Sub-communities within this community

Collections in this community

Recent Submissions

  • Distributed timely throughput optimal scheduling for the Internet of Nano-Things 

    Akkari, Nadine; Wang, Pu; Jornet, Josep Miquel; Fadel, Etimad; Elrefaei, Lamiaa A.; Malik, Muhammad Ghulam Abbas; Almasri, Suleiman; Akyildiz, Ian F. (IEEE, 2016-12)
    Nanotechnology is enabling the development of miniature devices able to perform simple tasks at the nanoscale. The interconnection of such nano-devices with traditional wireless networks and ultimately the Internet enables ...
  • Optimizing Controller Area Network System for vehicular automation 

    Moniruzzaman, Md; Asaduzzaman, Abu; Mridha, Muhammad F. (IEEE, 2016)
    The use of advanced electronic control unit (ECU) in automotive industry is growing. Information collection and processing in systems with many ECUs face interruptions. Various bus standards for vehicles, such as Controller ...
  • A novel semantic knowledge engine using automated knowledge extraction from World Wide Web 

    Mabbu, Venkatesh; Asaduzzaman, Abu; Mridha, Muhammad F. (IEEE, 2016)
    It is extremely difficult for the existing search engines (such as Google and Bing) to crawl, index, rank, and manage huge amount of data and locate information. Semantic web technology (such as Google Knowledge Graph and ...
  • Path loss models for low-height mobiles in forest and urban 

    Ibdah, Yazan; Ding, Yanwu (Springer International Publishing, 2017-01)
    This paper presents path loss measurements at 2.1 GHz in forest and urban areas. Empirical path loss models have been presented for low-height dual-mobility channels. Three test scenarios are considered for the transmitter ...
  • Agile MU-MIMO in congested environments with robust channel estimation 

    Xiong, Wenhao; Mo, Zijian; Chen, Genshe; Pham, Khanh D.; Blasch, Erik; Kwon, Hyuck M. (IEEE, 2016)
    This paper proposes a novel multi-user multiple-input and multiple-output (MU-MIMO) selection and beam-forming technique for a geosynchronous orbit (GSO) satellite communication (SATCOM) system. The MU-MIMO technique employs ...
  • Jamming statistics-dependent frequency hopping 

    Hannon, Matthew; Feng, Shaung; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
    This paper studies a jamming statistics-dependent frequency-hopping (FH) pattern generation scheme. Most existing FH patterns are determined by two encryption keys: (a) one for FH in the frequency domain, and (b) the other ...
  • Boundaries of Signal-to-Noise Ratio for Adaptive Code Modulations 

    Pinyoanuntapong, Krittetash; Goswami, Madhuprana; Habib, Ashfia Binte; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
    Adaptive code modulation (ACM) has been studied for last two decades to enhance the bandwidth and power efficiency in a bandwidth-constrained and power-constrained communication system environment. This paper studies how ...
  • What makes bugs get fixed in open source software?: A Replication study and a text-based approach 

    Wang, Haoren (Wichita State University, 2016-07)
    Bugs are the central force driving the many corrective maintenance and evolutionary changes in large-scale software systems. Over the years, many facets of bugs and their resolution haven been studied extensively. As ...
  • Optimal control in selective catalytic reduction using linear quadratic regulator 

    Hariharan, Aishvarya (Wichita State University, 2016-05)
    In current scenario, it is significant to have harmful emissions under control and supervision by deploying control technology is indispensable. In the thermal power plants, diesel engine industries hazardous gases are ...
  • Boundaries of signal-to-noise ratio for adaptive code modulations 

    Pinyoanuntapong, Krittetash (Wichita State University, 2016-07)
    Adaptive code modulation (ACM) has been studied for last two decades to enhance the bandwidth and power efficiency in a bandwidth-constrained and power-constrained communication system environment. Also, the existing digital ...
  • Analysis of consensus and collision avoidance using the collision cone approach in the presence of time delays 

    Khatiwada, Dipendra (Wichita State University, 2016-07)
    This thesis provides a framework for a combined analysis of consensus algorithms for multi-agent systems that include the presence of obstacles and the presence of communication time delays. The consensus algorithms are ...
  • Nano scaled antennas with metamaterial versus centimeter/millimeter scaled antennas without metamaterial 

    Goswami, Madhuprana (Wichita State University, 2016-07)
    This paper studies the effects of liquid crystal (e.g, 4-Cyano-4'-pentylbiphenyl [5CB]) as a substrate on the performance of a nano-antenna at very high frequency, 0.1 THz to 10 THz. Also, since the size and shape of the ...
  • Blind detection designs with unique identification in two-way relay channels 

    Li, Lun (Wichita State University, 2016-07)
    In amplify-and-forward (AF) two-way relay networks, information is exchanged be-tween two source nodes via a relay node by AF relaying. This dissertation develops the blind detection designs for various two-way relay systems ...
  • Effective assignment and assistance to software developers and reviewers 

    Zanjani, Motahareh Bahrami (Association for Computing Machinery, 2016)
    Human reliance and dominance are ubiquitous in sustaining a high-quality large software system. Automatically assigning the right solution providers to the maintenance task at hand is arguably as important as providing the ...
  • Message passing for analysis and resilient design of self-healing interdependent cyber-physical networks 

    Behfarnia, Ali; Eslami, Ali (IEEE, 2016)
    Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, that can lead to large scale cascading ...
  • Towards cloud-based crowd-augmented spectrum mapping for dynamic spectrum access 

    Janakaraj, Prabhu; Wang, Pu; Chen, Zheng (IEEE, 2016)
    Recently, large-scale spectrum measurements show that geo-location spectrum databases, as recommended by regulators (e.g., FCC, Ofcom, ECC) for TV white space (TVWS) discovery are notoriously inaccurate in Metropolitan ...
  • An auspicious secure processing technique for near field communication systems 

    Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Salinas Monroy, Sergio A. Sergio A. (IEEE, 2016)
    The near field communication (NFC) technology helps save both time and power when compared with Bluetooth and other similar technologies. However, NFC is vulnerable to various networking attacks such as message modification. ...
  • Smartwatch-based keystroke inference attacks and context-aware protection mechanisms 

    Maiti, Anindya; Armbruster, Oscar; Jadliwala, Murtuza Shabbir; He, Jibo (Association for Computing Machinery, 2016)
    Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. ...
  • Efficient secure outstanding of large-scale quadratic programs 

    Salinas Monroy, Sergio A.; Luo, Changqing; Liao, Weixian; Li, Pan (Association for Computing Machinery, 2016)
    The massive amount of data that is being collected by today's society has the potential to advance scientific knowledge and boost innovations. However, people often lack sufficient computing resources to analyze their ...
  • IPMC-actuated robotic fish 

    Chen, Zheng; Bart-Smith, Hilary; Tan, Xiaobo (Springer Berlin Heidelberg, 2015-05-07)
    Excellent swimmers, such as tuna, rays, and goldfish, take advantage of their flexible fins, compliant bodies, and swimming bladders to achieve fast, highly maneuverable, and energy-efficient locomotion. Ionic polymer-metal ...

View more