Now showing items 1015-1034 of 1121

    • Tag anti-collision algorithms for active and passive RFID networks with foresight 

      Baloch, Fariha (Wichita State University, 2014-05)
      In the world where initiatives to automate jobs are becoming a norm, it is no surprise that the interest in radio frequency identification (RFID) networks has grown exponentially. With RFID technology, organizations around ...
    • TAJA Racing 

      Nguyen, Thuan; Whitaker, A.J.; Christman, Joe; Esparza, Alex (2011-12-14)
      Cycling devices have evolved from the simple device that records speed to the complex devices out on the market. Today’s advancement in technology brings us the XiSport Cycling Training Device. The XiSport lets you do ...
    • Target tracking strategies for a nonlinear, flexible aircraft-inspired model 

      Chakravarthy, Animesh; Evans, Katie A.; Evers, Johnny; Kuhn, Lisa M. (IEEE, 2011-06-29)
      Aeroelastic wing micro aerial vehicle (MAV) concepts are being explored for military and civilian applications. However, on the whole, the issues of control of MAVs are largely unexplored. The authors seek to employ ...
    • Target/Object tracking using particle filtering 

      Kambhampati, Srisumakanth (Wichita State University, 2008-08)
      Particle filtering techniques have captured the attention of many researchers in various communities, including those in signal processing, communication and image processing. Particle filtering is particularly useful in ...
    • TCP state-based service differentiation in wireless network 

      Gorde, S.; Thanthry, Nagaraja; Pendse, Ravi (OPNETWORK 2003, 2003-08)
      In traditional computer networks, service differentiation is done based on application flows. This results in high packet loss for low priority traffic flows. If the low priority flows are TCP based applications then the ...
    • TCP-M: Multiflow transmission control protocol for Ad Hoc networks 

      Thanthry, Nagaraja; Kalamkar, Anand; Pendse, Ravi (Hindawi Publishing Corporation, 2006-03-13)
      Recent research has indicated that transmission control protocol (TCP) in its base form does not perform well in an ad hoc environment. The main reason identified for this behavior involves the ad hoc network dynamics. ...
    • Teaching an undergraduate class vs. graduate class: is there a difference? 

      Pendse, Ravi; Johnson, Everett L. (IEEE, 1996-11-06)
      During the past few years, prior to obtaining his doctorate, the first author had considerable experience and success teaching several undergraduate courses in digital system design. The observation that the courses were ...
    • Teaching protective relaying using a portable relay training laboratory 

      Gandhi, Aishwarya; Morinec, Allen G.; Summerford, Zachary; Carlone, Mallory; Kulkarni, Chinmay; Prabhakar, Manoj C.; Verma, Tarun (IEEE, 2021-04-11)
      This paper presents an original portable protective relay training laboratory aimed at teaching power systems students protective relaying to make them “Ready-to-Go Engineers” for working in the power systems industry. The ...
    • Teaching techniques-what works for me 

      Pendse, Ravi (1994-03)
    • Teaching VHDL- trials and tribulations 

      Pendse, Ravi (1997-04)
    • Teaching with OPNET: WSU’s experiences 

      Bhagavathula, Ravi; Thanthry, Nagaraja; Sambaari, A.; Pendse, Ravi (OPNETWORK 2002, 2002-08)
      Wichita State University is been offering many courses in the field of networking. Apart from gaining knowledge about different networking concepts, students at WSU get a chance to design and configure a live network using ...
    • The OS elixir: On the impact of operating system upgrades on mobile device lifespan 

      Yadav, Vinod Ramavadh (Wichita State University, 2015-05)
      With the rapid proliferation of mobile devices, the issues of energy consumed to manufacture these devices and the environmental impact of electronic waste comes to the fore. One avenue to improve upon these issues is to ...
    • A theoretical study on mobility and path duration estimate in manets 

      Chagantipati, Raj K. (Wichita State University, 2010-12)
      A Mobile Ad hoc Network (MANET) is a collection of mobile nodes that operate without any backbone infrastructure support. Implementation of MANETS is very useful in certain military applications and during emergency ...
    • Thin is green: Leveraging the thin-client paradigm for sustainable mobile computing 

      Ghose, Toolika; Namboodiri, Vinod; Pendse, Ravi (Elsevier B.V., 2015-07)
      Progress in the area of environmental sustainability for the mobile computing industry could be achieved by making advancement on two fronts: reducing the energy consumed by individual devices throughout their life cycle ...
    • Threat modeling of para-virtualized environments 

      Nagaraj, Rajeev (Wichita State University, 2011-12)
      Organizations are looking at various cost effective methods to reduce the overall cost of data storage systems. This measure is taken essentially to reduce the hardware that is currently being used for hosting servers. In ...
    • A three-dimensional approach towards measuring sender anonymity 

      Marappa Reddy, Umesh (Wichita State University, 2010-12)
      Privacy plays an indispensable role over internet transactions. There are existing methods in place which enhance the level of privacy over WorldWide Web (WWW). Anonymity intends to hide the identity of the user during ...
    • Throughput comparison of Shuffle-exchange networks with additional stages due to resource scheduling 

      Mashhadi, Farshad; Asaduzzaman, Abu; Chidella, Kishore K. (IEEE, 2017)
      Several approaches are introduced to increase the throughput and reliability of Multistage Interconnection Networks (MINs), mostly by changing the network architecture. When multiple sources in such a network try to send ...
    • Throughput-otimal LIFO policy for bounded delay in the presence of heavy-tailed traffic 

      Lin, Shih-Chun; Wang, Pu; Akyildiz, Ian F.; Luo, Min (IEEE, 2016)
      Scheduling is one of the most important resource allocation for networked systems. Conventional scheduling policies are primarily developed under light-tailed (LT) traffic assumptions. However, recent empirical studies ...
    • Tight bounds on one-pass map-reduce algorithms for matrix multiplication 

      Nagar, Ashita (Wichita State University, 2015-12)
      MapReduce is an effi t parallel computation model introduced by Google, for performing many large-scale computations, including matrix multiplication. Matrix multiplication can be done using either an one-pass or a two-pass ...
    • TiiCH : Interactive Whiteboard System 

      Amaranayake, Ashan; Nguyen, Kevin; Khadka, Jitendra; Dalpathado, Mahesh (2011-12-15)
      This TIICH system is designed to eliminate the use of chalkboards and whiteboards. Letting teachers fully enter the electronic world but at a minimal cost. We wanted to let teachers teach their class, write their notes, ...