Sub-communities within this community

  • Ravi Pendse [126]

    Selected works of Vice President Ravi Pendse

Collections in this community

Recent Submissions

  • Measuring anonymity of pseudonymized data after probabilistic background attacks 

    Bagai, Rajiv; Malik, Nafia; Jadliwala, Murtuza Shabbir (IEEE, 2017-05)
    There is clear demand among organizations for sharing their data for mining and other purposes without compromising the privacy of individual objects contained in the data. Pseudonymization is a simple, yet widely employed ...
  • Distributed timely throughput optimal scheduling for the Internet of Nano-Things 

    Akkari, Nadine; Wang, Pu; Jornet, Josep Miquel; Fadel, Etimad; Elrefaei, Lamiaa A.; Malik, Muhammad Ghulam Abbas; Almasri, Suleiman; Akyildiz, Ian F. (IEEE, 2016-12)
    Nanotechnology is enabling the development of miniature devices able to perform simple tasks at the nanoscale. The interconnection of such nano-devices with traditional wireless networks and ultimately the Internet enables ...
  • Optimizing Controller Area Network System for vehicular automation 

    Moniruzzaman, Md; Asaduzzaman, Abu; Mridha, Muhammad F. (IEEE, 2016)
    The use of advanced electronic control unit (ECU) in automotive industry is growing. Information collection and processing in systems with many ECUs face interruptions. Various bus standards for vehicles, such as Controller ...
  • A novel semantic knowledge engine using automated knowledge extraction from World Wide Web 

    Mabbu, Venkatesh; Asaduzzaman, Abu; Mridha, Muhammad F. (IEEE, 2016)
    It is extremely difficult for the existing search engines (such as Google and Bing) to crawl, index, rank, and manage huge amount of data and locate information. Semantic web technology (such as Google Knowledge Graph and ...
  • Path loss models for low-height mobiles in forest and urban 

    Ibdah, Yazan; Ding, Yanwu (Springer International Publishing, 2017-01)
    This paper presents path loss measurements at 2.1 GHz in forest and urban areas. Empirical path loss models have been presented for low-height dual-mobility channels. Three test scenarios are considered for the transmitter ...
  • Agile MU-MIMO in congested environments with robust channel estimation 

    Xiong, Wenhao; Mo, Zijian; Chen, Genshe; Pham, Khanh D.; Blasch, Erik; Kwon, Hyuck M. (IEEE, 2016)
    This paper proposes a novel multi-user multiple-input and multiple-output (MU-MIMO) selection and beam-forming technique for a geosynchronous orbit (GSO) satellite communication (SATCOM) system. The MU-MIMO technique employs ...
  • Jamming statistics-dependent frequency hopping 

    Hannon, Matthew; Feng, Shaung; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
    This paper studies a jamming statistics-dependent frequency-hopping (FH) pattern generation scheme. Most existing FH patterns are determined by two encryption keys: (a) one for FH in the frequency domain, and (b) the other ...
  • Boundaries of Signal-to-Noise Ratio for Adaptive Code Modulations 

    Pinyoanuntapong, Krittetash; Goswami, Madhuprana; Habib, Ashfia Binte; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
    Adaptive code modulation (ACM) has been studied for last two decades to enhance the bandwidth and power efficiency in a bandwidth-constrained and power-constrained communication system environment. This paper studies how ...
  • Effective assignment and assistance to software developers and reviewers 

    Zanjani, Motahareh Bahrami (Association for Computing Machinery, 2016)
    Human reliance and dominance are ubiquitous in sustaining a high-quality large software system. Automatically assigning the right solution providers to the maintenance task at hand is arguably as important as providing the ...
  • Message passing for analysis and resilient design of self-healing interdependent cyber-physical networks 

    Behfarnia, Ali; Eslami, Ali (IEEE, 2016)
    Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, that can lead to large scale cascading ...
  • Towards cloud-based crowd-augmented spectrum mapping for dynamic spectrum access 

    Janakaraj, Prabhu; Wang, Pu; Chen, Zheng (IEEE, 2016)
    Recently, large-scale spectrum measurements show that geo-location spectrum databases, as recommended by regulators (e.g., FCC, Ofcom, ECC) for TV white space (TVWS) discovery are notoriously inaccurate in Metropolitan ...
  • An auspicious secure processing technique for near field communication systems 

    Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Salinas Monroy, Sergio A. Sergio A. (IEEE, 2016)
    The near field communication (NFC) technology helps save both time and power when compared with Bluetooth and other similar technologies. However, NFC is vulnerable to various networking attacks such as message modification. ...
  • Smartwatch-based keystroke inference attacks and context-aware protection mechanisms 

    Maiti, Anindya; Armbruster, Oscar; Jadliwala, Murtuza Shabbir; He, Jibo (Association for Computing Machinery, 2016)
    Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. ...
  • Efficient secure outstanding of large-scale quadratic programs 

    Salinas Monroy, Sergio A.; Luo, Changqing; Liao, Weixian; Li, Pan (Association for Computing Machinery, 2016)
    The massive amount of data that is being collected by today's society has the potential to advance scientific knowledge and boost innovations. However, people often lack sufficient computing resources to analyze their ...
  • IPMC-actuated robotic fish 

    Chen, Zheng; Bart-Smith, Hilary; Tan, Xiaobo (Springer Berlin Heidelberg, 2015-05-07)
    Excellent swimmers, such as tuna, rays, and goldfish, take advantage of their flexible fins, compliant bodies, and swimming bladders to achieve fast, highly maneuverable, and energy-efficient locomotion. Ionic polymer-metal ...
  • A framework for QoS-aware traffic classification using semi-supervised machine learning in SDNs 

    Wang, Pu; Lin, Shih-Chun; Luo, Min (IEEE, 2016)
    In this paper, a QoS-aware traffic classification framework for software defined networks is proposed. Instead of identifying specific applications in most of the previous work of traffic classification, our approach ...
  • Simulating multisensor noninvasive blood glucose monitoring systems 

    Asaduzzaman, Abu; Samadarsinee, Soumyashree; Chidella, Kishore K. (IEEE, 2016)
    Diabetes and related complications are responsible for early death - one person in every 7 seconds. Long term and short term complications due to diabetes can be reduced through proper diet, physical exercise, and medication. ...
  • An efficient simulation method using VisualSim to assess autonomous power systems 

    Asaduzzaman, Abu; Moniruzzaman, Md; Chidella, Kishore K.; Tamtam, Perlekar (IEEE, 2016)
    Autonomous power system (APS) that exploits local renewable energy sources has potential to provide useful energy at lower costs when compared with conventional energy. Modern APS involves the control of renewable energy ...
  • QoS-aware adaptive routing in multi-layer hierarchical software defined networks: a reinforcement learning approach 

    Lin, Shih-Chun; Akyildiz, Ian F.; Wang, Pu; Luo, Min (IEEE, 2016)
    Software-defined networks (SDNs) have been recognized as the next-generation networking paradigm that decouples the data forwarding from the centralized control. To realize the merits of dedicated QoS provisioning and fast ...
  • A novel data logging framework to enhance security of cloud computing 

    Jain, Jainish Rajesh; Asaduzzaman, Abu (IEEE, 2016)
    Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the ...

View more