Now showing items 35-54 of 262

  • Comparative study of task allocation strategies in multirobot systems 

    Hatime, Hicham; Pendse, Ravi; Watkins, John Michael (IEEE-INST Electrical Electronics Engineers Inc, 2013-01)
    In this paper, we present a comparative study of three distributed strategies for task allocation in a multirobot system. The objective is to determine the course of action for each robot and the targets it needs to service. ...
  • Comparing and combining evolutionary couplings from interactions and commits 

    Bantelay, Fasil T.; Zanjani, Motahareh Bahrami; Kagdi, Huzefa Hatimbhai (IEEE, 2013)
    The paper presents an approach to mine evolutionary couplings from a combination of interaction (e.g., Mylyn) and commit (e.g., CVS) histories. These evolutionary couplings are expressed at the file and method levels of ...
  • Comparison of VOIP and VOATM for voice transmission 

    Bhagavathula, Ravi; Kamat, P.; Sehgal, M.; Pendse, Ravi (OPNETWORK 2001, 2001-08)
    The tremendous advances in the field of multi-service networking have enabled the integration of voice and data networks leading to a reduction in the overall network setup and maintenance costs. In this paper, an evaluation ...
  • Component reliability evaluation in the presence of smart monitoring 

    Heidari-Kapourchali, Mohammad; Aravinthan, Visvakumar (IEEE, 2013)
    Smart sensors and monitoring technologies are beginning to penetrate different levels of the power system. In a smart grid scenario, the operational condition of components needs to be reported to the control center, in ...
  • Constrained pole placement using projective controls technique 

    Fousan, N. S.; Sawan, M. Edwin (IEEE, 1990-05-23)
    Projective controls method is used to place the poles of a closed loop system within a circle in the left half plane. The design procedure is noniterative and the solution is obtained via linear quadratic (LQ) design for ...
  • Control traffic analysis of on-demand routing protocols in ad-hoc wireless networks 

    Mann, Raminder P.; Arbindi, Srividya; Namuduri, Kameswara; Pendse, Ravi (IEEE, 2005-09-28)
    This paper provides an analytical framework for estimating the routing overhead due to mobility and link breakage. Detailed analysis is presented for estimating the number of control packets (RREQ, RREP and RERR) as a ...
  • Cooperative AF MIMO wireless relay networks under relay power constraint 

    Lee, Kanghee; Kwon, Hyuck M.; Kim, Hyunggi; Park, Hyuncheol; Lee, Yong H. (IEEE, 2012-11)
    This paper presents an amplify-and-forward (AF) relay scheme for M-source-M-destination pairs and N relay nodes. Cooperative minimum mean square error (MMSE) and zero-forcing (ZF) strategies for wireless relay networks ...
  • Cooperative AF wireless relay strategy under relay power constraint 

    Lee, Kanghee; Kwon, Hyuck M.; Sawan, M. Edwin; Park, Hyuncheol (IEEE, 2013-11)
    This paper presents an optimal relay amplifying matrix based on various schemes, such as zero-forcing (ZF) and minimum mean square error (MMSE), for a cooperative amplify-and-forward (AF) wireless relay network consisting ...
  • Cross-layer analysis of route discovery process and its impact on the packet end-to-end delay in wireless Ad Hoc networks 

    Kadiyala, Murali Krishna; Pendse, Ravi (IEEE, 2006-09-25)
    This paper presents a cross-layer analysis of the route discovery process in ad hoc networks, and discusses the impact of this process on the packet end-to-end delay. The analysis primarily highlights the role of medium ...
  • Data caching for enhancing anonymity 

    Bagai, Rajiv; Tang, Bin (IEEE Computer Society, 2011-03-22)
    The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employing data caching for increasing the level of ...
  • Decoupling of large scale systems 

    Shah, Dipak C.; Sawan, M. Edwin; Tran, Minh T. (IEEE, 1984-06-06)
    Linear shift invariant large scale discrete-time multivariable systems whose inputs and outputs are strongly interacted, are considered. The designing of compensators to decouple these systems is presented.
  • Determination of all robustly stabilizing fractional-order PID controllers 

    Lee, Yung K.; Watkins, John Michael (American Society of Mechanical Engineers, 2013)
    In this paper, a method is provided for determining all fractional-order (FO) proportional–integral-derivative (PID) controllers that robustly stabilize a single-input and single-output (SISO) transfer function of arbitrary ...
  • Determination of all stabilizing fractional-order PID controllers that satisfy a robust performance constraint 

    Lee, Yung K.; Watkins, John Michael (IEEE, 2013-06)
    This paper presents a method for finding all stabilizing fractional-order (FO) proportional-integral-derivative (PID) controllers that satisfy a robust performance constraint for a system of integer or non-integer order ...
  • Determination of all stabilizing fractional-order PID controllers that satisfy a weighted sensitivity constraint 

    Lee, Yung K.; Watkins, John Michael (IEEE, 2012)
    This paper presents a method for determining all stabilizing fractional-order (FO) proportional-integral-derivative (PID) controllers that satisfy an H∞ weighted-sensitivity constraint for a system of integer or non-integer ...
  • Determination of all stabilizing PID controllers for time delay systems with Smith predictors 

    Veeramachaneni, Siva Rama Krishna; Watkins, John Michael; Emami, Tooran (American Society of Mechanical Engineers, 2013)
    Time delays in the control loop complicate the analysis and design of controllers. The use of a Smith predictor is a well-known technique for dealing with delays in stable systems. This paper presents a method for finding ...
  • A digital quarter square multiplier 

    Johnson, Everett L. (IEEE, 1980-03)
    An application of the quarter square multiplication technique used in analog computing is proposed for digital multiplication. Significant savings in storage requirements for ROM- implemented product tables are demonstrated. ...
  • Direct implementation of an N-qubit controlled-unitary gate in a single step 

    Kumar, Preethika (Springer, 2013-02)
    We present a new scheme to implement an N-qubit controlled-unitary operation directly in a single step. The main advantage of our scheme is that we do not use conventional gate decomposition protocols to break an N-qubit ...
  • Distributed AF beamforming relay networks under transmit power constraint 

    Lee, Kanghee; Kwon, Llyuck M.; Sawan, M. Edwin; Park, Hyuncheol (IEEE, 2013-11)
    This paper investigates minimum mean square error (MMSE)-based amplify-and-forward (AF) relay amplifying matrices and source/destination beamforming vectors under perfectly known channel state information by imposing ...
  • Distributed AF mobile relay networks in adverse wireless communication environments 

    Lee, Kanghee; Kwon, Hyuck M.; Yang, Jie; Sawan, M. Edwin; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
    This paper addresses a more practical relay network consisting of a mobile source, multiple distributed mobile amplify-and-forward (AF) relays, and a mobile destination node. It considers an appropriate channel model between ...
  • Distributed reaction mechanisms to prevent selfish misbehavior in wireless Ad Hoc networks 

    Jaggi, Neeraj; Giri, Vamshikrishna Reddy; Namboodiri, Vinod (IEEE, 2011-12-05)
    We address the issue of misbehavior detection and reaction in IEEE 802.11 based Ad Hoc networks. Selfish misbehavior involves disobeying standard protocol mechanisms to gain unfair access to the channel at the expense of ...