Browsing EECS Faculty Scholarship by Title
Now showing items 91-110 of 656
-
Comparison of machine learning and deep learning models for network intrusion detection systems
(MDPI AG, 2020-09-30)The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is ... -
Comparison of MPPT techniques for SEPIC converter based photovoltaic system
(IEEE, 2016)In the near future solar energy will be the primary energy source. More than 45% of required energy in the world will be generated by photovoltaic arrays. Therefore it is imperative to have focus on reduction of costs as ... -
Comparison of VOIP and VOATM for voice transmission
(OPNETWORK 2001, 2001-08)The tremendous advances in the field of multi-service networking have enabled the integration of voice and data networks leading to a reduction in the overall network setup and maintenance costs. In this paper, an evaluation ... -
Component reliability evaluation in the presence of smart monitoring
(IEEE, 2013)Smart sensors and monitoring technologies are beginning to penetrate different levels of the power system. In a smart grid scenario, the operational condition of components needs to be reported to the control center, in ... -
Computational techniques to recover missing gene expression data
(Elsevier, 2018)Almost every cells in human's body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. ... -
A conceptual replication study on bugs that get fixed in open source software
(IEEE, 2018-09)Bugs dominate the corrective maintenance and evolutionary changes in large-scale software systems. The topic of bugs has been extensively investigated and reported in the literature. Unfortunately, the existential question ... -
Constrained pole placement using projective controls technique
(IEEE, 1990-05-23)Projective controls method is used to place the poles of a closed loop system within a circle in the left half plane. The design procedure is noniterative and the solution is obtained via linear quadratic (LQ) design for ... -
Constructive precoder design for single beam multiuser satellite system with PSK signals
(IEEE, 2020-08-21)In satellite systems downlink transmission, multiuser interference from other users often poses severe degradation to the performance. It is commonly mitigated or removed to maintain the quality of service (QoS). In this ... -
Control traffic analysis of on-demand routing protocols in ad-hoc wireless networks
(IEEE, 2005-09-28)This paper provides an analytical framework for estimating the routing overhead due to mobility and link breakage. Detailed analysis is presented for estimating the number of control packets (RREQ, RREP and RERR) as a ... -
Control traffic balancing in software defined networks
(Elsevier, 2016-09-04)To promise on-line and adaptive traffic engineering in software defined networks (SDNs), the control messages, e.g., the first packet of every new flow and network traffic statistics, should be forwarded from software ... -
Control-oriented modeling of ionic polymer-metal composite enabled hydrogen gas production
(Elsevier Ltd., 2016-05-04)Ionic polymer-metal composite (IPMC) is an electro-active polymers which exhibits the property of ion migration under the application of external electric field. This property of IPMC along with the ability to operate in ... -
Controlled electric vehicle charging for mitigating impacts on distribution assets
(IEEE, 2015-03)This paper proposes a two-step methodology for scheduling electric vehicle (EV) charging, which limits the burden on distribution and transmission assets while ensuring all the vehicles are charged. In the first step, the ... -
Controlling solar photovoltaic cells utilizing polymer-dispersed liquid crystal technology
(ASME, 2017-10)Solar charge controllers are currently a necessary piece of equipment when utilizing the energy from a photovoltaic system for charging purposes. However, a standard solar charge controller available today includes some ... -
Conversion from channel attenuation to data rate estimation
(IEEE, 2021-03-06)In an early development state for a wireless terrestrial or satellite communication system, channel path attenuation data is typically collected first under an additive white Gaussian noise (AWGN) in the line of sight by ... -
Cooperative AF MIMO wireless relay networks under relay power constraint
(IEEE, 2012-11)This paper presents an amplify-and-forward (AF) relay scheme for M-source-M-destination pairs and N relay nodes. Cooperative minimum mean square error (MMSE) and zero-forcing (ZF) strategies for wireless relay networks ... -
Cooperative AF wireless relay strategy under relay power constraint
(IEEE, 2013-11)This paper presents an optimal relay amplifying matrix based on various schemes, such as zero-forcing (ZF) and minimum mean square error (MMSE), for a cooperative amplify-and-forward (AF) wireless relay network consisting ... -
Cooperative collision avoidance and formation control for objects with heterogeneous shapes
(Elsevier, 2017-07)This paper addresses the problem of formation control with collision avoidance, in scenarios comprising robots of heterogeneous shapes and with double integrator dynamics, moving on a plane. The exact shapes of the robots ... -
Cross-illumination Evaluation of Hand Crafted and Deep Features for Fusion of Selfie Face and Ocular Biometrics
(IEEE, 2020-03-12)This paper addresses the implementation of a multiunit biometric system. Results are shown for multi-unit classification with VISible light mobile Ocular Biometric (VISOB) dataset using feature descriptors such as Local ... -
Cross-layer analysis of route discovery process and its impact on the packet end-to-end delay in wireless Ad Hoc networks
(IEEE, 2006-09-25)This paper presents a cross-layer analysis of the route discovery process in ad hoc networks, and discusses the impact of this process on the packet end-to-end delay. The analysis primarily highlights the role of medium ... -
CSI-unaware scheduling for coexistence of MIMO-OFDMA device-to-device links and cellular mobile terminals
(IEEE, 2015)In this paper, we examine scheduling methods for non-orthogonal resource sharing between device-to-device user equipments (D2D-UEs) and cellular user equipments (C-UEs) in a multi-carrier multi-antenna network. The cellular ...