scispace - formally typeset
Search or ask a question
Institution

Stevens Institute of Technology

EducationHoboken, New Jersey, United States
About: Stevens Institute of Technology is a education organization based out in Hoboken, New Jersey, United States. It is known for research contribution in the topics: Computer science & Cognitive radio. The organization has 5440 authors who have published 12684 publications receiving 296875 citations. The organization is also known as: Stevens & Stevens Tech.


Papers
More filters
Book
02 Aug 2013
TL;DR: In this article, the authors present a viewgraph presentation which provides guidelines for performing an Equivalent System Mass (ESM) evaluation for trade study purposes, and discuss interpretation of ESM results.
Abstract: This document is a viewgraph presentation which provides guidelines for performing an Equivalent System Mass (ESM) evaluation for trade study purposes. The document: 1) Defines ESM; 2) Explains how to calculate ESM; 3) Discusses interpretation of ESM results. The document is designed to provide detailed instructive material for researchers who are performing ESM evaluations for the first time.

81 citations

Journal ArticleDOI
TL;DR: A framework called opportunistic encryption is proposed that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints and produces significant improvement in the performance compared to traditional approaches.
Abstract: Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.

81 citations

Journal ArticleDOI
01 Mar 1997
TL;DR: A two-dimensional (2-D) taxonomy is presented in which systems are classified according to four levels of technological uncertainty, and three levels of system scope, and it is claimed that adapting the wrong system and management style may cause major difficulties during the process of system creation.
Abstract: Systems engineering is developing rapidly, while new standards are created and new tools are being developed. However, the theoretical understanding and the conceptual foundation of systems engineering are still in their early stages. For example, although real-world systems exhibit considerable differences, there is very little distinction in the literature between the system type and the description of its actual system engineering pursuit. We suggest here a new approach to systems engineering. It is based on the premise that the actual process of systems engineering must be adaptive to the real system type. Using this concept, we present a two-dimensional (2-D) taxonomy in which systems are classified according to four levels of technological uncertainty, and three levels of system scope. We then describe the differences found in systems engineering styles in various areas, such as system requirements, functional allocation, systems design, project organization, and management style. We also claim that adapting the wrong system and management style may cause major difficulties during the process of system creation. Two examples will be analyzed to illustrate this point: the famous Space Shuttle case and one of the system development projects we studied.

81 citations

Journal ArticleDOI
TL;DR: A new approach for culturing difficult to preserve primary human MMC is reported, which uses a three-dimensional ossified tissue to mimic the tumor niche and recapitulate interactions between bone marrow cells and osteoblasts (OSB).
Abstract: In vitro culturing of primary multiple myeloma cells (MMC) has been a major challenge as this plasma cell malignancy depends on the bone marrow environment for its survival. Using a microfluidic platform to emulate the dynamic physiology of the bone marrow microenvironment, we report here a new approach for culturing difficult to preserve primary human MMC. The system uses a three-dimensional ossified tissue to mimic the tumor niche and recapitulate interactions between bone marrow cells and osteoblasts (OSB). To this end, the human fetal OSB cell line hFOB 1.19 was cultured in an eight-chamber microfluidic culture device to facilitate the seeding of mononuclear cells from bone marrow aspirates from three multiple myeloma patients. Optical microscopy, used for real-time monitoring of mononuclear cell interactions with the ossified tissue, confirmed that these are drawn toward the OSB layer. After 3 weeks, cocultures were characterized by flow cytometry to evaluate the amount of expansion of primary MMC (w...

81 citations

Journal ArticleDOI
TL;DR: This paper proposes several schemes that improve resiliency by reducing the system's vulnerability and increasing its adaptive capacity by applying the methodology of the Networked Infrastructure Resiliency Assessment framework.
Abstract: Resiliency can be defined as the ability of the system to bounce back after a shock and return to its normal value delivery levels. In maritime transportation systems (MTS), manmade and natural disruptions reduce the capacity of ports to send and receive goods, which can result in significant negative socio-economic impacts. Implementing resiliency in these systems improves their ability to cope with disruptions hence minimising losses. This paper proposes several schemes that improve resiliency by reducing the system's vulnerability and increasing its adaptive capacity. The impact of the schemes on the system's resiliency metrics are evaluated by applying the methodology of the Networked Infrastructure Resiliency Assessment framework. The framework consists of three stages in which a network model is extracted from the physical network, the resiliency metrics are identified and the system is modelled using network optimisation techniques and a system dynamics model. The disruptions are modelled by reduci...

81 citations


Authors

Showing all 5536 results

NameH-indexPapersCitations
Paul M. Thompson1832271146736
Roger Jones138998114061
Georgios B. Giannakis137132173517
Li-Jun Wan11363952128
Joel L. Lebowitz10175439713
David Smith10099442271
Derong Liu7760819399
Robert R. Clancy7729318882
Karl H. Schoenbach7549419923
Robert M. Gray7537139221
Jin Yu7448032123
Sheng Chen7168827847
Hui Wu7134719666
Amir H. Gandomi6737522192
Haibo He6648222370
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

94% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

91% related

University of Maryland, College Park
155.9K papers, 7.2M citations

91% related

Purdue University
163.5K papers, 5.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202342
2022139
2021765
2020820
2019799
2018563