Search
Skip to Search Results- 13Jiang, Hai (Electrical and Computer Engineering)
- 10Niu, Di (Electrical and Computer Engineering)
- 2Ardakani, Masoud (Electrical and Computer Engineering)
- 2Kong, Linglong (Mathematical and Statistical Sciences)
- 2Tellambura, Chintha (Electrical and Computer Engineering)
- 2Vorobyov, Sergiy A (Electrical and Computer Engineering)
-
Fall 2023
With the increasing complexity and capacity of modern Field-Programmable Gate Arrays (FPGAs), there is a growing demand for efficient FPGA computer-aided design (CAD) tools, particularly at the placement stage. While some previous works, such as RLPlace, have explored the efficacy of single-state...
-
Fall 2021
Malware classification is a critical task in cybersecurity. It offers insights on the threats posed to victim devices from different malware and aids in the designing of precautionary measures. In real world applications, due to the vast amount of malware present in the networks, real-time...
-
Fall 2013
Cognitive radio is one of the most promising technologies to address the spectrum scarcity problem. Cognitive radio requires spectrum sensing, which is used by unlicensed users to opportunistically access the licensed spectrum. Spectrum sensing using energy detection offers low-cost and...
-
Analysis of Non-Coherent Detectors for Opportunistic Spectrum Access in Broadband Wireless Networks
DownloadSpring 2016
The exponential growth in the number of wireless broadband service users demands an enormous increase in the available communication bandwidth, which inherently translates into an increased demand for the radio frequency spectrum. Opportunistically accessing the unused portions of the spectrum...
-
Fall 2018
With the increasing popularity of Android smart phones in recent years, the amount of Android malware is growing rapidly. Due to its great threat and damage to mobile phone users, Android malware detection has become increasingly important in cyber security. Traditional methods for android...
-
Applications of Power-Domain Non-Orthogonal Multiple Access in Wireless Communication Networks
DownloadSpring 2020
The expected explosive data traffic and scarcity of available spectrum in wireless networks place higher demands on spectrum utilization. As one of the advanced techniques for improving spectral efficiency, non-orthogonal multiple access (NOMA) has raised considerable attention recently. Although...
-
Spring 2018
Energy harvesting techniques, which exploit ambient energy to power communications devices, have gained increased attention in recent years. Such techniques have emerged as a promising solution for energy-constrained wireless networks, with possible applications in the future Internet of things....
-
Cooperative linear precoding for spectrum sharing in multi-user wireless systems: game theoretic approach
DownloadFall 2009
Future wireless communications expect to experience a spectrum shortage problem. One practical solution is spectrum sharing. This thesis studies precoding strategies to allocate communication resources for spectrum sharing in multi-user wireless systems from a game-theoretic perspective. The...
-
Fall 2016
We provide a case study of current inefficiencies in how traffic to well-known cloud-storage providers (e.g., Dropbox, Google Drive, Microsoft OneDrive) can vary significantly in throughput (e.g., a factor of 5 or more) depending on the location of the source and sink of the data. Our case study...
-
Spring 2020
With the popularity of smart mobile devices, the need to control mobile devices using voice is increasing. Also, there is greater expectation for the accuracy of keyword spotting. Many existing researches have applied neural networks to keyword spotting, and have great performances. However, at...