Browsing Ravi Pendse by Title
Now showing items 1-20 of 126
-
A new transmission control protocol for active RFID networks
(2014-05-13)In this paper a new transmission control protocol named IISS for active RFID networks is proposed that utilizes the concept of scanning the network for successful and unsuccessful slots using lesser number of bits (compared ... -
ABCs of processor design: Introductory computer architecture using the LIS-4
(ASEE, 1997-06)At Wichita State University a three course sequence in the Digital Design area is offered. First year students are encouraged to take the first course. By their third semester it is possible for a student to enroll in ... -
Ad-hoc networks and layer 2 tunnels
(IEEE, 2004-09-26)The reach of an ad hoc network is very limited and researchers have studied this issue with great interest. A node that wants to send data to a remote node that is outside its transmission range depends on the intermediate ... -
Ad-hoc nodes and internet connectivity using pseudo-wire interfaces
(IEEE, 2003-10-06)An increasing interest in supporting the nomadic nature of mobile nodes has lead to interesting ideas towards the deployment of Internet access to ad-hoc nodes. Most of the proposed solutions using mobile IP assume that ... -
An adaptive algorithm for sensor activation in renewable energy based sensor systems
(IEEE, 2009-12-07)Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. A key research question in such sensor systems is to maximize the asymptotic ... -
Adaptive algorithms for sensor activation in renewable energy based sensor systems
(ELSEVIER SCIENCE BV, 2013-06)Upcoming sensor networks would be deployed with sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. A key research question in such sensor systems is to maximize the ... -
Aircraft data networks and performance enhancement proxies
(IEEE, 2006-10-15)With the increased deployment of data networks within the aircrafts, it is important to find ways to provide better service to user traffic. In order to provide Internet services within the aircraft, it is important to use ... -
Aircraft health management network: A user interface
(2009-07)Network management is one of the most discussed topics in the networking fraternity. The efficiency of the network management suit is measured by the number of parameters/components handled by the application while making ... -
Aircraft health management tool: A comprehensive user interface
(IEEE, 2007-10-21)Network management is one of the most discussed topics in the networking fraternity. The efficiency of the network management suit is measured by the number of parameters/components handled by the application while making ... -
Airplane data networks and security issues
(IEEE, 2004-10-04)The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ... -
Alternate encryption scheme for VoIP traffic
(IEEE, 2009-10-05)Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data ... -
Analytical estimation of path duration in mobile Ad Hoc networks
(IEEE, 2012-06)Path duration is an important design parameter that determines the performance of a mobile ad hoc network (MANET). For example, it can be used to estimate the route expiry time parameter for routes in "on demand" routing ... -
Aviation data networks: New avenues for flight safety
(IEEE, 2004-10-11)Aircraft data networks are fast becoming more of a necessity due to their support for user mobility. Many aircraft manufacturers are planning to deploy data networks within their airplanes and provide Internet connectivity ... -
Aviation data networks: Security issues and network architecture
(IEEE, 2004-10-11)The information technology (IT) revolution, combined with people's need to access information quickly, has resulted in the explosive growth of the Internet in the past decade. Ubiquitous access to the Internet has become ... -
Big bang, small bucks; effective use of low-cost CAD packages
(IEEE, 1996-11-06)At Wichita State University the authors have implemented an undergraduate three-course sequence in digital system design and computer architecture. Key to the success of these courses are two inexpensive yet very effective ... -
Bit level synchronized MAC protocol for multireader RFID networks
(Hindawi Publishing Corporation, 2010-07-12)The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency ... -
Bridging the generation gap
(IEEE, 2005-12)The demand for mobile service increase many service providers which they start finding solutions for integrating third and fourth generation networks and to develop mobility protocols. This article introduces the macromobility, ... -
Cache isolation and thin provisioning of hypervisor caches
(IEEE, 2012-10)Server virtualization has enabled resource consolidation and has minimized the need for additional and expensive hardware. Server virtualization has been widely deployed in a lot of organizations, because of the attractive ...