Now showing items 5-15 of 15

  • Bit level synchronized MAC protocol for multireader RFID networks 

    Namboodiri, Vinod; Pendse, Ravi (Hindawi Publishing Corporation, 2010-07-12)
    The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency ...
  • Bridging the generation gap 

    Bahety, V.; Pendse, Ravi (IEEE, 2005-12)
    The demand for mobile service increase many service providers which they start finding solutions for integrating third and fourth generation networks and to develop mobility protocols. This article introduces the macromobility, ...
  • Comparative study of task allocation strategies in multirobot systems 

    Hatime, Hicham; Pendse, Ravi; Watkins, John Michael (IEEE-INST Electrical Electronics Engineers Inc, 2013-01)
    In this paper, we present a comparative study of three distributed strategies for task allocation in a multirobot system. The objective is to determine the course of action for each robot and the targets it needs to service. ...
  • Energy-aware routing protocol for Ad Hoc wireless sensor networks 

    Mann, Raminder P.; Namuduri, Kameswara; Pendse, Ravi (Hindawi Publishing Corporation, 2005-04-15)
    Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware ...
  • Joint time delay and frequency estimation without eigen-decomposition 

    Qasaymeh, Mahmoud Mohammad; Gami, Hirenkumar; Tayem, Nizar Abdel-Hafeeth Mohammad; Sawan, M. Edwin; Pendse, Ravi (2009-05)
    In this letter, we addressed the problem of estimating the time delay and the frequencies of noisy sinusoidal signals received at two spatially separated sensors. We employ the Propagator Method (PM) in conjunction with ...
  • Mobility and layer 2 tunnels 

    Bhagavathula, Ravi; Best, Patricia K.; Pendse, Ravi (2006)
    An increase in the size and requirements of a mobile workforce is driving the development of better mobility oriented services in terms of both content and connectivity. Even though traditional Mobile IP has been the ...
  • Quantitative analysis of enhanced mobile IP 

    Best, Patricia K.; Pendse, Ravi (2006-06)
    As the popularity of mobile computing grows, the associated protocols and their scalability are subject to much closer scrutiny. Mobile IP relies heavily on the use of IP-to-IP tunneling, requiring 20 bytes of overhead ...
  • Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis 

    Joshi, Deepti; Namuduri, Kameswara; Pendse, Ravi (Hindawi Publishing Corporation, 2005-05)
    Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ...
  • Security, internet connectivity and aircraft data networks 

    Thanthry, Nagaraja; Ali, Muhammad Sabeeh; Pendse, Ravi (2006-05)
    Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to ...
  • SVSS: Intelligent video surveillance system for aircraft 

    Thanthry, Nagaraja; Emmuadi, Indira P.; Srikumar, Aravind; Namuduri, Kameswara; Pendse, Ravi (2009-10)
    Safety and security are the most discussed topics in the aviation field. The latest security initiatives in the field of aviation propose [1I] the aircraft carriers to implement video surveillance within the aircraft ...
  • TCP-M: Multiflow transmission control protocol for Ad Hoc networks 

    Thanthry, Nagaraja; Kalamkar, Anand; Pendse, Ravi (Hindawi Publishing Corporation, 2006-03-13)
    Recent research has indicated that transmission control protocol (TCP) in its base form does not perform well in an ad hoc environment. The main reason identified for this behavior involves the ad hoc network dynamics. ...