Sub-communities within this community

Collections in this community

Recent Submissions

  • Mitigating jamming attack: a game-theoretic perspective 

    Wang, Qiwei; Nguyen, Thinh; Pham, Khanh D.; Kwon, Hyuck M. (IEEE, 2018-07)
    In this paper, the problem of minimizing the damaging effect on the frequency-hopping spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel ...
  • Side-channel inference attacks on mobile keypads using smartwatches 

    Maiti, Anindya; Jadliwala, Murtuza Shabbir; He, Jibo; Bilogrevic, Igor (IEEE, 2018-09-01)
    Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of onboard sensors provides an additional attack surface to malicious software and services on these ...
  • Empirical and strong coordination via soft covering with polar codes 

    Chou, Remi; Bloch, Matthieu R.; Kliewer, Jorg (IEEE, 2018-07)
    We design polar codes for empirical coordination and strong coordination in two-node networks. Our constructions hinge on the fact that polar codes enable explicit low-complexity schemes for soft covering. We leverage this ...
  • The novel normalized method for interference suppression at subarray level 

    Yang, Zhitao; Zhang, Guanglei (IEEE, 2018)
    As the dramatic development of the computer and digital signal process techniques, the phase array radar becomes more and more important for many different kinds of military applications. In order to survive in the complicated ...
  • The novel adaptive method for interference suppression 

    Yang, Zhitao; Zhang, Guanglei (IEEE, 2018)
    As the dramatic advancement in array signal processing and the computer techniques, the phase array radar becomes more and more popular. However, the electromagnetic environment is more and more complicated with different ...
  • The sidelobe power suppression for the aircraft circle phase array radar 

    Wang, Dan (IEEE, 2018)
    As the air force becomes more and more important, it is very important to improve the performance of object tracking. The circle phase array radar is adopted to improve the object tracking ability. However, it is very ...
  • Performance analysis for linear minimum variance adaptive beamforming 

    Yang, Zhitao; Zhang, Guanglei (IEEE, 2018)
    As the dramatic advancement in array signal processing techniques, the phase array radar is widely used in different aspects. However, the electromagnetic environment becomes more and more complicated since there are more ...
  • The general sidelobe cancellation based on linear minimum variance at subarray level 

    Wang, Dan; Zhang, Guanglei (IEEE, 2018)
    As the electromagnetic environment becomes more and more complicated with different kind of interference, it is very important to suppress interference for the electromagnetic devices. In this paper, we propose a novel ...
  • The adaptive interference suppression method based on householder at subarray level 

    Wang, Dan; Zhang, Guanglei (IEEE, 2018)
    As the phase array meets the complicated with different kind of interference, it is very important to improve the interference suppression performance of the phase array radar. In this paper, we propose a novel adaptive ...
  • Advanced subspace projection method for interference suppression in phase array radar 

    Yang, Zhitao; Zhang, Guanglei (IEEE, 2018)
    Abstract: As the dramatic development of the radar system, the phase array radar is widely used in military. There are more and more techniques adopted to improve the performance of the phase array radar. The most important ...
  • A mobile-enabled micro communication device for biosensing 

    Vuka, Phani kumar; Behfarnia, Ali; Eslami, Ali (IEEE, 2017)
    Our goal is to design and ultimately prototype a communication device that can circulate inside the human body and communicate with a wearable or handheld device such as a cell phone. Despite tremendous efforts in miniaturized ...
  • A new approach for detecting copy-move forgery in digital images 

    Shabanian, Hanieh; Mashhadi, Farshad (IEEE, 2017-11)
    The copy-move forgery is a common way to manipulate the digital images, which copied regions come from the same image. The detection process of altered regions is known as forgery detection. In this paper, we propose a new ...
  • Improved maximum inner product search with better theoretical guarantee using randomized partition trees 

    Keivani, Omid; Sinha, Kaushik; Ram, Parikshit (Springer US, 2018-06)
    Recent interest in the problem of maximum inner product search (MIPS) has sparked the development of new solutions. The solutions (usually) reduce MIPS to the well-studied problem of nearest-neighbour search (NNS). To ...
  • A mobile enabled micro communication device for biosensing 

    Vuka, Phani kumar (Wichita State University, 2017-12)
    In the recent decade, the e-health care industry has seen a rapid growth in state-of-the-art advancement in many related fields. The ability of biosensors to stimulate and continuously monitor vital organs has proven to ...
  • Software defined wireless mesh networks: from theory to practice 

    Pinyoanuntapong, Pinyarash (Wichita State University, 2017-12)
    Wireless mesh network (WMN) integrating with Software De ned Network (SDN) has been considered as a remarkable technology in the communication eld since it has the potential to provide Internet broadband access with ...
  • Robotic manta ray propelled by servo actuated pectoral fin 

    Chitti, Sandeep Reddy (Wichita State University, 2017-12)
    Manta Ray is natural sample for lift based propelling robotic fishes. Pectoral fins that exhibit flapping motions are crucial for actuation of bio-mimic robotic Rays. In this research, a two-dimensional maneuverable ...
  • Demand side management for residential consumers considering distribution system requirements 

    Gomes, Thanappuhettige Nipuna Mihiranga (Wichita State University, 2017-12)
    One of the focus areas of the smart-grid initiative is residential level demand response. Literature presents numerous demand response and load control programs. Some of the recent surveys analyze price-responsive demand ...
  • A secure cloud migration framework for cloud computing 

    Jainish Rajesh Jain (Wichita State University, 2017-12)
    The cloud computing environment has attained universal embrace in contemporary world. Its opulence is due predominantly to consumers' potential to use cloud amenities on demand with pay as you use protocol, which has ...
  • Jacobian based power flow model for distribution network 

    Hakmi, Sultan H. (Wichita State University, 2017-12)
    With the increase penetration of renewable energy sources (RES) at the distribution level, the possibility of having voltage abnormalities is high. The reason being is because of the intermittent nature of the renewable ...
  • Digital video broadcast satellite - second generation under Jakes fading channel 

    Habib, Ashfia Binte (Wichita State University, 2017-12)
    Jakes fading has been studied for a long time. The new model of Jakes fading has been introduced around 1993 and has been widely used for mobile and radio communication. It has been a practical approach of Jakes fading ...

View more