Now showing items 21-40 of 637

    • Advanced subspace projection method for interference suppression in phase array radar 

      Yang, Zhitao; Zhang, Guanglei (IEEE, 2018)
      Abstract: As the dramatic development of the radar system, the phase array radar is widely used in military. There are more and more techniques adopted to improve the performance of the phase array radar. The most important ...
    • Adverse wireless communication environment impacts on AF wireless relay networks 

      Lee, Kanghee; Kwon, Hyuck M.; Kim, Deawon; Shim, Yeonggyu; Park, Hyuncheol; Lee, Yong H.; Hyun, Inha (IEEE, 2013)
      This paper proposes amplify-and-forward (AF) relay matrices for a one-source-one-destination pair and cooperative distributed N relay nodes under three adverse wireless relay communication environments: (1) broadband noise ...
    • AF MIMO wireless relay networks under received power constraint 

      Lee, Kanghee; Kwon, Hyuck M.; Kim, Hyunggi; Sawan, M. Edwin; Park, Hyuncheol; Lee, Yong H. (IEEE, 2012-09)
      This paper considers an amplify-and-forward (AF) relay scheme for M-source-M-destination pairs and N relay nodes. Cooperative minimum mean square error (MMSE) strategies for wireless relay networks under both a jamming ...
    • AF wireless relay network analysis under receiver power constraint 

      Lee, Kanghee; Kwon, Hyuck M.; Kim, Hyunggi; Lee, Sangku; Shim, Yeonggyu; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
      This paper presents both cooperative and noncooperative amplify-and-forward (AF) relay networks consisting of a one-source-one-destination pair and N-relays under receiver power constraint (RPC) at the destination. The ...
    • Agile MU-MIMO in congested environments with robust channel estimation 

      Xiong, Wenhao; Mo, Zijian; Chen, Genshe; Pham, Khanh D.; Blasch, Erik; Kwon, Hyuck M. (IEEE, 2016)
      This paper proposes a novel multi-user multiple-input and multiple-output (MU-MIMO) selection and beam-forming technique for a geosynchronous orbit (GSO) satellite communication (SATCOM) system. The MU-MIMO technique employs ...
    • AgSec: secure and efficient CDMA-based aggregation for smart metering systems 

      Alamatsaz, Navid Reza; Boustani, Arash; Jadliwala, Murtuza Shabbir; Namboodiri, Vinod (IEEE, 2014-01)
      Security and privacy concerns in the future power grid have recently received tremendous focus from security advocates. Most existing security mechanisms utilize cryptographic techniques that are computationally expensive ...
    • Aircraft data networks and performance enhancement proxies 

      Thanthry, Nagaraja; Shingvi, Swapnil; Pendse, Ravi (IEEE, 2006-10-15)
      With the increased deployment of data networks within the aircrafts, it is important to find ways to provide better service to user traffic. In order to provide Internet services within the aircraft, it is important to use ...
    • Aircraft health management network: A user interface 

      Thanthry, Nagaraja; Pendse, Ravi (2009-07)
      Network management is one of the most discussed topics in the networking fraternity. The efficiency of the network management suit is measured by the number of parameters/components handled by the application while making ...
    • Aircraft health management tool: A comprehensive user interface 

      Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2007-10-21)
      Network management is one of the most discussed topics in the networking fraternity. The efficiency of the network management suit is measured by the number of parameters/components handled by the application while making ...
    • Airplane data networks and security issues 

      Ali, Muhammad Sabeeh; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-10-04)
      The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ...
    • Al-based BMI inference from facial images: An application to weight monitoring 

      Siddiqui, Hera; Rattani, Ajita; Kisku, Dakshina R.; Dean, Tanner (IEEE, 2021-02-23)
      Self-diagnostic image-based methods for healthy weight monitoring is gaining increased interest following the alarming trend of obesity. Only a handful of academic studies exist that investigate AI-based methods for Body ...
    • ALARM: average low-latency medium access control communication protocol for smart feeders 

      Heidari-Kapourchali, Mohammad; Balachandran, Thanatheepan; Aravinthan, Visvakumar; Namboodiri, Vinod; Chen, Guo (Institution of Engineering and Technology-IET, 2016-08-04)
      The smart distribution system initiative requires higher usage of a distribution feeder-level communication infrastructure to improve system automation. This study proposes a hybrid medium access control (MAC) protocol to ...
    • An algorithm for the two dimensional FFT 

      Hoyer, Elmer. A.; Berry, W. (IEEE, 1977-05-01)
      Conventional two dimensional fast Fourier transforms become very slow if the size of the matrix becomes too large to be contained in memory. This is due to the transposition of the matrix that is required. This new algorithm ...
    • Alternate encryption scheme for VoIP traffic 

      Pendse, Ravi; Thanthry, Nagaraja; Gopalakrishnan, Gopinath (IEEE, 2009-10-05)
      Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data ...
    • An energy-efficient directory based multicore architecture with wireless routers to minimize the communication latency 

      Asaduzzaman, Abu; Chidella, Kishore K.; Vardha, Divya (IEEE Computer Society, 2016-05-20)
      Multicore architectures suffer from high core-to-core communication latency primarily due to the cache's dynamic behavior. Studies suggest that a directory-approach can be helpful to reduce communication latency by storing ...
    • An eye blinking password based liveness monitoring system to improve the detection of video spoofing 

      Asaduzzaman, Abu; Mummidi, Abhishek; Sibai, Fadi N. (IJMEC, 2015-10)
      Contemporary protocols in the TCP/IP suite may be very vulnerable to spoofing attacks when extra precautions are not taken to verify the identity. There are several ways to spoof the facial recognition such as using ...
    • Analysis of large scale distributed generation on radial distribution system: case study in Sri Lanka 

      Sivagnanam, Maheesa; Selvanayagam, Subaranjany; Thiruvaran, Tharmarajah; Vinothine, Shanmugarajah; Nandasiri, Nimanthi Upeka; Aravinthan, Visvakumar (IEEE, 2019-10)
      Large-scale penetration of distributed resources is becoming a reality in many parts of the world. Large scale renewable distributed generation has challenges at the distribution level and significant work is done to ...
    • Analysis of speech signals using networked computers 

      Pendse, Ravi; Hoyer, E.A. (1994-04)
    • Analytical estimation of path duration in mobile Ad Hoc networks 

      Namuduri, Kameswara; Pendse, Ravi (IEEE, 2012-06)
      Path duration is an important design parameter that determines the performance of a mobile ad hoc network (MANET). For example, it can be used to estimate the route expiry time parameter for routes in "on demand" routing ...
    • Applying k-nearest neighbors to increase the utility of k-anonymity 

      Almohaimeed, Abdulrahman; Gampa, Srikanth (IEEE, 2020-03-05)
      Nowadays, there are many organizations publishing and sharing their databases with other parties for different purposes, such as to conduct statistical surveys, business investigations, or health studies. However, this ...