Now showing items 265-284 of 651

    • An Inexpensive plug-and-play hardware security module to restore systems from malware attacks 

      Asaduzzaman, Abu; Mridh, Muhammad F.; Uddin, M. Nizam (IEEE, 2013)
      Despite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their ...
    • Influence of codecs on adaptive jitter buffer algorithm 

      Hirannaiah, Radhika M.; Jasti, Amarnath; Pendse, Ravi (IEEE, 2007-09-30)
      Transmitting real-time audio or video applications over the Internet is a challenge for current networking technology. Reduced overhead and enhancement of services are the motivations for deploying voice communications. ...
    • Information-theoretic secret sharing from correlated Gaussian random variables and public communication 

      Rana, Vidhi; Chou, Rémi; Kwon, Hyuck M. (IEEE, 2021)
      Abstract—In this paper, we study an information-theoretic secret sharing problem, where a dealer distributes shares of a secret among a set of participants under the following constraints: (i) authorized sets of users ...
    • Innovative design techniques in a freshman class 

      Pendse, Ravi; Johnson, Everett L. (ASEE, 1997-06)
      At Wichita State University, we have a three course sequence in the Digital Design area with the first course taken by incoming freshman students. This course entitled “Introduction to Digital Design” is a very popular ...
    • Innovative pre-fetching techniques for CPU and disk caches 

      Pendse, Ravi; Bhagavathula, Ravi (International Society for Computers and Their Applications, 1998-11)
    • An integrated electroactive polymer sensor-actuator: design, model-based control, and performance characterization 

      Hunt, A.; Chen, Zheng; Tan, X.; Kruusmaa, M. (IOP Publishing Ltd, 2016-02-22)
      Ionic electroactive polymers (IEAPs), particularly ionic polymer-metal composites (IPMCs) and carbon-polymer composites (CPCs), bend when a voltage is applied on their electrodes, and conversely, they generate an electrical ...
    • Integrating conceptual and logical couplings for change impact analysis in software 

      Kagdi, Huzefa Hatimbhai; Gethers, Malcom; Poshyvanyk, Denys (Springer, 2013-10)
      The paper presents an approach that combines conceptual and evolutionary techniques to support change impact analysis in source code. Conceptual couplings capture the extent to which domain concepts and software artifacts ...
    • An intelligent closed loop single-switch DC/DC converter with high voltage step-up ratio for roof-mounted solar cells electric vehicle 

      Maddukuri, Satya Veera Pavan Kumar; Visvakumar, Aravinthan; Renduchintala, Uday Kishan (IEEE, 2016)
      In the upcoming field of e-mobility, roof-mounted solar cell systems are used to operate the thermoelectric system, compressors for maintaining the cabin temperature and also to extend the cruising range of electric vehicles. ...
    • An intelligent network monitoring and management tool for aircraft data networks 

      Gao, Haihong; Jasti, Amarnath; Pendse, Ravi (IEEE, 2005-10-30)
      In this research work, authors propose an intelligent network monitoring and management tool for aircraft data network (ADN) to monitor and manage various on-board systems. This tool helps in visualizing a typical ADN ...
    • Introducing edge controlling to software defined networking to reduce processing time 

      Almohaimeed, Abdulrahman; Asaduzzaman, Abu (IEEE, 2019-03-14)
      Edge computing enables computational services to be performed at the edge of a network on behalf of the main cloud services. The rationale of edge computing is applicable to any centralized system where the service should ...
    • Introduction: Selfie Biometrics 

      Rattani, Ajita; Derakhshani, Reza R.; Ross, Arun A. (Springer London, 2019-09-22)
      Traditional password-based solutions are being predominantly replaced by biometric technology for mobile user authentication. Since the inception of smartphones, smartphone cameras have made substantial progress in image ...
    • Investigating the impact of gene cofunctionality in predicting gene mutations of E. coli 

      Okwori, Michael; Eslami, Ali (IEEE, 2020-09-14)
      Machine learning algorithms (MLAs) have recently been applied to predict gene mutations of Escherichia coli (E. coli) under different exposure conditions, with room for improvement in performance. In a bid to improve ...
    • Investigation of impact of victim cache and victim tracer on a fully associative disk cache 

      Pendse, Ravi; Kushanagar, N.; Walterscheidt, U. (IEEE, 1998-08-09)
      In this paper, we present results of investigation to study the impact of victim cache and victim tracer on the miss rates due to the LRU block replacement algorithm. A total of three different algorithms were implemented. ...
    • IP connectivity and DAP 

      Ragothaman, Vijay; Thanthry, Nagaraja; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-10-24)
      The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ...
    • IPMC-actuated robotic fish 

      Chen, Zheng; Bart-Smith, Hilary; Tan, Xiaobo (Springer Berlin Heidelberg, 2015-05-07)
      Excellent swimmers, such as tuna, rays, and goldfish, take advantage of their flexible fins, compliant bodies, and swimming bladders to achieve fast, highly maneuverable, and energy-efficient locomotion. Ionic polymer-metal ...
    • Issues in deploying wireless networks 

      Thanthry, Nagaraja; Jasti, Amarnath; Pendse, Ravi (OPNETWORK 2003, 2003-08)
    • Issues with nested mobility 

      Bhagavathula, Ravi; Thanthry, Nagaraja; Namuduri, Kameswara; Pendse, Ravi (IEEE, 2003-10-06)
      Mobility and Internet access have become an integral part of today's life. The recent advances in computer hardware have also aided in increasing the dependence on Internet connectivity. Protocols like mobile IP were ...
    • Jamming statistics-dependent frequency hopping 

      Hannon, Matthew; Feng, Shaung; Kwon, Hyuck M.; Pham, Khanh D. (IEEE, 2016)
      This paper studies a jamming statistics-dependent frequency-hopping (FH) pattern generation scheme. Most existing FH patterns are determined by two encryption keys: (a) one for FH in the frequency domain, and (b) the other ...
    • Joint physical and link layer error control analysis for nanonetworks in the Terahertz band 

      Akkari, Nadine; Jornet, Josep Miquel; Wang, Pu; Fadel, Etimad; Elrefaei, Lamiaa A.; Malik, Muhammad Ghulam Abbas; Almasri, Suleiman; Akyildiz, Ian F. (Springer International Publishing AG, 2016-05)
      Nanonetworks consist of nano-sized communicating devices which are able to perform simple tasks at the nanoscale. The limited capabilities of individual nanomachines and the Terahertz (THz) band channel behavior lead to ...
    • A joint power adaptation and spectrum handoff scheme in mobile cognitive radio networks 

      Wang, Dan; Song, Yi; Yang, Zhitao (IEEE, 2015)
      Cognitive radio (CR) technology is regarded as a promising solution by enabling unlicensed users to exploit the licensed spectrum unused by the licensed user in an opportunistic manner. Since in a mobile CR network, if ...