Browsing EECS Faculty Scholarship by Title
Now showing items 350-369 of 656
-
Nanoporous impedemetric biosensor for detection of trace atrazine from water samples
(Elsevier, 2012-02-15)Trace contamination of ground water sources has been a problem ever since the introduction of high-soil-mobility pesticides, one such example is atrazine. In this paper we present a novel nanoporous portable bio-sensing ... -
A near-optimal algorithm for differentially-private principal components
(Microtome Publ, 2013-09)The principal components analysis (PCA) algorithm is a standard tool for identifying good low-dimensional approximations to high-dimensional data. Many data sets of interest contain private or sensitive information about ... -
A nearest neighbor architecture to overcome dephasing
(Springer, 2013-01)We design a nearest-neighbor architectural layout that uses fixed positive and negative couplings between qubits, to overcome the effects of relative phases due to qubit precessions, both during idle times and gate operations. ... -
Neuro-fuzzy based UPQC controller for power quality Improvement in micro grid system
(IEEE, 2016)This paper demonstrates the Power Quality enhancement of grid interactive micro grids. The Power Quality problem is addressed by Unified Power Quality Conditioner (UPQC) which provides a cooperative control on voltage ... -
A new algorithm for reliability assessment of distribution system based on reliability network equivalent technique
(IEEE, 2018-06)This paper proposes an algorithm to incorporate the reliability network equivalent concept into reliability assessment of complex radial distribution networks (RDNs). Using this concept, there is no need to analyze the ... -
A new anti-collision protocol for RFID networks
(IEEE, 2014-04-09)The speed at which RFID tags are read is critical to many RFID applications. Tag collisions can increase the time to gather information from tags in RFID networks. These collisions are unavoidable; however the time spent ... -
A new approach for detecting copy-move forgery in digital images
(IEEE, 2017-11)The copy-move forgery is a common way to manipulate the digital images, which copied regions come from the same image. The detection process of altered regions is known as forgery detection. In this paper, we propose a new ... -
A new method for public involvement in electric transmission line routing
(IEEE, 2010-04-19)Public participation in and acceptance of routing decisions for electric transmission lines has delayed and prevented the construction of numerous lines in recent decades. A new method of public participation called ... -
Node authentication in networks using zero-knowledge proofs
(Idea Group, 2007)Zero-knowledge proof (ZKP) based authentication protocols provide a smart way to prove an identity of a node without giving away any information about the secret of that identity. There are many advantages as well as ... -
Node voltage estimation of distribution system using artificial neural network considering weather data
(IEEE, 2021-04-19)Load flow analysis using traditional methods for power flow is becoming complex (reverse power flow and voltage volatility) due to the configuration complexity brought about by renewable energy resource (RER) integration. ... -
NOMA-based energy-efficient wireless powered communications
(IEEE, 2018-09)In this paper, we study the performance of non-orthogonal multiple access (NOMA) schemes in wireless powered communication networks (WPCN) focusing on the system energy efficiency (EE). We consider multiple energy harvesting ... -
Noncooperative AF schemes for wireless mobile networks under jamming environment
(IEEE, 2011-11-07)Communication between mobile relays has recently gained much attention. In this paper, a novel optimal diagonal relay amplifying matrix based on the minimum mean square error (MMSE) criterion is proposed for mobile nodes. ... -
Noncooperative distributed wireless relay networks under channel uncertainty and power constraint
(IEEE, 2011-07-31)This paper derives an optimum relay amplifying matrix for a wireless relay network under channel uncertainty and received power constraints at the destination node. To achieve this objective, an amplify-and-forward strategy ... -
Nonfullerene organic photovoltaic cells exhibiting 13.76% efficiency by employing upside-down solvent vapor annealing
(John Wiley & Sons, 2019-09-10)Organic photovoltaic cells (OPVs) are fabricated with a polymer donor PM7 and a nonfullerene acceptor IT-4Cl; the morphology of active layers is optimized by employing upside-down solvent vapor annealing (UD-SVA) method ... -
Nonlinear spectrum compression for the hearing impaired via a frequency-domain processing algorithm
(IEEE, 2006-08-30)In this paper, the results of both normal-hearing, and profoundly hearing-impaired adults, tested with spectrum compressed speech via the modified chirp-z algorithm, with and without visual stimuli, are reported. Ten ... -
A Note on "Amplify-and-Forward Relay Networks under Received Power Constraint"
(IEEE, 2013-10)This letter is to correct the incorrect optimal relay coefficient at the k-th relay derived in [1] for an amplify-and-forward (AF) wireless relay network under received power constraints. While the trends remain the same, ... -
The novel adaptive method for interference suppression
(IEEE, 2018)As the dramatic advancement in array signal processing and the computer techniques, the phase array radar becomes more and more popular. However, the electromagnetic environment is more and more complicated with different ... -
The novel adaptive weight algorithms for phase array radar
(IEEE, 2017)The adaptive weight at the subarray level is very important for the phase array radar. The phase array radar is widely used in the modern military. The adaptive weight algorithms are proposed to perform the interference ... -
A novel data logging framework to enhance security of cloud computing
(IEEE, 2016)Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the ... -
A novel design framework for embedded applications
(IEEE, 2020-03-05)Real-time microcontrollers are typically constrained to different performance parameters including code size, execution time, and power consumption. These system constraints cooperate with each other in a complicated way, ...