scispace - formally typeset
Search or ask a question
Institution

Stevens Institute of Technology

EducationHoboken, New Jersey, United States
About: Stevens Institute of Technology is a education organization based out in Hoboken, New Jersey, United States. It is known for research contribution in the topics: Cognitive radio & Wireless network. The organization has 5440 authors who have published 12684 publications receiving 296875 citations. The organization is also known as: Stevens & Stevens Tech.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, neutral temperature responsive polymers, such as poly(N-vinylcaprolactam) and poly(vinyl methyl ether) (PVME), were included in ultrathin films using layer-by-layer alternating adsorption of these polymers with poly(methacrylic acid) (PMAA) at low pH.
Abstract: Neutral temperature responsive polymers, such as poly(N-vinylcaprolactam) (PVCL) and poly(vinyl methyl ether) (PVME), were included in ultrathin films using layer-by-layer alternating adsorption of these polymers with poly(methacrylic acid) (PMAA) at low pH. The amounts of polymers adsorbed and ionization of carboxylic groups within a film were quantified using in situ FTIR-ATR (Fourier transform infrared spectroscopy by attenuated total reflection). The strength of interlayer adhesion provided through hydrogen-bonding interactions was inferred from the critical pH value (pHCR) and critical ionization (αCR) for multilayer decomposition which were pHCR 6.2, αCR 2% and pHCR 6.95, αCR 30% for PMAA/PVME and PMAA/PVCL films, respectively. When deposited onto porous support membranes, PMAA/PVME and PMAA/PVCL multilayers exhibited temperature-responsive changes in dye permeability. The transition occurred in a wide temperature range from 25 to 35 °C, reflecting lower cooperativity of the phase separation of PVME...

144 citations

Journal ArticleDOI
TL;DR: In this paper, a state transformation is employed to improve the upper bounds on the linear time-varying perturbation of an asymptotically stable linear time invariant system for robust stability.
Abstract: This note addresses the issue of "conservatism" in the time domain stability robustness bounds obtained by the Lyapunov approach. A state transformation is employed to improve the upper bounds on the linear time-varying perturbation of an asymptotically stable linear time-invariant system for robust stability. This improvement is due to the variance of the conservatism of the Lyapunov approach with respect to the basis of the vector space in which the Lyapunov function is constructed. Improved bounds are obtained, using a transformation, on elemental and vector norms of perturbations (i.e., structured perturbations) as well as on a matrix norm of perturbations (i.e., unstructured perturbations). For the case of a diagonal transformation, an algorithm is proposed to find the "optimal" transformation. Several examples are presented to illustrate the proposed analysis.

144 citations

Proceedings ArticleDOI
07 Sep 2015
TL;DR: It is shown that mobile audio hardware advances can be exploited to discriminate mm-level position differences and that this makes it feasible to locate the origin of keystrokes from only a single phone behind the keyboard.
Abstract: This paper explores the limits of audio ranging on mobile devices in the context of a keystroke snooping scenario. Acoustic keystroke snooping is challenging because it requires distinguishing and labeling sounds generated by tens of keys in very close proximity. Existing work on acoustic keystroke recognition relies on training with labeled data, linguistic context, or multiple phones placed around a keyboard --- requirements that limit usefulness in an adversarial context. In this work, we show that mobile audio hardware advances can be exploited to discriminate mm-level position differences and that this makes it feasible to locate the origin of keystrokes from only a single phone behind the keyboard. The technique clusters keystrokes using time-difference of arrival measurements as well as acoustic features to identify multiple strokes of the same key. It then computes the origin of these sounds precise enough to identify and label each key. By locating keystrokes this technique avoids the need for labeled training data or linguistic context. Experiments with three types of keyboards and off-the-shelf smartphones demonstrate scenarios where our system can recover $94\%$ of keystrokes, which to our knowledge, is the first single-device technique that enables acoustic snooping of passwords.

144 citations

Journal ArticleDOI
TL;DR: It is illustrated that the physical- layer secrecy of CR communications relying on opportunistic relaying can be significantly improved by increasing the number of relays, showing the security benefit of exploiting relay nodes.
Abstract: This article investigates the physical-layer security of CR networks, which are vulnerable to various newly arising attacks targeting the weaknesses of CR communications and networking. We first review a range of physical-layer attacks in CR networks, including primary user emulation, sensing falsification, intelligence compromise, jamming, and eavesdropping attacks. Then we focus on the physical-layer security of CR networks against eavesdropping and examine the secrecy performance of cognitive communications in terms of secrecy outage probability. We further consider the use of relays for improving CR security against eavesdropping and propose an opportunistic relaying scheme, where a relay node that makes CR communications most resistant to eavesdropping is chosen to participate in assisting the transmission from a cognitive source to its destination. It is illustrated that the physical- layer secrecy of CR communications relying on opportunistic relaying can be significantly improved by increasing the number of relays, showing the security benefit of exploiting relay nodes. Finally, we present some open challenges in the field of relay-assisted physical-layer security for CR networks.

144 citations

Journal ArticleDOI
TL;DR: A comprehensive review of the design guidelines of TENGs, their performance, and their designs in the context of Internet of Things (IoT) applications is presented, and different designs of power management circuits, supercapacitors, and batteries that can be integrated with TENG devices are reviewed.
Abstract: Since their debut in 2012, triboelectric nanogenerators (TENGs) have attained high performance in terms of both energy density and instantaneous conversion, reaching up to 500 W m-2 and 85%, respectively, synchronous with multiple energy sources and hybridized designs. Here, a comprehensive review of the design guidelines of TENGs, their performance, and their designs in the context of Internet of Things (IoT) applications is presented. The development stages of TENGs in large-scale self-powered systems and technological applications enabled by harvesting energy from water waves or wind energy sources are also reviewed. This self-powered capability is essential considering that IoT applications should be capable of operation anywhere and anytime, supported by a network of energy harvesting systems in arbitrary environments. In addition, this review paper investigates the development of self-charging power units (SCPUs), which can be realized by pairing TENGs with energy storage devices, such as batteries and capacitors. Consequently, different designs of power management circuits, supercapacitors, and batteries that can be integrated with TENG devices are also reviewed. Finally, the significant factors that need to be addressed when designing and optimizing TENG-based systems for energy harvesting and self-powered sensing applications are discussed.

144 citations


Authors

Showing all 5536 results

NameH-indexPapersCitations
Paul M. Thompson1832271146736
Roger Jones138998114061
Georgios B. Giannakis137132173517
Li-Jun Wan11363952128
Joel L. Lebowitz10175439713
David Smith10099442271
Derong Liu7760819399
Robert R. Clancy7729318882
Karl H. Schoenbach7549419923
Robert M. Gray7537139221
Jin Yu7448032123
Sheng Chen7168827847
Hui Wu7134719666
Amir H. Gandomi6737522192
Haibo He6648222370
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

94% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

91% related

University of Maryland, College Park
155.9K papers, 7.2M citations

91% related

Purdue University
163.5K papers, 5.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202342
2022139
2021765
2020820
2019799
2018563