scispace - formally typeset
Search or ask a question
Institution

Stevens Institute of Technology

EducationHoboken, New Jersey, United States
About: Stevens Institute of Technology is a education organization based out in Hoboken, New Jersey, United States. It is known for research contribution in the topics: Computer science & Cognitive radio. The organization has 5440 authors who have published 12684 publications receiving 296875 citations. The organization is also known as: Stevens & Stevens Tech.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, an approach to exploit TV white space (TVWS) for device-to-device (D2D) communications with the aid of the existing cellular infrastructure is presented.
Abstract: This paper presents a systematic approach to exploiting TV white space (TVWS) for device-to-device (D2D) communications with the aid of the existing cellular infrastructure. The goal is to build a location-specific TVWS database, which provides a lookup table service for any D2D link to determine its maximum permitted emission power (MPEP) in an unlicensed digital TV (DTV) band. To achieve this goal, the idea of mobile crowd sensing is first introduced to collect active spectrum measurements from massive personal mobile devices. Considering the incompleteness of crowd measurements, we formulate the problem of unknown measurements recovery as a matrix completion problem and apply a powerful fixed point continuation algorithm to reconstruct the unknown elements from the known elements. By joint exploitation of the big spectrum data in its vicinity, each cellular base station further implements a nonlinear support vector machine algorithm to perform irregular coverage boundary detection of a licensed DTV transmitter. With the knowledge of the detected coverage boundary, an opportunistic spatial reuse algorithm is developed for each D2D link to determine its MPEP. Simulation results show that the proposed approach can successfully enable D2D communications in TVWS while satisfying the interference constraint from the licensed DTV services. In addition, to our best knowledge, this is the first try to explore and exploit TVWS inside the DTV protection region resulted from the shadowing effect. Potential application scenarios include communications between internet of vehicles in the underground parking and D2D communications in hotspots such as subway, game stadiums, and airports.

150 citations

Journal ArticleDOI
TL;DR: A comprehensive review of different versions of the KH algorithm and their engineering applications is presented and specific features of KH and future directions are discussed.
Abstract: Krill herd (KH) is a novel swarm-based metaheuristic optimization algorithm inspired by the krill herding behavior. The objective function in the KH optimization process is based on the least distance between the food location and position of a krill. The KH method has been proven to outperform several state-of-the-art metaheuristic algorithms on many benchmarks and engineering cases. This paper presents a comprehensive review of different versions of the KH algorithm and their engineering applications. The study is divided into the following general parts: KH variants, engineering optimization/application, and theoretical analysis. In addition, specific features of KH and future directions are discussed.

149 citations

Book ChapterDOI
18 Sep 2006
TL;DR: This paper study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise, and shows that, in this system, even if an intruder breaks into the database, he only learns very little about the data storage in the database and the queries performed on the data.
Abstract: Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods for queries on encrypted data stored in an outsourced database that may be susceptible to compromise. Specifically, we show that, in our system, even if an intruder breaks into the database and observes some interactions between the database and its users, he only learns very little about the data stored in the database and the queries performed on the data. Our work consists of several components. First, we consider databases in which each attribute has a finite domain and give a basic solution for certain kinds of queries on such databases. Then, we present two enhanced solutions, one with a stronger security guarantee and the other with accelerated queries. In addition to providing proofs of our security guarantees, we provide empirical performance evaluations. Our experiments demonstrate that our solutions are fast on large-sized real data.

149 citations

Journal ArticleDOI
TL;DR: In this paper, the authors developed a theory of error for target factor analysis, which predicts the magnitudes of these errors without requiring any a priori knowledge of the error in the data matrix or the target vector.

149 citations

Journal ArticleDOI
TL;DR: The path-integration method has been applied to estimate transport properties of both linear flexible polymers and lattice model dendrimer molecules and it has been found that C and alpha(e) provide important information about the distribution of molecular size and shape and that they are important for estimating the Stokes friction and intrinsic viscosity of macromolecules.
Abstract: The problem of calculating the electric polarizability tensor ${\ensuremath{\alpha}}_{e}$ of objects of arbitrary shape has been reformulated in terms of path integration and implemented computationally. The method simultaneously yields the electrostatic capacity C and the equilibrium charge density. These functionals of particle shape are important in many materials science applications, including the conductivity and viscosity of filled materials and suspensions. The method has been validated through comparison with exact results (for the sphere, the circular disk, touching spheres, and tori), it has been found that ${10}^{6}$ trajectories yield an accuracy of about four and three significant figures for C and ${\mathbf{\ensuremath{\alpha}}}_{\mathbf{e}},$ respectively. The method is fast: For simple objects, ${10}^{6}$ trajectories require about 1 min on a PC. It is also versatile: Switching from one object to another is easy. Predictions have also been made for regular polygons, polyhedra, and right circular cylinders, since these shapes are important in applications and since numerical calculations of high stated accuracy are available. Finally, the path-integration method has been applied to estimate transport properties of both linear flexible polymers (random walk chains of spheres) and lattice model dendrimer molecules. This requires probing of an ensemble of objects. For linear chains, the distribution function of C and of the trace $({\mathbf{\ensuremath{\alpha}}}_{\mathbf{e}}),$ are found to be universal in a size coordinate reduced by the chain radius of gyration. For dendrimers, these distribution functions become increasingly sharp with generation number. It has been found that C and ${\ensuremath{\alpha}}_{e}$ provide important information about the distribution of molecular size and shape and that they are important for estimating the Stokes friction and intrinsic viscosity of macromolecules.

149 citations


Authors

Showing all 5536 results

NameH-indexPapersCitations
Paul M. Thompson1832271146736
Roger Jones138998114061
Georgios B. Giannakis137132173517
Li-Jun Wan11363952128
Joel L. Lebowitz10175439713
David Smith10099442271
Derong Liu7760819399
Robert R. Clancy7729318882
Karl H. Schoenbach7549419923
Robert M. Gray7537139221
Jin Yu7448032123
Sheng Chen7168827847
Hui Wu7134719666
Amir H. Gandomi6737522192
Haibo He6648222370
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

94% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

91% related

University of Maryland, College Park
155.9K papers, 7.2M citations

91% related

Purdue University
163.5K papers, 5.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202342
2022139
2021765
2020820
2019799
2018563