Browsing Electrical Engineering and Computer Science by Title
Now showing items 1-20 of 1113
-
2(4) Factorial Design for Joint Effect of Ambient temperature and capacitor price, size and phase kVArs on line loss
(IEEE, 2014-07)In this paper a single replicate of a 24 factorial design for the joint effect of four factors-ambient temperature, capacitor price, capacitor size and capacitor phase kVArs-on line loss is presented. Each Factor has two ... -
A brain-inspired framework for evolutionary artificial general intelligence
(Wichita State University, 2020-05)From the medical field to agriculture, from energy to transportation, every industry is going through a revolution by embracing artificial intelligence (AI); nevertheless, AI is still in its infancy when compared to the ... -
A comparative study of time and energy savings due to near field communication technology
(Wichita State University, 2016-04-29)The popularity and demand for the Near Field Communication (NFC) applications are rapidly growing in the recent years. NFC technology helps transfer data by bringing two smart devices closer (5-10 cm). Many important ... -
A DC-DC converter with high-voltage step-up ratio and reduced-voltage stress for renewable energy generation systems
(Wichita State University, 2018-12)This research work presents a high gain direct current-direct current (DC-DC) converter which is derived from a traditional boost converter. Electrical power systems are changing from a centralized generation model to a ... -
A directory based hybrid cache update strategy to reduce memory latency of shared memory multiprocessors
(Wichita State University, 2016-04-29)Multiple cores with a shared memory on a single-chip provide an excellent architecture to achieve fast computation. However, shared memory multiprocessors with typical write update and write invalidate strategies suffer ... -
A fast time series power flow method for active distribution system control applications
(Wichita State University, 2021-05)Power system balancing, where supply of energy has to equal demand all time, is a very important constraint for electric power systems. In recent years, number of Distributed Energy Resources (DERs) and penetration of ... -
A flexible application layer approach to data aggregation
(Wichita State University, 2014-07)Data aggregation techniques traditionally utilize cross-layer optimizations, which prove challenging to implement and are applicable only to a few related scenarios, while each new scenario requires a new approach. Proposed ... -
A framework for measuring post-attack system-wide anonymity in anonymous communication systems
(Wichita State University, 2018-12)We develop techniques for measuring the amount of anonymity provided by anonymity systems in the aftermath of attacks. Anonymity systems are special systems that enable their users to carry out anonymous communication over ... -
A graphical approach for designing a unified PID controller with a Smith predictor
(Wichita State University, 2021-04-02)Classical and modern control systems separate design techniques into two camps, one designated for continuous-time systems, while the other handles systems that exhibits discrete response behavior. A unified approach offers, ... -
A hybrid physics aware learning based transmission line resistance estimation algorithm for dynamic line rating application
(Wichita State University, 2021-05)The worldwide push towards a more intelligent, connected and reliable electric power delivery system has led to the propagation of a wide range of new technologies and ideas within the power grid infrastructure. Thus, the ... -
A line-by-line data accountability framework to enhance security of cloud
(Wichita State University, 2016-04-29)Cloud technology provides the convenience of access to data from anywhere in a time- and cost-effective manner. Due to the recent security breaches, users' fear of losing control of their own data has increased. Data-security ... -
A market-driven framework towards environmentally sustainable mobile computing
(2014-06-16)Amid the plethora of initiatives and research endeavors targeting the minimization of power and energy consumption of information and communication technologies (ICT), what has been largely missing is an effort to reduce ... -
A method for generating near optimal t-closed equivalence classes
(Wichita State University, 2021-05)A huge volume of data emanates from various digital sources, this data having sensitive information is being stored and released for purposes that serve the common good through the advancement of knowledge. Organizations ... -
A mobile enabled micro communication device for biosensing
(Wichita State University, 2017-12)In the recent decade, the e-health care industry has seen a rapid growth in state-of-the-art advancement in many related fields. The ability of biosensors to stimulate and continuously monitor vital organs has proven to ... -
A new transmission control protocol for active RFID networks
(2014-05-13)In this paper a new transmission control protocol named IISS for active RFID networks is proposed that utilizes the concept of scanning the network for successful and unsuccessful slots using lesser number of bits (compared ... -
A novel spoofing detection methodology using acoustics and liveness monitoring system
(Wichita State University, 2014-12)Standard networking protocols can be very vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity. There are several ways to spoof the facial recognition using photograph, ... -
A parallel light-emitting diode string driver with high dimming ratio
(Wichita State University, 2015-05)Light-emitting diodes (LEDs) have become a good alternative to traditional cold cathode fluorescent lamps (CCFLs) for backlighting sources in liquid crystal displays (LCDs). LED backlighting provides a number of benefits ... -
A promising MALAB assisted image segmentation for detecting breast cancer
(Wichita State University, 2016-04-29)Breast cancer is the most common cancer among American women; about 1 in 8 (12%) women in the U.S. will develop invasive breast cancer during their lifetime; and more dangerously, breast cancer is the second leading cause ... -
A promising security protocol for protecting near field communication devices from networking attacks
(Inderscience Enterprises Ltd., 2017)Near field communication (NFC) is vulnerable to numerous networking attacks such as tag manipulation. In this work, a security protocol for the NFC chip is introduced to protect the NFC devices and associated data from ... -
A secure cloud migration framework for cloud computing
(Wichita State University, 2017-12)The cloud computing environment has attained universal embrace in contemporary world. Its opulence is due predominantly to consumers' potential to use cloud amenities on demand with pay as you use protocol, which has ...