Browsing EECS Faculty Scholarship by Type "Article"
Now showing items 1-20 of 211
-
A promising security protocol for protecting near field communication devices from networking attacks
(Inderscience Enterprises Ltd., 2017)Near field communication (NFC) is vulnerable to numerous networking attacks such as tag manipulation. In this work, a security protocol for the NFC chip is introduced to protect the NFC devices and associated data from ... -
A way cache locking scheme supported by knowledge based smart preload effective for low-power multicore electronics
(American Scientific Publishers, 2012-12-01)Adopting multicore architecture in consumer and bio-inspired electronics is promising to fulfill the growing need of high-performance. However, multi-level caches in multicore architecture require significant amount of ... -
Achievable data rates and power allocation for frequency-selective fading relay channels with imperfect channel estimation
(Springer, 2012-12-31)In this article, we investigate the information-theoretical performance of a cooperative orthogonal frequency division multiplexing (OFDM) system with imperfect channel estimation. Assuming the deployment of training-aided ... -
Achieving overlap of multiple, arbitrarily shaped footprints using rendezvous cones
(American Institute of Aeronautics and Astronautics, Inc., 2018-06)This paper addresses the problem of achieving the overlap of footprints of unmanned aerial vehicles used for search and surveillance or for establishing communication between remote areas. The need of the footprints to ... -
Adaptive algorithms for sensor activation in renewable energy based sensor systems
(ELSEVIER SCIENCE BV, 2013-06)Upcoming sensor networks would be deployed with sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. A key research question in such sensor systems is to maximize the ... -
Adaptive flight-control design using neural-network-aided optimal nonlinear dynamic inversion
(American Institute of Aeronautics and Astronautics, 2014-11)A neural-network-aided nonlinear dynamic inversion-based hybrid technique of model reference adaptive control flight-control system design is presented in this paper. Here, the gains of the nonlinear dynamic inversion-based ... -
Adverse wireless communication environment impacts on AF wireless relay networks
(IEEE, 2013)This paper proposes amplify-and-forward (AF) relay matrices for a one-source-one-destination pair and cooperative distributed N relay nodes under three adverse wireless relay communication environments: (1) broadband noise ... -
AF wireless relay network analysis under receiver power constraint
(IEEE, 2013)This paper presents both cooperative and noncooperative amplify-and-forward (AF) relay networks consisting of a one-source-one-destination pair and N-relays under receiver power constraint (RPC) at the destination. The ... -
Aircraft health management network: A user interface
(2009-07)Network management is one of the most discussed topics in the networking fraternity. The efficiency of the network management suit is measured by the number of parameters/components handled by the application while making ... -
ALARM: average low-latency medium access control communication protocol for smart feeders
(Institution of Engineering and Technology-IET, 2016-08-04)The smart distribution system initiative requires higher usage of a distribution feeder-level communication infrastructure to improve system automation. This study proposes a hybrid medium access control (MAC) protocol to ... -
An energy-efficient directory based multicore architecture with wireless routers to minimize the communication latency
(IEEE Computer Society, 2016-05-20)Multicore architectures suffer from high core-to-core communication latency primarily due to the cache's dynamic behavior. Studies suggest that a directory-approach can be helpful to reduce communication latency by storing ... -
An eye blinking password based liveness monitoring system to improve the detection of video spoofing
(IJMEC, 2015-10)Contemporary protocols in the TCP/IP suite may be very vulnerable to spoofing attacks when extra precautions are not taken to verify the identity. There are several ways to spoof the facial recognition such as using ... -
Analytical estimation of path duration in mobile Ad Hoc networks
(IEEE, 2012-06)Path duration is an important design parameter that determines the performance of a mobile ad hoc network (MANET). For example, it can be used to estimate the route expiry time parameter for routes in "on demand" routing ... -
Authors' reply
(IEEE, 1976-08-01) -
Automatically recommending peer reviewers in modern code review
(IEEE, 2016-06-10)Code review is an important part of the software development process. Recently, many open source projects have begun practicing code review through "modern" tools such as GitHub pull-requests and Gerrit. Many commercial ... -
Bit level synchronized MAC protocol for multireader RFID networks
(Hindawi Publishing Corporation, 2010-07-12)The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency ... -
Blind detection design for AF two-way relaying over frequency selective channels
(Springer, 2021-09-18)This paper considers an amplify-and-forward two-way relay system with frequency selective fading channels. The knowledge of channel state information is assumed not available for all nodes. An efcient transmission and ... -
Blind detection with unique identification in two-way relay channel
(IEEE-INST electrical electronics engineers inc, 2012-07)This paper considers the blind detection for a two-way relay system in which two source nodes exchange information via a relay node by amplify-and-forward relaying. An efficient transmission scheme is first proposed to ... -
Blind transmission and detection designs with unique identification and full diversity for noncoherent two-way relay networks
(IEEE, 2014-09)This paper considers blind detection for a two-way relay system in which two source nodes exchange information with each other via a relay node using an amplify-and-forward (AF) protocol. The channel coefficients are assumed ...