Now showing items 522-541 of 655

    • Robust vehicle and surrounding environment dynamic analysis for assistive driving using visual-inertial measurements 

      Zhang, Yinlong; Liang, Wei; He, Hongsheng; Tan, Jindong (IEEE, 2018-12-24)
      Vehicle and surrounding environment dynamic analysis (VSEDA) is an indispensable component of modern assistive drivings. A robust and accurate VSEDA could ensure the driving system reliability in presence of highly dynamic ...
    • Robustness of sampled-data control to unmodeled high-frequency dynamics 

      Dinh, Joseph H.; Sawan, M. Edwin (IEEE, 1993-06-02)
      Robustness of sampled-data control designs to unmodeled high-frequency dynamics is studied using singular perturbation theory. When a plant is preceded by a zero-order holder, a direct transmission term of the reduced-order ...
    • The role of energy storage in transmission and distribution efficiency 

      Jewell, Ward T.; Hu, Zhouxing (IEEE, 2012-05)
      Energy storage systems that are properly placed on the transmission system can be used to relieve transmission congestion [1]. Similarly, storage on distribution can be used to reduce peak loads [2]. The reduction in ...
    • Route optimized nested mobility solution using PAT 

      Dattani, M.; Thanthry, Nagaraja; Best, Patricia K.; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-09-26)
      Mobile computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet, irrespective of the physical location of the ...
    • RRQR based closed-form blind carrier offset estimator for OFDM systems 

      Qasaymeh, Mahmoud Mohammad; Nizar, T.; Hiren, G.; Sawan, M. Edwin; Pendse, Ravi (IEEE, 2009-05-25)
      Carrier Frequency Offset (CFO) is one of the major drawbacks of the Multi Carrier Modulation (MCM) technique. Blind, semiblind and data-aided techniques have been introduced to estimate the CFO. In this paper, a new blind ...
    • SafeExit4All: An inclusive indoor emergency evacuation system for people with disabilities 

      Unknown author (Association for Computing Machinery, Inc., 2019-05-13)
      Indoor wayfinding has remained a challenge for people with disabilities in unfamiliar environments. With some accessible indoor wayfinding systems coming to the fore recently, a major application of interest is that of ...
    • Safety critical networks using commodity SDNs 

      Kashinath, Ashish; Hasan, Monowar; Kumar, Rakesh; Mohan, Sibin; Bobba, Rakesh B.; Padhy, Smruti (IEEE, 2021-05-05)
      Safety-critical networks often have stringent real-time requirements; they must also be resilient to failures. In this paper, we propose the RealFlow framework that uses commodity software-defined networks (SDNs) to realize ...
    • Satellite digital channelizer with predistorted high-power amplifier 

      Goswami, Madhuprana; Rana, Vidhi; Kwon, Hyuck M.; Pham, Khanh D.; Lyke, James (IEEE, 2020-03-05)
      A geostationary earth orbit satellite requires high transmitting power (e.g., 20 dBW=100 watts) because the waveform traveling distance can be more than 36,000 km. Thus, it is necessary to operate close to the saturation ...
    • Satellite jamming: a game theoretic analysis 

      Wang, Qiwei; Nguyen, Thinh; Pham, Khanh D.; Kwon, Hyuck M. (IEEE, 2017)
      In this paper, the problem of minimizing the damaging effect on the frequency hopping (FH) spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel ...
    • Satellite MIMO digital beam-forming under nonlinear high-power amplifier and keyhole 

      Goswami, Madhuprana; Kwon, Hyuck M.; Pham, Khanh D.; Lyke, James (IEEE, 2019-04-11)
      In a satellite communication (Sat-Com) system, channel coefficients from multiple-input, multiple-output (MIMO) antennas are correlated strongly because of a long propagation distance and a narrow angle spread. This is ...
    • Scalable meter data collection in smart grids through message concatenation 

      Karimi, Babak; Namboodiri, Vinod; Jadliwala, Murtuza Shabbir (IEEE, 2015-07)
      Advanced metering infrastructure (AMI) initiatives are a popular tool to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. There is the looming issue of how ...
    • Scalable QoS provisioning for mobile networks using wireless sensors 

      Bahety, V.; Pendse, Ravi (IEEE, 2004-03-21)
      In the past few years support for mobility has increased to a large extent. Mobile IP enables nodes to move from one network to the other while maintaining the same IP address. Minimal packet loss during handoff is a ...
    • Secret sharing from correlated Gaussian random variables and public communication 

      Rana, Vidhi; Chou, Rémi; Kwon, Hyuck M. (IEEE, 2021-04-11)
      We study a secret sharing problem, where a dealer distributes shares of a secret among a set of participants under the constraints that (i) authorized sets of users can recover the secret by pooling their shares, (ii) ...
    • Secret sharing over a public channel from correlated random variables 

      Chou, Remi (IEEE, 2018)
      We consider a model for secret sharing, where a dealer distributes the shares of a secret among a set of participants with the constraint that only predetermined subsets of participants must be able to reconstruct the ...
    • Secret-key generation in many-to-one networks: an integrated game-theoretic and information-theoretic approach 

      Chou, Remi; Yener, Aylin (IEEE, 2019-08)
      This paper considers secret-key generation between several agents and a base station that observe independent and identically distributed realizations of correlated random variables. Each agent wishes to generate the longest ...
    • Secure cloud computing for pairwise sequence alignment 

      Salinas Monroy, Sergio A.; Li, Pan (Association for Computing Machinery, 2017)
      Today's massive amount of biological sequence data has the potential to rapidly advance our understanding of life's processes. However, since analyzing biological sequences is a very expensive computing task, users face a ...
    • Secure distributed storage: rate-privacy trade-off and XOR-based coding scheme 

      Chou, Remi; Kliewer, Jorg (IEEE, 2020-06)
      We consider the problem of storing data in a distributed manner over T servers. We require the data (i) to be recoverable from the T servers, and (ii) to remain private from any T -1 colluding servers, where privacy is ...
    • Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis 

      Joshi, Deepti; Namuduri, Kameswara; Pendse, Ravi (Hindawi Publishing Corporation, 2005-05)
      Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ...
    • Security in multi-tenancy cloud 

      Jasti, Amarnath; Shah, Payal Hemchand; Nagaraj, Rajeev; Pendse, Ravi (IEEE, 2010-10-05)
      Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure ...
    • Security, internet connectivity and aircraft data networks 

      Thanthry, Nagaraja; Ali, Muhammad Sabeeh; Pendse, Ravi (2006-05)
      Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to ...