Now showing items 548-567 of 656

    • Self-learning ad-hoc routing protocol 

      Best, Patricia K.; Gundeti, S.; Pendse, Ravi (IEEE, 2003-10-06)
      As the technologies for ad-hoc networks emerge, an ad-hoc routing protocol that can supply connectivity to mobile devices while utilizing a minimal amount of bandwidth as overhead becomes increasingly important. Minimal ...
    • A self-routing technique for software-defined Networks 

      Almohaimeed, Abdulrahman; Asaduzzaman, Abu (IEEE, 2020-03-05)
      Software-defined networking (SDN) is a centralized organization of computer networking in which all network switches are controlled and monitored by a single remote controller. Similar to any other centralized designs, ...
    • Semantics comprehension of entities in dictionary corpora for robot scene understanding 

      Yan, Fujian; Zhang, Yinlong; He, Hongsheng (Springer Nature, 2018)
      This paper proposes a method to help robots understand object semantics. The method presented in this paper can enhance robot’s performance and efficiency while working with ambiguous instructions to interact with unfamiliar ...
    • Semiblind multiuser MIMO channel estimators using PM and RRQR methods 

      Pendse, Ravi; Hiren, G.; Sawan, M. Edwin; Qasaymeh, Mahmoud Mohammad; Nizar, T. (IEEE, 2009-05-11)
      Estimating the channel state information (CSI) of several transmitters that use orthogonal space-time block codes (OSTBC) to communicate with a single receiver is considered. Based on rank revealing QR (RRQR) factorization ...
    • Service differentiation mechanism via cooperative medium access control protocol 

      Orsun, Fatma; Topakkaya, Hakan; Tunc, Muharrem Ali; Cetinkaya, Coskun (Springer, 2006)
      Providing differentiated Quality of Service (QoS) levels is an important challenge for wireless ad hoc networks and wireless LANs when applications have diverse performance requirements. The IEEE 802.11e MAC protocol can ...
    • Shared entry logger to eliminate duplicate requests to SDN controller 

      Asaduzzaman, Abu; Almohaimeed, Abdulrahman; Chidella, Kishore K. (IEEE, 2019-03-14)
      In network architecture domain, software-defined networking (SDN) provides programmable network infrastructure and improves management at the controlling layer level. However, SDN structure is centralized and hence introduces ...
    • Side-channel inference attacks on mobile keypads using smartwatches 

      Maiti, Anindya; Jadliwala, Murtuza Shabbir; He, Jibo; Bilogrevic, Igor (IEEE, 2018-09-01)
      Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of onboard sensors provides an additional attack surface to malicious software and services on these ...
    • The sidelobe power suppression for the aircraft circle phase array radar 

      Wang, Dan (IEEE, 2018)
      As the air force becomes more and more important, it is very important to improve the performance of object tracking. The circle phase array radar is adopted to improve the object tracking ability. However, it is very ...
    • Simulating multisensor noninvasive blood glucose monitoring systems 

      Asaduzzaman, Abu; Samadarsinee, Soumyashree; Chidella, Kishore K. (IEEE, 2016)
      Diabetes and related complications are responsible for early death - one person in every 7 seconds. Long term and short term complications due to diabetes can be reduced through proper diet, physical exercise, and medication. ...
    • Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering 

      Ding, Yanwu; Ibdah, Yazan (Springer, 2020-09-30)
      Recent radio channel measurements in peer-to-peer (P2P) and mobile-to-mobile network indicate that, depending on the mobility of the terminals and scattering properties of the environment, the predominate fading mechanism ...
    • Simulations on the statistical properties for cascaded Rayleigh fading channel 

      Ibdah, Yazan; Ding, Yanwu; Kwon, Hyuck M.; Lee, Kanghee (IEEE, 2011-11-07)
      In the past few years, mobile to mobile communication has gained much attention. Researchers have invested considerable effort in obtaining appropriate channel models to understand the statistical properties of the underlying ...
    • Single Network Adaptive Critic aided nonlinear dynamic inversion for suboptimal command tracking 

      Lakshmikanth, Geethalakshmi S.; Padhi, Radhakant; Watkins, John Michael; Steck, James E. (IEEE, 2011-09-28)
      Using the Approximate Dynamic Programming (ADP) approach, nonlinear optimal control problems can be solved by using a dual neural network architecture called the Adaptive Critic (AC). A Single Network Adaptive Critic (SNAC) ...
    • Six pass MapReduce implementation of Strassen's algorithm for matrix multiplication 

      Ramanan, Prakash (Association for Computing Machinery, Inc, 2018-06-15)
      Consider the multiplication of two n x n matrices. A straight-forward sequential algorithm for computing the product takes Θ(n3) time. Strassen [21] presented an algorithm that takes Θ(nlg 7) time; lg denotes logarithm to ...
    • A smart data logger for enhancing data communication in Wi-Fi based mobile systems 

      Asaduzzaman, Abu; Chidella, Kishore K.; Sibai, Fadi N. (IEEE, 2015)
      Accurate and complete data acquisition is a key challenge for mobile systems that use wireless sensor network (WSN) for communication. In a WSN system, data may be lost due to communication errors among receivers and the ...
    • Smart disaster management using software-defined unmanned aerial systems 

      Asaduzzaman, Abu; Telakapalli, Abhignan; Sibai, Fadi N. (IEEE, 2021-03-11)
      In this work, we introduce a software-defined unmanned aerial systems (UAS) model, which can provide access to sensitive places where Wi-Fi communication is most needed for rescue operations. The proposed UAS model is ...
    • Smartwatch-based keystroke inference attacks and context-aware protection mechanisms 

      Maiti, Anindya; Armbruster, Oscar; Jadliwala, Murtuza Shabbir; He, Jibo (Association for Computing Machinery, 2016)
      Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware applications. However, malicious applications can misuse these sensors, if access is left unaudited. ...
    • Smooth shunt control of a Fuzzy based distributed power flow controller to improve power quality 

      Renduchintala, Uday Kishan; Pang, Chengzong; Maddukuri, Satya Veera Pavan Kumar; Aravinthan, Visvakumar; (IEEE, 2016)
      Presently, the quality of power supplied is essential to many customers. Power quality (PQ) is a valued utility service where many customers are prepared to pay and get it. In the future, distribution system operators ought ...
    • Social puzzles: context-based access control in online social networks 

      Jadliwala, Murtuza Shabbir; Maiti, Anindya; Namboodiri, Vinod (IEEE, 2014-06-23)
      The increasing popularity of online social networks (OSNs) is spawning new security and privacy concerns. Currently, a majority of OSNs offer very naive access control mechanisms that are primarily based on static access ...
    • Sociorobotics 

      Agah, Arvin; Cabibihan, John-John; Howard, Ayanna; Salichs, Miguel A.; He, Hongsheng (Springer Netherlands, 2018-04)
      This special issue provides researchers with the opportunity to describe their work and their latest progress in the field of social robotics, aimed at fostering discussions and potential collaborations on the development ...
    • Soft-biometric attributes from selfie images 

      Rattani, Ajita; Agrawal, Mudit (Springer London, 2019-09-22)
      The aim of this chapter is to discuss the soft-biometric attributes that can be extracted from selfie images acquired from mobile devices. Existing literature suggests that various features in demographics, such as gender ...