Now showing items 41-60 of 640

    • Approximate controller design for singularly perturbed aircraft systems 

      Graziosi, Joseph E.; Sawan, M. Edwin; Watkins, John Michael (IEEE, 2014-08-03)
      The purpose of this paper is to extend the Quasi-Steady State Approximation and Matrix Block Diagonalization methods utilized in the Approximate Controller Design for Singularly Perturbed Aircraft Systems [1]. In that ...
    • An artificial neural network-based peak demand and system loss forecasting system and its effect on demand response programs 

      Basnet, Saurav Man Singh; Aburub, Haneen Mohammad Dawoud; Jewell, Ward T. (IEEE, 2016)
      This paper describes a neural network application to reduce the computational complexities in a smart grid environment by predicting peak demand and losses for the next operating day. Mitigating peak demands and losses ...
    • Assessment of economic value of assistive technologies through quality-adjusted work-life years (qawly) 

      Joseph, Siny; Namboodiri, Vinod (Springer, 2020-09-04)
      Assistive technologies (ATs) are commonly used to improve the quality of life of persons with disabilities. While their utility to a person is usually clear, their cost-effectiveness or economic value is often unclear. ...
    • An auspicious secure processing technique for near field communication systems 

      Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Sergio A. (IEEE, 2016)
      The near field communication (NFC) technology helps save both time and power when compared with Bluetooth and other similar technologies. However, NFC is vulnerable to various networking attacks such as message modification. ...
    • Authors' reply 

      Lal, M.; Mitra, R. (IEEE, 1976-08-01)
    • Auto-tuning tub-level control of blender in hydraulic fracturing 

      Chen, Zheng; Cargill, Leslie; Naizer, Brent (American Society of Mechanical Engineers, 2017)
      Hydraulic fracturing is one of the key technologies for producing shale oil and gas. During hydraulic fracturing, a blender is used to mix sand with water and chemicals to obtain a fluidic mixture that will be pumped down ...
    • Automated dynamic detection of self-hiding behavior 

      Baird, Luke; Shan, Zhiyong; Namboodiri, Vinod (IEEE, 2019-11)
      Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user's security and privacy at risk by performing ...
    • Automatic cycle identification in speaker's speech breathing signals 

      Ding, Yanwu; Tchankwe, Georges; Parham, Douglas F.; Ding, Y. H. (Atlantis Press, 2015-05)
      Due to the complexity in respiratory signals, an experienced coder is often required to identify the acceptable cycles and mark the start and end times for each cycle. This algorithm is an important step toward timely ...
    • Automatically recommending peer reviewers in modern code review 

      Zanjani, Motahareh Bahrami; Kagdi, Huzefa Hatimbhai; Bird, Christian (IEEE, 2016-06-10)
      Code review is an important part of the software development process. Recently, many open source projects have begun practicing code review through "modern" tools such as GitHub pull-requests and Gerrit. Many commercial ...
    • Aviation data networks: New avenues for flight safety 

      Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2004-10-11)
      Aircraft data networks are fast becoming more of a necessity due to their support for user mobility. Many aircraft manufacturers are planning to deploy data networks within their airplanes and provide Internet connectivity ...
    • Aviation data networks: Security issues and network architecture 

      Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2004-10-11)
      The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ...
    • Battery energy storage-based strategy for suppressing wind farm's subsynchronous oscillation 

      Yang, Lin; Zhang, Xiaohan; Pang, Chengzong (IEEE, 2019-10)
      In this paper, the battery energy storage supplementary damping control is introduced to suppress the subsynchronous oscillation of DFIG-based wind farm interfaced with series compensation. Firstly, the conventional control ...
    • Benefit assessment of water-heater management on residential demand response: an event driven approach 

      Gholizadeh, Abbas; Aravinthan, Visvakumar (IEEE, 2016)
      Analysis, modeling and development of residential demand response schemes are vital for the next generation active distribution systems. Among residential level deferrable loads thermally controllable loads have shown a ...
    • Big bang, small bucks; effective use of low-cost CAD packages 

      Pendse, Ravi; Johnson, Everett L. (IEEE, 1996-11-06)
      At Wichita State University the authors have implemented an undergraduate three-course sequence in digital system design and computer architecture. Key to the success of these courses are two inexpensive yet very effective ...
    • Bio-inspired robotic fish propelled by multiple artificial fins 

      Hou, Piqi; Ye, Zhihang; Chen, Zheng (American Society of Mechanical Engineers, 2017)
      With advances in actuation and sensing, smart materials has drawn a growing attention from researchers in under water robotic fish. In this paper, a compact, noiseless, and untethered biomimetic robotic fish propelled by ...
    • Biometric systems with multiuser access structures 

      Chou, Remi (IEEE, 2019-07)
      We propose a model for biometric systems with a multiuser access structure, where after enrollment only predefined authorized sets of participants are allowed to access the system upon presenting their biometrics. Two types ...
    • Biometrics Fusion with Applications in Passenger Re-authentication for Automated Border Control Systems 

      Nguyen, Hoang Mark; Rattani, Ajita; Derakhshani, Reza R. (IEEE, 2020-03-12)
      Over 4.1 billion aircraft passengers flew in 2017. This number is expected to be nearly double by 2037. Due to the significant growth in airline services and passenger traffic, automated border control (ABC) systems have ...
    • Bit level synchronized MAC protocol for multireader RFID networks 

      Namboodiri, Vinod; Pendse, Ravi (Hindawi Publishing Corporation, 2010-07-12)
      The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency ...
    • Blind detection with unique identification in two-way relay channel 

      Li, Lun; Ding, Yanwu; Zhang, Jian-Kang; Zhang, Rui (IEEE-INST electrical electronics engineers inc, 2012-07)
      This paper considers the blind detection for a two-way relay system in which two source nodes exchange information via a relay node by amplify-and-forward relaying. An efficient transmission scheme is first proposed to ...