Measuring anonymity of pseudonymized data after probabilistic background attacks 

    Bagai, Rajiv; Malik, Nafia; Jadliwala, Murtuza Shabbir (IEEE, 2017-05)
    There is clear demand among organizations for sharing their data for mining and other purposes without compromising the privacy of individual objects contained in the data. Pseudonymization is a simple, yet widely employed ...
  • Distributed timely throughput optimal scheduling for the Internet of Nano-Things 

    Akkari, Nadine; Wang, Pu; Jornet, Josep Miquel; Fadel, Etimad; Elrefaei, Lamiaa A.; Malik, Muhammad Ghulam Abbas; Almasri, Suleiman; Akyildiz, Ian F. (IEEE, 2016-12)
    Nanotechnology is enabling the development of miniature devices able to perform simple tasks at the nanoscale. The interconnection of such nano-devices with traditional wireless networks and ultimately the Internet enables ...
  • Optimizing Controller Area Network System for vehicular automation 

    Moniruzzaman, Md; Asaduzzaman, Abu; Mridha, Muhammad F. (IEEE, 2016)
    The use of advanced electronic control unit (ECU) in automotive industry is growing. Information collection and processing in systems with many ECUs face interruptions. Various bus standards for vehicles, such as Controller ...
  • A novel semantic knowledge engine using automated knowledge extraction from World Wide Web 

    Mabbu, Venkatesh; Asaduzzaman, Abu; Mridha, Muhammad F. (IEEE, 2016)
    It is extremely difficult for the existing search engines (such as Google and Bing) to crawl, index, rank, and manage huge amount of data and locate information. Semantic web technology (such as Google Knowledge Graph and ...
  • Path loss models for low-height mobiles in forest and urban 

    Ibdah, Yazan; Ding, Yanwu (Springer International Publishing, 2017-01)
    This paper presents path loss measurements at 2.1 GHz in forest and urban areas. Empirical path loss models have been presented for low-height dual-mobility channels. Three test scenarios are considered for the transmitter ...
  • Agile MU-MIMO in congested environments with robust channel estimation 

    Xiong, Wenhao; Mo, Zijian; Chen, Genshe; Pham, Khanh D.; Blasch, Erik; Kwon, Hyuck M. (IEEE, 2016)
    This paper proposes a novel multi-user multiple-input and multiple-output (MU-MIMO) selection and beam-forming technique for a geosynchronous orbit (GSO) satellite communication (SATCOM) system. The MU-MIMO technique employs ...
  • Jamming statistics-dependent frequency hopping 

    Hannon, Matthew; Feng, Shaung; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
    This paper studies a jamming statistics-dependent frequency-hopping (FH) pattern generation scheme. Most existing FH patterns are determined by two encryption keys: (a) one for FH in the frequency domain, and (b) the other ...
  • Boundaries of Signal-to-Noise Ratio for Adaptive Code Modulations 

    Pinyoanuntapong, Krittetash; Goswami, Madhuprana; Habib, Ashfia Binte; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
    Adaptive code modulation (ACM) has been studied for last two decades to enhance the bandwidth and power efficiency in a bandwidth-constrained and power-constrained communication system environment. This paper studies how ...
  • Effective assignment and assistance to software developers and reviewers 

    Zanjani, Motahareh Bahrami (Association for Computing Machinery, 2016)
    Human reliance and dominance are ubiquitous in sustaining a high-quality large software system. Automatically assigning the right solution providers to the maintenance task at hand is arguably as important as providing the ...
  • Message passing for analysis and resilient design of self-healing interdependent cyber-physical networks 

    Behfarnia, Ali; Eslami, Ali (IEEE, 2016)
    Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, that can lead to large scale cascading ...
  • Towards cloud-based crowd-augmented spectrum mapping for dynamic spectrum access 

    Janakaraj, Prabhu; Wang, Pu; Chen, Zheng (IEEE, 2016)
    Recently, large-scale spectrum measurements show that geo-location spectrum databases, as recommended by regulators (e.g., FCC, Ofcom, ECC) for TV white space (TVWS) discovery are notoriously inaccurate in Metropolitan ...
  • An auspicious secure processing technique for near field communication systems 

    Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Salinas Monroy, Sergio A. Sergio A. (IEEE, 2016)
    The near field communication (NFC) technology helps save both time and power when compared with Bluetooth and other similar technologies. However, NFC is vulnerable to various networking attacks such as message modification. ...
  • Smartwatch-based keystroke inference attacks and context-aware protection mechanisms 

    Maiti, Anindya; Armbruster, Oscar; Jadliwala, Murtuza Shabbir; He, Jibo (Association for Computing Machinery, 2016)
    Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. ...
  • Efficient secure outstanding of large-scale quadratic programs 

    Salinas Monroy, Sergio A.; Luo, Changqing; Liao, Weixian; Li, Pan (Association for Computing Machinery, 2016)
    The massive amount of data that is being collected by today's society has the potential to advance scientific knowledge and boost innovations. However, people often lack sufficient computing resources to analyze their ...
  • IPMC-actuated robotic fish 

    Chen, Zheng; Bart-Smith, Hilary; Tan, Xiaobo (Springer Berlin Heidelberg, 2015-05-07)
    Excellent swimmers, such as tuna, rays, and goldfish, take advantage of their flexible fins, compliant bodies, and swimming bladders to achieve fast, highly maneuverable, and energy-efficient locomotion. Ionic polymer-metal ...
  • A framework for QoS-aware traffic classification using semi-supervised machine learning in SDNs 

    Wang, Pu; Lin, Shih-Chun; Luo, Min (IEEE, 2016)
    In this paper, a QoS-aware traffic classification framework for software defined networks is proposed. Instead of identifying specific applications in most of the previous work of traffic classification, our approach ...
  • Simulating multisensor noninvasive blood glucose monitoring systems 

    Asaduzzaman, Abu; Samadarsinee, Soumyashree; Chidella, Kishore K. (IEEE, 2016)
    Diabetes and related complications are responsible for early death - one person in every 7 seconds. Long term and short term complications due to diabetes can be reduced through proper diet, physical exercise, and medication. ...

View more