Browsing EECS Faculty Scholarship by Title
Now showing items 294-313 of 656
-
A learner-centered computational experience in nanotechnology for undergraduate STEM students
(IEEE, 2016)According to recent studies, the current state of Science, Technology, Engineering, and Mathematics (STEM) education in the U.S. has not been impressive. In this paper, we introduce an interdisciplinary learner-centered ... -
Learning robotic grasping strategy based on natural-language object descriptions
(IEEE, 2018-10)Given the description of an object's physical attributes, humans can determine a proper strategy and grasp an object. This paper proposes an approach to determine grasping strategy for an anthropomorphic robotic hand simply ... -
Learning the truth by weakly connected agents in social networks using multi-Armed Bandit
(IEEE, 2020-11-09)This article provides a study into the social network where influential personalities collaborate positively among themselves to learn an underlying truth over time, but may have misled their followers to believe a false ... -
Life time analysis of distribution transformer using experimental design
(IEEE, 2016)This paper presents a 24 factorial design to analyze the joint effect of loading, cooling characteristics, ambient temperature, and Oil Time Constant (OTC) on transformer Loss of Life (LOL). Transformer LOL is calculated ... -
Link availability and its effects on the capacity of mobile ad hoc wireless networks - an analytical approach
(IEEE, 2006-11-14)Mobile ad hoc wireless networks are expected to play a very important role in the future. Therefore, extensive research has been conducted to understand and analyze these networks under various conditions of strategic ... -
Link stability based enhancements to OLSR (LS-OLSR)
(IEEE, 2005-09-25)The proliferation of Ad-Hoc network based applications have greatly increased the need for robust proactive routing protocol like Optimized Link State Routing (OLSR). OLSR uses Multipoint Relays (MPRs) for controlled ... -
Link-renaming technique for efficiently increasing similarity among SDN entries
(IEEE, 2019)Software-defined networking (SDN) is an evolved concept to network's architecture with a centralized form of network controlling. The centralized nature of SDN has raised concerns regarding the high demand for communication ... -
Local detection of distribution level faults in a distributed sensor monitoring network using HMM
(IEEE, 2016-12-15)The Smart distribution system initiative requires an increased usage of the distribution feeder-level communication infrastructure to improve automation. Using a distributed sensor network for monitoring the distribution ... -
Local voting games for misbehavior detection in VANETs in presence of uncertainty
(IEEE, 2019)Cooperation between neighboring vehicles is an effective solution to the problem of malicious node identification in vehicular ad hoc networks (VANETs). However, the outcome is subject to nodes' beliefs and reactions in ... -
LocJam: a novel jamming-based approach to secure localization in wireless networks
(IEEE, 2014-01)Location discovery is an essential service in modern wireless consumer devices such as smartphones and mobile PCs. Existing anchor or base station-based positioning systems work well in non-hostile scenarios, but their ... -
Loss allocation control in power distribution system reconfiguration in the presence of distributed generators
(IEEE, 2014-07)In a deregulated power distribution system with distributed generation, end users should be allocated the appropriate cost of energy transactions for fair and effective operation. One of the common practices is to allocate ... -
Low-complexity secret sharing schemes using correlated random variables and rate-limited public communication
(IEEE, 2021-07-12)We consider secret sharing where a dealer wants to share a secret with several participants such that predefined subsets of participants can reconstruct the secret and all other subsets of participants cannot learn any ... -
LRU-FP algorithm with dual threshold
(International Society for Computers and Their Applications, 1998-11) -
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
(Elsevier B.V., 2016-01)Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others in proximity. When disclosing ... -
MagicHand: context-aware dexterous grasping using an anthropomorphic robotic hand
(IEEE, 2020-09-15)Understanding of characteristics of objects such as fragility, rigidity, texture and dimensions facilitates and innovates robotic grasping. In this paper, we propose a context- aware anthropomorphic robotic hand (MagicHand) ... -
MagicHand: In-hand perception of object characteristics for dexterous manipulation
(Springer Nature, 2018)An important challenge in dexterous grasping and manipulation is to perceive the characteristics of an object such as fragility, rigidity, texture, mass and density etc. In this paper, a novel way is proposed to find these ... -
Marginal levelized cost of energy bases optimal operation of distribution system considering photovoltaics
(IEEE, 2017)The significant increase in Distribution Generation (DG) technologies such as solar and wind can provide environmental and economic benefits. However, uncontrolled solar and wind penetration at distribution level can have ... -
Maximizing data preservation in intermittently connected sensor networks
(IEEE, 2012-10)In intermittently connected sensor networks, wherein sensor nodes do not always have connected paths to the base station, preserving generated data inside the network is a new and challenging problem. We propose to preserve ... -
Maximum diversity in web application user action privacy
(IEEE, 2020-02-13)Popular web application features, like autosuggestion and auto-correction, are well-known to amply reveal input actions entered by their users to any eavesdroppers, by generating sufficiently unique network activity bursts ...