Now showing items 309-328 of 651

    • Maximizing data preservation in intermittently connected sensor networks 

      Hou, Xiang; Sumpter, Zane; Burson, Lucas; Xue, Xinyu; Tang, Bin (IEEE, 2012-10)
      In intermittently connected sensor networks, wherein sensor nodes do not always have connected paths to the base station, preserving generated data inside the network is a new and challenging problem. We propose to preserve ...
    • Maximum diversity in web application user action privacy 

      Bagai, Rajiv; Layton, Seth; Gampa, Srikanth; Chandrashekar, Kavitha (IEEE, 2020-02-13)
      Popular web application features, like autosuggestion and auto-correction, are well-known to amply reveal input actions entered by their users to any eavesdroppers, by generating sufficiently unique network activity bursts ...
    • Maximum torque per ampere and maximum power per ampere sliding mode control for interior permanent magnet synchronous motors 

      Alnami, Hashim; Pang, Chengzong; Papineni, Avinash; Wang, Xin (Taylor & Francis, 2021-10-14)
      This paper presents novel maximum torque per ampere (MTPA) and maximum power per ampere (MPPA) sliding mode control (SMC) approaches for interior permanent-magnet synchronous motors (IPMs). We first derive the first-order ...
    • Measurement of Gaussian beam diameter using ronchi rulings 

      Karim, M.A. (IEEE, 1985-05-09)
      The analytical and experimental scope of the generalised Ronchi ruling method for the measurement of Gaussian laser beam diameter is presented. The effects of the ruling periodicity, ruling duty cycle, ruling type and the ...
    • Measuring anonymity of pseudonymized data after probabilistic background attacks 

      Bagai, Rajiv; Malik, Nafia; Jadliwala, Murtuza Shabbir (IEEE, 2017-05)
      There is clear demand among organizations for sharing their data for mining and other purposes without compromising the privacy of individual objects contained in the data. Pseudonymization is a simple, yet widely employed ...
    • Measuring client-server anonymity 

      Bagai, Rajiv; Lu, Huabo (Springer International Publishing, 2016)
      The primary intent of clients performing anonymous online tasks is to conceal the extent of their already encrypted communication with sensitive servers. We present an accurate method for evaluating the amount of anonymity ...
    • Message passing for analysis and resilient design of self-healing interdependent cyber-physical networks 

      Behfarnia, Ali; Eslami, Ali (IEEE, 2016)
      Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, that can lead to large scale cascading ...
    • MIMO cognitive radio user selection with and without primary channel state information 

      Xiong, Wenhao; Mukherjee, Amitav; Kwon, Hyuck M. (IEEE, 2016-02)
      In this paper, we study user selection (US) strategies for a multiple-input-multiple-output (MIMO) cognitive radio (CR) downlink network, where the r-antenna underlay CR secondary users (SUs) coexist with a primary user ...
    • Mining android apps to recommend permissions 

      Karim, Md Yasser; Kagdi, Huzefa Hatimbhai; Di Penta, Massimiliano (IEEE, 2016)
      Permission mechanisms play a crucial role for ensuring privacy and security of Android mobile applications (apps). An Android app that requires access to the device resources must be granted specific permissions for its ...
    • Minitrack on distributed, renewable and mobile resources 

      Blumsack, Seth; Jewell, Ward T.; Smith, J. Charles (IEEE Computer Society, 2021)
      Introduction to the conference mini-track on modeling, simulation and hardware developments; economic and system analyses; and studies of individual and organizational behavior and decision making as pertaining to ...
    • Mirror inverse operations in linear nearest neighbors using dynamic learning algorithm 

      Garigipati, Rudrayya Chowdary; Kumar, Preethika (IEEE, 2016-01)
      We propose a new method to implement mirror inverse gate operations in 1-D linear nearest neighbor (LNN) array coupled through diagonal interactions, using a dynamic learning algorithm. This is accomplished by training a ...
    • Misbehavior detection in ephemeral networks: a local voting game in presence of uncertainty 

      Behfarnia, Ali; Eslami, Ali (IEEE, 2019-12-19)
      Emerging short-lived (ephemeral) connections between wireless mobile devices have raised concerns over the security of ephemeral networks. An important security challenge in these networks is to identify misbehaving nodes, ...
    • Mitigating jamming attack: a game-theoretic perspective 

      Wang, Qiwei; Nguyen, Thinh; Pham, Khanh D.; Kwon, Hyuck M. (IEEE, 2018-07)
      In this paper, the problem of minimizing the damaging effect on the frequency-hopping spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel ...
    • Mitigation of subsynchronous resonance in power grid integrated with PV power station 

      Mittapally, Sravan Kumar; Pang, Chengzong; Renduchintala, Uday Kishan (IEEE, 2019-03-14)
      This paper presents the alleviation of subsynchronous resonance (SSR) in the power system with large scale PV power station, in synchronous generator which is connected to series compensated transmission line. The rapid ...
    • MMSE relaying strategies under jamming, channel uncertainty, node geometry, and power constraint 

      Lee, Kanghee; Kwon, Hyuck M.; Yang, Jie; Sawan, M. Edwin; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
      An amplify-and-forward (AF) relay network has been studied extensively, but a closed form of an optimal AF relaying matrix is not available yet for the distributed AF relay network with the destination power constraint ...
    • MMSE relaying strategy for two-way amplify-and-forward wireless networks 

      Lee, Kanghee; Kwon, Hyuck M.; Yang, Jie; Sawan, M. Edwin; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
      This paper studies amplify-and-forward (AF) relay strategies for two-way wireless relay networks consisting of two sources with a single antenna and multiple relays with a single antenna. The closed form of relay amplifying ...
    • MMSE-Based amplifying relay matrix for noncooperative AF wireless relay network under power constraints 

      Lee, Kanghee; Kwon, Hyuck M.; Wang, Zuojun (IEEE, 2011-06-28)
      This paper derives analytically an optimum amplifying relay matrix using the minimum mean square error (MMSE) criteria for a noncooperative amplify-and-forward (AF) distributed relay network. Global and local power constraints ...
    • MMSE-based optimal design of full-duplex relay system 

      Lee, Kanghee; Kwon, Hyuck M.; Jo, Mansik; Park, Hyuncheol; Lee, Yong H. (IEEE, 2012-09)
      This paper studies minimum mean square error (MMSE)-based full-duplex relay processing matrices and source/destination beamforming vectors under perfect channel state information by imposing constraints on the transmit ...
    • Mobile IP and virtual private networks 

      Bhagavathula, Ravi; Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2002)
      With a growing number of portable computing devices like laptops and personal digital assistants (PDA), the need for seamless connectivity to the global Internet is driving the acceptance of different mobility solutions. ...
    • Mobile MOGRE VPN 

      Bhagavathula, Ravi; Thanthry, Nagaraja; Immich, P.; Pendse, Ravi (2002-09)
      While the usage of IPSec based VPNs for the construction and maintenance of a mobile VPN is feasible, issues related to its scalability in terms of required resources and QoS provisioning limit its practical deployment. ...