Search Results - technology+classifications+%3e+computer+science+%3e+network+systems

5 Results Sort By:
Enhanced Diversity and Network Coding (eDC-NC)
­Advantages: Provides near-instantaneous recovery from multiple link or node failures. Significantly reduces energy consumption compared to traditional methods. Enhances throughput for various network technologies, including 5G and IoT. Summary: Current wireless network topologies encounter significant challenges such as latency, high energy...
Published: 7/8/2024   |   Inventor(s): Richard Gitlin, Nabeel Sulieman
Keywords(s): Internet of Things / IoT, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Engineering > Electrical Engineering, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Computer Science > Network Systems, Technology Classifications > Engineering > Communications
Control of Multiagent Networks With Misbehaving Nodes Over Directed Graph Topologies
­Competitive Advantages Limited number of controlled nodes required to gain the stability in the overall network. Utilization of a graph-based approach that allows to find steady-state values of critical nodes without the knowledge of the Laplacian matrix of the overall network. Best nodes could be selected from all the controlled nodes...
Published: 6/27/2024   |   Inventor(s): Emre Yildirim, Tansel Yucelen
Keywords(s): Health Tech, Industrial Applications, Transportation
Category(s): Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Hardware, Technology Classifications > Computer Science > Network Systems, Technology Classifications > Energy & Environment > Energy Engineering, Technology Classifications > Engineering > Autonomous Vehicle, Technology Classifications > Engineering > Transportation
Norm-Free Adaptive Event-Triggering Rule For Distributed Control Of Multiagent Systems
­Competitive Advantages Replaces global interactions with local information exchanges to improve scalability and security of multiagent systems. Significantly reduces agent-to-agent information exchange by removing norms and introducing an adaptive term. Helps prevent network overload and excessive energy use by agents via event-triggered rules. Summary Our...
Published: 7/14/2023   |   Inventor(s): Deniz Kurtoglu, Tansel Yucelen, Stefan Ristevski, Jonathan Muse
Keywords(s): Computers Software and Information Technology, Cybersecurity, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > Network Systems, Technology Classifications > Engineering > Mechanical Engineering, Technology Classifications > Engineering > Electrical Engineering, Technology Classifications > Engineering > Computer Engineering
DRL Based Adaptive Network Slicing for 5G Applications
­Competitive Advantages The network learns dynamically through interaction with the environment and adapts to it. Edge controllers can efficiently manage the edge resources by enabling cooperation among the fog nodes. Slices the network optimally as per the task load and latency needs. Summary Researchers at the University of South Florida...
Published: 7/12/2023   |   Inventor(s): Almuthanna Nassar, Yasin Yilmaz
Keywords(s): Computer Science, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Computer Science, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Network Systems, Technology Classifications > Engineering > Transportation, Technology Classifications > Engineering > Autonomous Vehicle
Hardware Supported Authentication and Signatures For Wireless, Distributed and Blockchain Systems
Competitive Advantages Energy-aware authentication protocol suitable for IoT devices and embedded devices Provable Security standards to the level of upcoming post-quantum security breaches in cryptosystems Scalable security architecture support for massive IoT applications Summary IoT devices play a central role in the distributed systems for...
Published: 8/16/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Blockchain, Cryptography and Intrusion Detection, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Network Systems