Now showing items 21-40 of 437

    • Airplane data networks and security issues 

      Ali, Muhammad Sabeeh; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-10-04)
      The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ...
    • Al-based BMI inference from facial images: An application to weight monitoring 

      Siddiqui, Hera; Rattani, Ajita; Kisku, Dakshina Ranjan; Dean, Tanner (IEEE, 2021-02-23)
      Self-diagnostic image-based methods for healthy weight monitoring is gaining increased interest following the alarming trend of obesity. Only a handful of academic studies exist that investigate AI-based methods for Body ...
    • An algorithm for the two dimensional FFT 

      Hoyer, Elmer. A.; Berry, W. (IEEE, 1977-05-01)
      Conventional two dimensional fast Fourier transforms become very slow if the size of the matrix becomes too large to be contained in memory. This is due to the transposition of the matrix that is required. This new algorithm ...
    • Alternate encryption scheme for VoIP traffic 

      Pendse, Ravi; Thanthry, Nagaraja; Gopalakrishnan, Gopinath (IEEE, 2009-10-05)
      Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data ...
    • Analysis of large scale distributed generation on radial distribution system: case study in Sri Lanka 

      Sivagnanam, Maheesa; Selvanayagam, Subaranjany; Thiruvaran, Tharmarajah; Vinothine, Shanmugarajah; Nandasiri, Nimanthi Upeka; Aravinthan, Visvakumar (IEEE, 2019-10)
      Large-scale penetration of distributed resources is becoming a reality in many parts of the world. Large scale renewable distributed generation has challenges at the distribution level and significant work is done to ...
    • Analysis of speech signals using networked computers 

      Pendse, Ravi; Hoyer, E.A. (1994-04)
    • Applying k-nearest neighbors to increase the utility of k-anonymity 

      Almohaimeed, Abdulrahman; Gampa, Srikanth (IEEE, 2020-03-05)
      Nowadays, there are many organizations publishing and sharing their databases with other parties for different purposes, such as to conduct statistical surveys, business investigations, or health studies. However, this ...
    • Approximate controller design for singularly perturbed aircraft systems 

      Graziosi, Joseph E.; Sawan, M. Edwin; Watkins, John Michael (IEEE, 2014-08-03)
      The purpose of this paper is to extend the Quasi-Steady State Approximation and Matrix Block Diagonalization methods utilized in the Approximate Controller Design for Singularly Perturbed Aircraft Systems [1]. In that ...
    • An artificial neural network-based peak demand and system loss forecasting system and its effect on demand response programs 

      Basnet, Saurav Man Singh; Aburub, Haneen Mohammad Dawoud; Jewell, Ward T. (IEEE, 2016)
      This paper describes a neural network application to reduce the computational complexities in a smart grid environment by predicting peak demand and losses for the next operating day. Mitigating peak demands and losses ...
    • Assessment of economic value of assistive technologies through quality-adjusted work-life years (qawly) 

      Joseph, Siny; Namboodiri, Vinod (Springer, 2020-09-04)
      Assistive technologies (ATs) are commonly used to improve the quality of life of persons with disabilities. While their utility to a person is usually clear, their cost-effectiveness or economic value is often unclear. ...
    • An auspicious secure processing technique for near field communication systems 

      Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Sergio A. (IEEE, 2016)
      The near field communication (NFC) technology helps save both time and power when compared with Bluetooth and other similar technologies. However, NFC is vulnerable to various networking attacks such as message modification. ...
    • Auto-tuning tub-level control of blender in hydraulic fracturing 

      Chen, Zheng; Cargill, Leslie; Naizer, Brent (American Society of Mechanical Engineers, 2017)
      Hydraulic fracturing is one of the key technologies for producing shale oil and gas. During hydraulic fracturing, a blender is used to mix sand with water and chemicals to obtain a fluidic mixture that will be pumped down ...
    • Automated dynamic detection of self-hiding behavior 

      Baird, Luke; Shan, Zhiyong; Namboodiri, Vinod (IEEE, 2019-11)
      Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user's security and privacy at risk by performing ...
    • Automatic cycle identification in speaker's speech breathing signals 

      Ding, Yanwu; Tchankwe, Georges; Parham, Douglas F.; Ding, Y. H. (Atlantis Press, 2015-05)
      Due to the complexity in respiratory signals, an experienced coder is often required to identify the acceptable cycles and mark the start and end times for each cycle. This algorithm is an important step toward timely ...
    • Aviation data networks: New avenues for flight safety 

      Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2004-10-11)
      Aircraft data networks are fast becoming more of a necessity due to their support for user mobility. Many aircraft manufacturers are planning to deploy data networks within their airplanes and provide Internet connectivity ...
    • Aviation data networks: Security issues and network architecture 

      Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2004-10-11)
      The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ...
    • Battery energy storage-based strategy for suppressing wind farm's subsynchronous oscillation 

      Yang, Lin; Zhang, Xiaohan; Pang, Chengzong (IEEE, 2019-10)
      In this paper, the battery energy storage supplementary damping control is introduced to suppress the subsynchronous oscillation of DFIG-based wind farm interfaced with series compensation. Firstly, the conventional control ...
    • Benefit assessment of water-heater management on residential demand response: an event driven approach 

      Gholizadeh, Abbas; Aravinthan, Visvakumar (IEEE, 2016)
      Analysis, modeling and development of residential demand response schemes are vital for the next generation active distribution systems. Among residential level deferrable loads thermally controllable loads have shown a ...
    • Big bang, small bucks; effective use of low-cost CAD packages 

      Pendse, Ravi; Johnson, Everett L. (IEEE, 1996-11-06)
      At Wichita State University the authors have implemented an undergraduate three-course sequence in digital system design and computer architecture. Key to the success of these courses are two inexpensive yet very effective ...
    • Bio-inspired robotic fish propelled by multiple artificial fins 

      Hou, Piqi; Ye, Zhihang; Chen, Zheng (American Society of Mechanical Engineers, 2017)
      With advances in actuation and sensing, smart materials has drawn a growing attention from researchers in under water robotic fish. In this paper, a compact, noiseless, and untethered biomimetic robotic fish propelled by ...