Browsing Electrical Engineering and Computer Science by Title
Now showing items 904-923 of 1121
-
SafeExit4All: An inclusive indoor emergency evacuation system for people with disabilities
(Association for Computing Machinery, Inc., 2019-05-13)Indoor wayfinding has remained a challenge for people with disabilities in unfamiliar environments. With some accessible indoor wayfinding systems coming to the fore recently, a major application of interest is that of ... -
Safety critical networks using commodity SDNs
(IEEE, 2021-05-05)Safety-critical networks often have stringent real-time requirements; they must also be resilient to failures. In this paper, we propose the RealFlow framework that uses commodity software-defined networks (SDNs) to realize ... -
Satellite digital beamforming with digital channelizer and it's performance under predistorted high power amplifier
(Wichita State University, 2019-12)This dissertation proposes for the rst time a simple combination of a digital channelizer and a digital predistorter (PD) to generate an output signal without intermodulation (IM) products even under a nonlinear memoryless ... -
Satellite digital channelizer with predistorted high-power amplifier
(IEEE, 2020-03-05)A geostationary earth orbit satellite requires high transmitting power (e.g., 20 dBW=100 watts) because the waveform traveling distance can be more than 36,000 km. Thus, it is necessary to operate close to the saturation ... -
Satellite jamming: a game theoretic analysis
(IEEE, 2017)In this paper, the problem of minimizing the damaging effect on the frequency hopping (FH) spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel ... -
Satellite MIMO digital beam-forming under nonlinear high-power amplifier and keyhole
(IEEE, 2019-04-11)In a satellite communication (Sat-Com) system, channel coefficients from multiple-input, multiple-output (MIMO) antennas are correlated strongly because of a long propagation distance and a narrow angle spread. This is ... -
SCADA security device: design and implementation
(Wichita State University, 2011-12)Securing SCADA systems is a critical aspect of Smart grid security. As sophisticated attacks continue to target industrial systems, the focus should be on planning and developing new security techniques that will adapt to ... -
Scalable meter data collection in smart grids through message concatenation
(IEEE, 2015-07)Advanced metering infrastructure (AMI) initiatives are a popular tool to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. There is the looming issue of how ... -
Scalable QoS provisioning for mobile networks using wireless sensors
(IEEE, 2004-03-21)In the past few years support for mobility has increased to a large extent. Mobile IP enables nodes to move from one network to the other while maintaining the same IP address. Minimal packet loss during handoff is a ... -
Secrecy rate of relay and intelligent reflecting surface antenna-assisted mimo
(Wichita State University, 2022-07)This thesis proposes the use of an amplify-and-forward (AF) relay in addition to intelligent reflecting surface (IRS) antennas to ensure higher secrecy rates compared to IRS-only multiple-input multiple-output (MIMO) ... -
Secret sharing from correlated Gaussian random variables and public communication
(IEEE, 2021-04-11)We study a secret sharing problem, where a dealer distributes shares of a secret among a set of participants under the constraints that (i) authorized sets of users can recover the secret by pooling their shares, (ii) ... -
Secret sharing over a public channel from correlated random variables
(IEEE, 2018)We consider a model for secret sharing, where a dealer distributes the shares of a secret among a set of participants with the constraint that only predetermined subsets of participants must be able to reconstruct the ... -
Secret-key generation in many-to-one networks: an integrated game-theoretic and information-theoretic approach
(IEEE, 2019-08)This paper considers secret-key generation between several agents and a base station that observe independent and identically distributed realizations of correlated random variables. Each agent wishes to generate the longest ... -
Secure and robust key management scheme for ad-hoc sensor networks
(Wichita State University. Graduate School., 2005-04-22) -
A secure architecture for the management of Radio Frequency Identification at home
(Wichita State University, 2007-07)Radio Frequency Identification (RFID) is an object identification technology that is being adopted rapidly by industry and government organizations, such as the United States Department of Defense, consumer products ... -
A secure architecture for the use of RFID at home
(Wichita State University. Graduate School., 2007-04-27)Radio Frequency Identification (RFID) tags are being adopted rapidly for item-level identification by retail giants such as Walmart. While this technology brings many benefits to consumers, it has also caused a lot of ... -
Secure cloud computing for pairwise sequence alignment
(Association for Computing Machinery, 2017)Today's massive amount of biological sequence data has the potential to rapidly advance our understanding of life's processes. However, since analyzing biological sequences is a very expensive computing task, users face a ... -
Secure distributed storage: rate-privacy trade-off and XOR-based coding scheme
(IEEE, 2020-06)We consider the problem of storing data in a distributed manner over T servers. We require the data (i) to be recoverable from the T servers, and (ii) to remain private from any T -1 colluding servers, where privacy is ... -
Secure message communication via a relay using a secret sharing scheme
(Wichita State University, 2023-07)Secure message communication between the transmitter and the receiver checks integrity. It involves preserving the message content against unauthorized access. The designed application uses a shamir secret sharing scheme, ... -
Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis
(Hindawi Publishing Corporation, 2005-05)Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ...