Browsing Electrical Engineering and Computer Science by Title
Now showing items 564-583 of 1121
-
MAC layer misbehavior detection and reaction in wireless networks
(Wichita State University, 2012-07)IEEE 802.11 wireless LAN medium access control (MAC) provides transmission fairness to nodes in a network. A misbehaving node can modify its MAC and operate in a selfish manner to improve its own performance (throughput) ... -
Mac layer misbehavior effectiveness and collective aggressive reaction approach
(Wichita State University, 2010-12)Current wireless MAC protocols are designed to provide an equal share of throughput to all nodes in the network. However, the presence of misbehaving nodes (selfish nodes that deviate from standard protocol behavior in ... -
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
(Elsevier B.V., 2016-01)Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others in proximity. When disclosing ... -
MagicHand: context-aware dexterous grasping using an anthropomorphic robotic hand
(IEEE, 2020-09-15)Understanding of characteristics of objects such as fragility, rigidity, texture and dimensions facilitates and innovates robotic grasping. In this paper, we propose a context- aware anthropomorphic robotic hand (MagicHand) ... -
MagicHand: In-hand perception of object characteristics for dexterous manipulation
(Springer Nature, 2018)An important challenge in dexterous grasping and manipulation is to perceive the characteristics of an object such as fragility, rigidity, texture, mass and density etc. In this paper, a novel way is proposed to find these ... -
MagicHand: In-hand perception of object characteristics for dexterous manipulation
(Wichita State University, 2019-04-26)Perception of object materials improves the understanding of object characteristics such as fragility, rigidity, texture, mass and density, therefore facilitating and innovating robotic grasping. In this work, a novel way ... -
Mapping a controller from the s-domain to z-domain using Magnitude Invariance Method (MIM).
(Wichita State University. Graduate School., 2007-04-27)We are presenting a new approach for mapping a continuous time controller to a discrete time controller. Methods traditionally used for this mapping include forward rectangular rule, bilinear rule and zero-pole matching. ... -
Mapping controllers from the s-domain to the z-domain using magnitude invariance and phase invariance methods.
(Wichita State University, 2007-12)Design by emulation has been widely used in the field of control systems. Design by emulation is a process where initially a continuous time controller is designed to achieve desired closed loop specifications. This ... -
Mapreduce implementation of Strassen's algorithm for matrix multiplication
(Wichita State University, 2017-05)Consider the multiplication C = A x B of two n x n matrices. A straight-forward sequential algorithm for computing the product takes ?(n 3 ) time. Strassen [17] presented an algorithm that takes ?(n lg 7) time; lg ... -
Marginal levelized cost of energy bases optimal operation of distribution system considering photovoltaics
(IEEE, 2017)The significant increase in Distribution Generation (DG) technologies such as solar and wind can provide environmental and economic benefits. However, uncontrolled solar and wind penetration at distribution level can have ... -
Mask - aware face recognition system
(Wichita State University, 2021-05)This work presents a novel approach to face recognition that recognizes faces both with and without facial masks worn during the Covid-19 pandemic. The two-fold contribution of this study are: evaluation of the hand-crafted ... -
Maximizing data preservation in intermittently connected sensor networks
(IEEE, 2012-10)In intermittently connected sensor networks, wherein sensor nodes do not always have connected paths to the base station, preserving generated data inside the network is a new and challenging problem. We propose to preserve ... -
Maximizing data preservation time in intermittently connected sensor networks
(Wichita State University, 2012-05)In intermittently connected sensor networks, wherein sensor nodes do have connected paths to the base station periodically, preserving generated data inside the network is a new and challenging problem. We propose to ... -
Maximizing the area coverage in constrained environment for mobile sensor network
(Wichita State University. Graduate School., 2006-04-28) -
Maximum diversity in web application user action privacy
(IEEE, 2020-02-13)Popular web application features, like autosuggestion and auto-correction, are well-known to amply reveal input actions entered by their users to any eavesdroppers, by generating sufficiently unique network activity bursts ... -
Maximum inner product search using memory efficient randomized partition trees
(Wichita State University, 2016-04-29)Finding the maximum inner product is a well-known problem and it has been used in many applications such as recommender systems. It is also known that this problem can be converted to a nearest neighbor problem using various ... -
Maximum torque per ampere and maximum power per ampere sliding mode control for interior permanent magnet synchronous motors
(Taylor & Francis, 2021-10-14)This paper presents novel maximum torque per ampere (MTPA) and maximum power per ampere (MPPA) sliding mode control (SMC) approaches for interior permanent-magnet synchronous motors (IPMs). We first derive the first-order ... -
Measurement of energy consumption in Wireless LANs and Radio Frequency Identification systems
(Wichita State University, 2011-07)As mobile hand-held devices such as cell phones and personal digital assistants are battery operated, it is important to minimize their energy consumption. The limited lifetime of the battery is always a problem for all ... -
Measurement of Gaussian beam diameter using ronchi rulings
(IEEE, 1985-05-09)The analytical and experimental scope of the generalised Ronchi ruling method for the measurement of Gaussian laser beam diameter is presented. The effects of the ruling periodicity, ruling duty cycle, ruling type and the ... -
Measuring anonymity of pseudonymized data after probabilistic background attacks
(IEEE, 2017-05)There is clear demand among organizations for sharing their data for mining and other purposes without compromising the privacy of individual objects contained in the data. Pseudonymization is a simple, yet widely employed ...