Browsing EECS Faculty Scholarship by Title
Now showing items 308-327 of 656
-
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
(Elsevier B.V., 2016-01)Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others in proximity. When disclosing ... -
MagicHand: context-aware dexterous grasping using an anthropomorphic robotic hand
(IEEE, 2020-09-15)Understanding of characteristics of objects such as fragility, rigidity, texture and dimensions facilitates and innovates robotic grasping. In this paper, we propose a context- aware anthropomorphic robotic hand (MagicHand) ... -
MagicHand: In-hand perception of object characteristics for dexterous manipulation
(Springer Nature, 2018)An important challenge in dexterous grasping and manipulation is to perceive the characteristics of an object such as fragility, rigidity, texture, mass and density etc. In this paper, a novel way is proposed to find these ... -
Marginal levelized cost of energy bases optimal operation of distribution system considering photovoltaics
(IEEE, 2017)The significant increase in Distribution Generation (DG) technologies such as solar and wind can provide environmental and economic benefits. However, uncontrolled solar and wind penetration at distribution level can have ... -
Maximizing data preservation in intermittently connected sensor networks
(IEEE, 2012-10)In intermittently connected sensor networks, wherein sensor nodes do not always have connected paths to the base station, preserving generated data inside the network is a new and challenging problem. We propose to preserve ... -
Maximum diversity in web application user action privacy
(IEEE, 2020-02-13)Popular web application features, like autosuggestion and auto-correction, are well-known to amply reveal input actions entered by their users to any eavesdroppers, by generating sufficiently unique network activity bursts ... -
Maximum torque per ampere and maximum power per ampere sliding mode control for interior permanent magnet synchronous motors
(Taylor & Francis, 2021-10-14)This paper presents novel maximum torque per ampere (MTPA) and maximum power per ampere (MPPA) sliding mode control (SMC) approaches for interior permanent-magnet synchronous motors (IPMs). We first derive the first-order ... -
Measurement of Gaussian beam diameter using ronchi rulings
(IEEE, 1985-05-09)The analytical and experimental scope of the generalised Ronchi ruling method for the measurement of Gaussian laser beam diameter is presented. The effects of the ruling periodicity, ruling duty cycle, ruling type and the ... -
Measuring anonymity of pseudonymized data after probabilistic background attacks
(IEEE, 2017-05)There is clear demand among organizations for sharing their data for mining and other purposes without compromising the privacy of individual objects contained in the data. Pseudonymization is a simple, yet widely employed ... -
Measuring client-server anonymity
(Springer International Publishing, 2016)The primary intent of clients performing anonymous online tasks is to conceal the extent of their already encrypted communication with sensitive servers. We present an accurate method for evaluating the amount of anonymity ... -
Message passing for analysis and resilient design of self-healing interdependent cyber-physical networks
(IEEE, 2016)Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, that can lead to large scale cascading ... -
MIMO cognitive radio user selection with and without primary channel state information
(IEEE, 2016-02)In this paper, we study user selection (US) strategies for a multiple-input-multiple-output (MIMO) cognitive radio (CR) downlink network, where the r-antenna underlay CR secondary users (SUs) coexist with a primary user ... -
Mining android apps to recommend permissions
(IEEE, 2016)Permission mechanisms play a crucial role for ensuring privacy and security of Android mobile applications (apps). An Android app that requires access to the device resources must be granted specific permissions for its ... -
Minitrack on distributed, renewable and mobile resources
(IEEE Computer Society, 2021)Introduction to the conference mini-track on modeling, simulation and hardware developments; economic and system analyses; and studies of individual and organizational behavior and decision making as pertaining to ... -
Mirror inverse operations in linear nearest neighbors using dynamic learning algorithm
(IEEE, 2016-01)We propose a new method to implement mirror inverse gate operations in 1-D linear nearest neighbor (LNN) array coupled through diagonal interactions, using a dynamic learning algorithm. This is accomplished by training a ... -
Misbehavior detection in ephemeral networks: a local voting game in presence of uncertainty
(IEEE, 2019-12-19)Emerging short-lived (ephemeral) connections between wireless mobile devices have raised concerns over the security of ephemeral networks. An important security challenge in these networks is to identify misbehaving nodes, ... -
Mitigating jamming attack: a game-theoretic perspective
(IEEE, 2018-07)In this paper, the problem of minimizing the damaging effect on the frequency-hopping spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel ... -
Mitigation of subsynchronous resonance in power grid integrated with PV power station
(IEEE, 2019-03-14)This paper presents the alleviation of subsynchronous resonance (SSR) in the power system with large scale PV power station, in synchronous generator which is connected to series compensated transmission line. The rapid ... -
MMSE relaying strategies under jamming, channel uncertainty, node geometry, and power constraint
(IEEE, 2013)An amplify-and-forward (AF) relay network has been studied extensively, but a closed form of an optimal AF relaying matrix is not available yet for the distributed AF relay network with the destination power constraint ... -
MMSE relaying strategy for two-way amplify-and-forward wireless networks
(IEEE, 2013)This paper studies amplify-and-forward (AF) relay strategies for two-way wireless relay networks consisting of two sources with a single antenna and multiple relays with a single antenna. The closed form of relay amplifying ...