Browsing Engineering by Title
Now showing items 1986-2005 of 3509
-
MAC layer misbehavior detection and reaction in wireless networks
(Wichita State University, 2012-07)IEEE 802.11 wireless LAN medium access control (MAC) provides transmission fairness to nodes in a network. A misbehaving node can modify its MAC and operate in a selfish manner to improve its own performance (throughput) ... -
Mac layer misbehavior effectiveness and collective aggressive reaction approach
(Wichita State University, 2010-12)Current wireless MAC protocols are designed to provide an equal share of throughput to all nodes in the network. However, the presence of misbehaving nodes (selfish nodes that deviate from standard protocol behavior in ... -
Machine learning applied to programming quantum computers
(American Institute of Aeronautics and Astronautics, 2019-01-06)We apply machine learning to “program” quantum computers, both in simulation and in experimental hardware. A major difficulty in quantum computing is developing effective algorithms that can be programmed on a quantum ... -
Machine learning approach for truck-drones based last-mile delivery in the era of industry 4.0
(Elsevier Ltd, 2022-11-01)Under the vision of industry 4.0, the integration of drones in last-mile delivery can transform traditional delivery practices and provide competitive advantages. However, the combinatorial nature of the routing problem ... -
Machine number, priority rule, and due date determination in flexible manufacturing systems using artificial neural networks
(Elsevier, 2006-05-11)When there is a production system with excess capacity, i.e. more capacity than the demand for the foreseeable future, upper management might consider utilizing only a portion of the available capacity by decreasing the ... -
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
(Elsevier B.V., 2016-01)Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others in proximity. When disclosing ... -
Machining damage in edge trimming of CFRP
(TAYLOR & FRANCIS INC, 2012-05-24)Conventional machining processes such as turning, milling, drilling, abrasive cutting, and grinding are commonly used to bring composite parts to final shape and assembly requirements. However, due to the layered nature ... -
A macro level environmental performance comparison: dry machining process vs wet machining process
(2007-05)The metal cutting process, known as conventional machining process, utilizes cutting fluids to provide lubrication, cooling and easy chip removal. The long-term effects of cutting fluids disposal into the environment are ... -
MagicHand: context-aware dexterous grasping using an anthropomorphic robotic hand
(IEEE, 2020-09-15)Understanding of characteristics of objects such as fragility, rigidity, texture and dimensions facilitates and innovates robotic grasping. In this paper, we propose a context- aware anthropomorphic robotic hand (MagicHand) ... -
MagicHand: In-hand perception of object characteristics for dexterous manipulation
(Springer Nature, 2018)An important challenge in dexterous grasping and manipulation is to perceive the characteristics of an object such as fragility, rigidity, texture, mass and density etc. In this paper, a novel way is proposed to find these ... -
MagicHand: In-hand perception of object characteristics for dexterous manipulation
(Wichita State University, 2019-04-26)Perception of object materials improves the understanding of object characteristics such as fragility, rigidity, texture, mass and density, therefore facilitating and innovating robotic grasping. In this work, a novel way ... -
Magnetic and albumin targeted drug delivery for breast cancer treatment
(Wichita State University, 2011-07)This research work involves multifunctional magnetically targeted drug delivery microspheres for treatment against breast cancer. A combination therapy approach was followed by encapsulating two chemotherapeutics, ... -
Maintenance oriented optimal design of accelerated degradation testing
(2006-12)In this dissertation, the problem of using accelerated degradation testing data for reliability estimation is studied and demonstrated. Simulation and analytical approaches have been investigated. By simulation which ... -
Making the case for additive manufacturing: A review of cost models
(Wichita State University, 2020-05-01)Additive manufacturing (AM) is an emerging manufacturing method by which computer aided design models are directly made into products and structures. Layers of material, such as polymers, metals, ceramics, composites and ... -
Management of impacted cuspids using 3-D volumetric imaging
(PubMed, 2003-11)Management of impacted cuspids is a complex clinical problem involving proper assessment and interdisciplinary treatment planning. In this paper, we describe the use of 3-D volumetric imaging in the management of impacted ... -
Manufacturing and testing of emulsified micro and nano biodiesel blends using water and other natural resources for enhancement of fossil fuels
(Wichita State University, 2023-07)The pursuit of alternative energy and carbon footprint reduction has become the pinnacle of concern not only for nations all around the world but also for research scientists. Petroleum fuels such as diesel, gasoline, and ... -
Manufacturing, characterization, and modeling of graphene-based nanocomposites for aircraft structural and lightning strike applications
(Wichita State University, 2012-12)Research and development of graphene and graphene-based materials have been attracting significant interest since they were invented. This dissertation mainly focused on the graphene-based materials: (a) a fundamental ... -
Mapping a controller from the s-domain to z-domain using Magnitude Invariance Method (MIM).
(Wichita State University. Graduate School., 2007-04-27)We are presenting a new approach for mapping a continuous time controller to a discrete time controller. Methods traditionally used for this mapping include forward rectangular rule, bilinear rule and zero-pole matching. ... -
Mapping controllers from the s-domain to the z-domain using magnitude invariance and phase invariance methods.
(Wichita State University, 2007-12)Design by emulation has been widely used in the field of control systems. Design by emulation is a process where initially a continuous time controller is designed to achieve desired closed loop specifications. This ... -
Mapreduce implementation of Strassen's algorithm for matrix multiplication
(Wichita State University, 2017-05)Consider the multiplication C = A x B of two n x n matrices. A straight-forward sequential algorithm for computing the product takes ?(n 3 ) time. Strassen [17] presented an algorithm that takes ?(n lg 7) time; lg ...