The repository is currently being upgraded to DSpace 7. Temporarily, only admins can login. Submission of items and changes to existing items is prohibited until the completion of this upgrade process.
Browsing EECS Faculty Scholarship by Title
Now showing items 53-72 of 661
-
Battery energy storage-based strategy for suppressing wind farm's subsynchronous oscillation
(IEEE, 2019-10)In this paper, the battery energy storage supplementary damping control is introduced to suppress the subsynchronous oscillation of DFIG-based wind farm interfaced with series compensation. Firstly, the conventional control ... -
Benefit assessment of water-heater management on residential demand response: an event driven approach
(IEEE, 2016)Analysis, modeling and development of residential demand response schemes are vital for the next generation active distribution systems. Among residential level deferrable loads thermally controllable loads have shown a ... -
Big bang, small bucks; effective use of low-cost CAD packages
(IEEE, 1996-11-06)At Wichita State University the authors have implemented an undergraduate three-course sequence in digital system design and computer architecture. Key to the success of these courses are two inexpensive yet very effective ... -
Bio-inspired robotic fish propelled by multiple artificial fins
(American Society of Mechanical Engineers, 2017)With advances in actuation and sensing, smart materials has drawn a growing attention from researchers in under water robotic fish. In this paper, a compact, noiseless, and untethered biomimetic robotic fish propelled by ... -
Biometric systems with multiuser access structures
(IEEE, 2019-07)We propose a model for biometric systems with a multiuser access structure, where after enrollment only predefined authorized sets of participants are allowed to access the system upon presenting their biometrics. Two types ... -
Biometrics Fusion with Applications in Passenger Re-authentication for Automated Border Control Systems
(IEEE, 2020-03-12)Over 4.1 billion aircraft passengers flew in 2017. This number is expected to be nearly double by 2037. Due to the significant growth in airline services and passenger traffic, automated border control (ABC) systems have ... -
Bit level synchronized MAC protocol for multireader RFID networks
(Hindawi Publishing Corporation, 2010-07-12)The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency ... -
Blind detection design for AF two-way relaying over frequency selective channels
(Springer, 2021-09-18)This paper considers an amplify-and-forward two-way relay system with frequency selective fading channels. The knowledge of channel state information is assumed not available for all nodes. An efcient transmission and ... -
Blind detection with unique identification in two-way relay channel
(IEEE-INST electrical electronics engineers inc, 2012-07)This paper considers the blind detection for a two-way relay system in which two source nodes exchange information via a relay node by amplify-and-forward relaying. An efficient transmission scheme is first proposed to ... -
Blind transmission and detection designs with unique identification and full diversity for noncoherent two-way relay networks
(IEEE, 2014-09)This paper considers blind detection for a two-way relay system in which two source nodes exchange information with each other via a relay node using an amplify-and-forward (AF) protocol. The channel coefficients are assumed ... -
Boolean factor graph model for biological systems: The yeast cell-cycle network
(BMC, 2021-08-14)Background: The desire to understand genomic functions and the behavior of complex gene regulatory networks has recently been a major research focus in systems biology. As a result, a plethora of computational and modeling ... -
Boundaries of Signal-to-Noise Ratio for Adaptive Code Modulations
(IEEE, 2016)Adaptive code modulation (ACM) has been studied for last two decades to enhance the bandwidth and power efficiency in a bandwidth-constrained and power-constrained communication system environment. This paper studies how ... -
BRACER: a distributed broadcast protocol in multi-hop cognitive radio ad hoc networks with collision avoidance
(IEEE, 2015-03-01)Broadcast is an important operation in wireless ad hoc networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, since the ... -
A brain-inspired framework for evolutionary artificial general intelligence
(IEEE, 2020-12)From the medical field to agriculture, from energy to transportation, every industry is going through a revolution by embracing artificial intelligence (AI); nevertheless, AI is still in its infancy. Inspired by the evolution ... -
Bridging the generation gap
(IEEE, 2005-12)The demand for mobile service increase many service providers which they start finding solutions for integrating third and fourth generation networks and to develop mobility protocols. This article introduces the macromobility, ... -
Cache enhanced anonymity systems against probabilistic attacks
(Springer, Cham, 2018-05-29)The technique of data caching is being increasingly recognized for its ability to increase the amount of anonymity provided by an anonymous communication network, and is expected to be widely adopted in the next generation ... -
Cache isolation and thin provisioning of hypervisor caches
(IEEE, 2012-10)Server virtualization has enabled resource consolidation and has minimized the need for additional and expensive hardware. Server virtualization has been widely deployed in a lot of organizations, because of the attractive ... -
Cache modeling and optimization for portable devices running MPEG-4 video decoder
(Springer, 2006-01)There are increasing demands on portable communication devices to run multimedia applications. ISO (an International Organization for Standardization) standard MPEG-4 is an important and demanding multimedia application. ... -
Calea compliant secure voice over IP system
(IEEE, 2006-10)Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, security has become an important issue. The type ... -
Can cloud computing lead to increased sustainability of mobile devices?
(IEEE, 2012-05)When it comes to looking at energy efficiency and the concept of sustainability in computing, the focus has invariably been on data centers and mobile infrastructures like cell towers, as these have been considered the ...