246 results
Search Results
Now showing 1 - 10 of 246
Conference Object Citation - Scopus: 9A Layered Security Architecture for Corporate 802.11 Wireless Networks(Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.Conference Object Citation - Scopus: 8Modeling-Error Based Adaptive Fuzzy Sliding Mode Control for Trajectory-Tracking of Nonlinear Systems(2003) Yu,S.; Yu,X.; Efe,M.O.A novel adaptive fuzzy sliding mode control design is developed for trajectory tracking of a class of nonlinear systems in this paper. This control design uses the modelling error to adaptively estimate the deterministic uncertainties as well as the control gain based on the fuzzy systems approach. By this design, the bounds of the uncertainties are not required to be known in advance, and the robust stability of closed loop systems is analysed in the Lyapunov sense. Simulation results are given to demonstrate the improved performance.Conference Object Citation - Scopus: 16Target Tracking Using Artificial Potentials and Sliding Mode Control(2004) Gazi,V.; Ordóñez,R.In this article we develop an algorithm for capturing/intercepting a moving target based on the sliding mode control method. First, we consider a "kinematic" model (in a sense) for the capture/intercept problem and develop a method for that case. Then, we build on the developed method to include general fully actuated vehicle dynamics for the pursuer agent. The algorithm is robust with respect to the system uncertainties and additive disturbances. Finally, we also provide a numerical simulation in order to illustrate the procedure.Article Citation - WoS: 14Citation - Scopus: 15Yielding of Two-Layer Shrink-Fitted Composite Tubes Subject To Radial Pressure(Springer Heidelberg, 2005) Eraslan, AN; Akis, TYielding of two-layer shrink-fitted composite tubes with axially constrained ends subject to either internal or external pressure is investigated in detail. In the framework of small deformations, a state of plane strain and von Mises yield criterion, analytical expressions are obtained for critical values of the pressure leading to plastic flow. It is shown that, depending on material properties and tube dimensions, different modes of plastic deformation may occur. Yielding may commence at the inner tube or at the outer tube or simultaneously in both tubes. The conditions for different nature of plastic flow are determined. Using analytical expressions obtained for critical values of the parameters and properties of real engineering materials, various numerical examples are handled and the variation of elastic limit pressure with interference and interface radius is explained.Article Citation - WoS: 7Computation of a Tunable Slot-Loaded Equilateral Triangular Microstrip Antenna(Vsp Bv, 2009) Aydin, E.In this paper, a simple closed form expression is developed to accurately estimate the lower and upper operating frequencies of a single feed slot loaded triangular patch (SLTP) with variations of the bent slot lengths. It is obtained by using cavity model analysis and useful to antenna engineers for accurately predicting both operating resonant frequencies of the SLTP. The theory is compared with the experimental results available in the literature, and excellent agreement is observed. The proposed computation is also extended to the analysis of tunability of the SLTP as a function of the air-gap height.Article Citation - WoS: 24Citation - Scopus: 24Symplectic and multisymplectic Lobatto methods for the "good" Boussinesq equation(Amer inst Physics, 2008) Aydin, A.; Karasoezen, B.In this paper, we construct second order symplectic and multisymplectic integrators for the "good" Boussineq equation using the two-stage Lobatto IIIA-IIIB partitioned Runge-Kutta method, which yield an explicit scheme and is equivalent to the classical central difference approximation to the second order spatial derivative. Numerical dispersion properties and the stability of both integrators are investigated. Numerical results for different solitary wave solutions confirm the excellent long time behavior of symplectic and multisymplectic integrators by preservink local and global energy and momentum. (C) 2008 American Institute of Physics.Article Citation - WoS: 23Citation - Scopus: 22Improved Global Robust Stability Criterion for Delayed Neural Networks(Pergamon-elsevier Science Ltd, 2007) Singh, VimalA criterion for the uniqueness and global robust stability of the equilibrium point of interval Hopfield-type delayed neural networks is presented. The criterion is a marked improvement over a recent criterion due to Cao, Huang and Qu. (c) 2005 Elsevier Ltd. All rights reserved.Book Part Citation - Scopus: 1Web Privacy: Issues, Legislations, and Technological Challenges(IGI Global, 2008) Mishra,A.; Mishra,D.People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private organizations, governments and employers. Privacy relates to issues regarding collection, secure transmission, storage, authorized access, usage, and disclosure of personal information. This information is used for commercial gain by many organizations. Individual privacy concerns significantly affects consumer willingness to engage in electronic commerce over the Internet. The increased use of the Internet and Web for everyday activities is bringing new threats to personal privacy. This chapter assessed various issues related to individual privacy on the Web, growing concerns among the Web users, technologies employed for collecting and protecting information on the Web, privacy-enhancing technologies and the legal provisions to curb the Web privacy. This chapter also reported detailed discussion about Platform for Privacy Preferences (P3P), its structure, present scenario of its implementation and its future success. Global consistency on Internet privacy protection is important to promote the growth of electronic commerce. To protect consumers in a globally consistent manner, legislation, self-regulation, technical solutions and combination solutions are different ways that can be implemented. © 2008, IGI Global.Conference Object Complexity Engineering, Evolution and Optimality of Structures(Morgan Kaufmann Pub inc, 1999) Kundu, SComplexity Engineering deals with harnessing the power of Cellular Automata (CA) like simple models to solve real life difficult and complex engineering problems, dealing with systems that have very simple components that collectively exhibit complex behaviors. The state transition rules are generally fixed in a CA, but evolution of the rules, is considered here. To evolve the local rules, we use the Genetic Algorithm (GA) model. The example application described here will serve to demonstrate that the GAs can discover CA rules that give rise to emergent computational strategies by self-organization and exhibit globally coordinated tasks for optimization, with simple local interactions only.Article Citation - WoS: 7Citation - Scopus: 10Efficient Software Review Process for Small and Medium Enterprises(inst Engineering Technology-iet, 2007) Mishra, D.; Mishra, A.A considerable amount of software is produced world-wide by small and medium enterprises (SMEs). These organisations do not have enough resources to implement a rigorous quality plan. It has been established that reviews of various artifacts play a very important role in ensuring the quality of software. Traditional review methods are rigorous and their implementation is cumbersome for SMEs. A new review process which is easy to implement and requires almost no documentation is introduced. It is based on reviewers' efforts to produce high-quality software while minimising the inspection cost. Additionally, people who are conducting this review need not be present at the same place during most phases of the review process. This process has been successfully implemented in a CMM level 3 software development company intending to achieve CMMI level 5 and results are found to be quite encouraging.

