Electrical Engineering and Computer Science
Sub-communities within this community
-
EECS Faculty Scholarship
publications of EECS faculty
Collections in this community
-
EECS Graduate Student Conference Papers
This collection includes research papers, reports, and presentations of graduate students. -
EECS Theses and Dissertations
Collection of Master's theses and Ph.D. dissertations completed at the Dept. of Electrical Engineering and Computer Science
Recent Submissions
-
A brain-inspired framework for evolutionary artificial general intelligence
(IEEE, 2020-12)From the medical field to agriculture, from energy to transportation, every industry is going through a revolution by embracing artificial intelligence (AI); nevertheless, AI is still in its infancy. Inspired by the evolution ... -
Learning the truth by weakly connected agents in social networks using multi-Armed Bandit
(IEEE, 2020-11-09)This article provides a study into the social network where influential personalities collaborate positively among themselves to learn an underlying truth over time, but may have misled their followers to believe a false ... -
Deep Learning for Optimal Resource Allocation in IoT-enabled Additive Manufacturing
(IEEE, 2020-10-13)Additive manufacturing is revolutionizing the way that we produce, deliver, and consume objects in many industries. Compared to traditional manufacturing, where large factories mass produce objects far away from consumers, ... -
Eyebrow deserves attention: upper periocular biometrics
(IEEE, 2020-10-02)Ocular biometrics is attracting exceeding attention from research community and industry alike thanks to its accuracy, security, and ease of use in mobile devices, especially in the presence of occlusions such as masks ... -
Comparison of machine learning and deep learning models for network intrusion detection systems
(MDPI AG, 2020-09-30)The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is ... -
Constructive precoder design for single beam multiuser satellite system with PSK signals
(IEEE, 2020-08-21)In satellite systems downlink transmission, multiuser interference from other users often poses severe degradation to the performance. It is commonly mitigated or removed to maintain the quality of service (QoS). In this ... -
MagicHand: context-aware dexterous grasping using an anthropomorphic robotic hand
(IEEE, 2020-09-15)Understanding of characteristics of objects such as fragility, rigidity, texture and dimensions facilitates and innovates robotic grasping. In this paper, we propose a context- aware anthropomorphic robotic hand (MagicHand) ... -
Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering
(Springer, 2020-09-30)Recent radio channel measurements in peer-to-peer (P2P) and mobile-to-mobile network indicate that, depending on the mobility of the terminals and scattering properties of the environment, the predominate fading mechanism ... -
Transmission congestion management considering EV parking lots and demand response programmes
(Taylor and Francis Ltd, 2020-10-07)Transmission congestion is one of the key elements affecting spike price and local market power. Reducing the demand and increasing the generation in distribution network may lead to relive the congestion of a transmission ... -
Optimal auction for delay and energy constrained task offloading in mobile edge computing
(Elsevier B.V., 2020-12-24)Mobile edge computing has emerged as a promising paradigm to complement the computing and energy resources of mobile devices. In this computing paradigm, mobile devices offload their computing tasks to nearby edge servers, ... -
Assessment of economic value of assistive technologies through quality-adjusted work-life years (qawly)
(Springer, 2020-09-04)Assistive technologies (ATs) are commonly used to improve the quality of life of persons with disabilities. While their utility to a person is usually clear, their cost-effectiveness or economic value is often unclear. ... -
Ibeaconmap: Automated indoor space representation for beacon-based wayfinding
(Springer, 2020-09)Traditionally, there have been few options for navigational aids for the blind and visually impaired (BVI) in large indoor spaces. Some recent indoor navigation systems allow users equipped with smartphones to interact ... -
Geospatial Cyberinfrastructure for regional economic Growth
(IEEE, 2020-08-04)Cyberinfrastructure (CI) has potential to assist economic activities that involve real-time data analytics. Important challenges include the integration of essential geospatial principles (such as spatial constraints in ... -
Random projection-based auxiliary information can improve tree-based nearest neighbor search
(Elsevier, 2021-02-06)Nearest neighbor search using random projection trees has recently been shown to achieve superior performance, in terms of better accuracy while retrieving less number of data points, compared to locality sensitive hashing ... -
SSIoT: Energy-efficient optimal Admission Control for Body Area Networks
(IEEE, 2020-06-30)This paper proposes an optimal Admission Control (AC) scheme for Body Area Networks (BANs). The scheme captures BAN characteristics, such as limited buffer size and power consumption of sensor nodes, and QoS-sensitive ... -
Secure distributed storage: rate-privacy trade-off and XOR-based coding scheme
(IEEE, 2020-06)We consider the problem of storing data in a distributed manner over T servers. We require the data (i) to be recoverable from the T servers, and (ii) to remain private from any T -1 colluding servers, where privacy is ... -
Explicit construction of multiple access channel resolvability codes from source resolvability codes
(IEEE, 2020-06)We show that the problem of code construction for multiple access channel resolvability can be reduced to the simpler problem of code construction for source resolvability. Specifically, we propose a multiple access channel ... -
Modeling the evolution of open quantum systems
(Wichita State University, 2020-07)The motivation for the research is to find a method to describe the evolution of an open single qubit system since the Schrödinger equation cannot be used. Therefore, to do this, the single qubit is first coupled to another ... -
A method for t-close anonymization in the presence of multiple numerical sensitive attributes
(Wichita State University, 2020-05)Privacy Preserving Data Publishing is an area of research focused on developing methods of anonymizing sensitive relational data such that it can be published without compromising the privacy of the individuals the data ... -
Optimization of electric vehicle charging schedule using distributed network computing
(Wichita State University, 2020-05)In recent years, the number of electric vehicles has increased dramatically, and the forecast shows that this speed of growth will accelerate even more over the next ten years. The significant growth in the number of ...