Browsing by Sponsor "National Science Foundation (NSF)"
Now showing items 1-20 of 22
-
Adaptation in a Channel Access Game with Private Monitoring
(2013)Under the opportunistic spectrum access paradigm, the shared pool of spectrum bands that the multiple autonomous cognitive radios (CRs) need to compete for is not necessarily homogeneous. The non-homogeneity in channels ... -
An Analysis of Competition among Autonomous Devices in Multichannel Cognitive Radio Networks
(2012)We investigate an autonomous opportunistic spec- trum access (OSA) strategy for a multichannel cognitive radio (CR) network, where two or more autonomous CRs sense the channels sequentially in some sensing order to find ... -
Biaxial strain-induced transport property changes in atomically tailored SrTiO3 -based systems
(2014)Several metallic SrTiO3-based systems, including reduced SrTiO3−δ, Nb-doped SrTiO3, and two-dimensional electron gas at the LaAlO3/SrTiO3(001) interface, have been epitaxially fabricated on various substrates inducing ... -
Charge localization increases chemical expansion in cerium-based oxides
(2012)In this work, we demonstrate the mechanism by which electronic charge localization increases the chemical expansion coefficient in two model systems, CeO 2-? and BaCeO 3-?. Using Density Functional Theory calculations, we ... -
Downlink Transmission in FBMC-based Massive MIMO with Co-located and Distributed Antennas
(2024)This paper introduces a practical precoding method for the downlink of Filter Bank Multicarrier-based (FBMC-based) massive multiple-input multiple-output (MIMO) systems. The proposed method comprises a two-stage precoder, ... -
Effect of Catalyst Diameter on Vapour-Liquid-Solid Growth of GaAs Nanowires
(2014)GaAs nanowires were grown on (111)B GaAs substrates using the vapour-liquid-solid mechanism. The Au/Pt nanodots used to catalyse wire growth were defined lithographically and had varying diameter and separation. An in-depth ... -
Hysteresis Magnetoresistance and Micromagnetic Modeling of Ni Microbelts
(2010)Magnetization reversal process in a single nickel microbelt is investigated by measuring magnetoresistance (MR). A hysteresis MR curve is observed, which consists of a reversible bell-shaped curve under high magnetic field ... -
Investigating Hydroclimatic Impacts of the 168-158 BCE Volcanic Quartet and their Relevance to the Nile River Basin and Egyptian History
(Routledge, 2023)The Ptolemaic era (305–30 BCE) is an important period of Ancient Egyptian history known for its material and scientific advances, but also intermittent political and social unrest in the form of (sometimes widespread) ... -
Ion irradiation induced structural and electrical transition in graphene
(2010)The relationship between the electrical properties and structure evolution of single layer graphene was studied by gradually introducing the gallium ion irradiation. Raman spectrums show a structural transition from ... -
Lipidic cubic phase injector facilitates membrane protein serial femtosecond crystallography
(2014)Lipidic cubic phase (LCP) crystallization has proven successful for high-resolution structure determination of challenging membrane proteins. Here we present a technique for extruding gel-like LCP with embedded membrane ... -
Liquid Exfoliation of Layered Materials
(2013)Not all crystals form atomic bonds in three dimensions. Layered crystals, for instance, are those that form strong chemical bonds in-plane but display weak out-of-plane bonding. This allows them to be exfoliated into ... -
The MANIAC Challenge: Exploring MANETs through Competition
(2010-05)In this paper we discuss the MANIAC Challenge, a cooperative and competitive approach to MANET networking research. Our goal was to create an opportunity for researchers to come together and compete in a MANET-based ... -
Medieval Irish chronicles reveal persistent volcanic forcing of severe winter cold events, 431 - 1649 CE
(2013)Explosive volcanism resulting in stratospheric injection of sulfate aerosol is a major driver of regional to global climatic variability on interannual and longer timescales. However, much of our knowledge of the climatic ... -
A Method of Proactive MANET Routing Protocol Evaluation Applied to the OLSR Protocol
(2011)Traditional evaluation studies of MANET routing protocols have concentrated on quantitative, traffic-based metrics like throughput and packet loss. These metrics provide a lim- ited evaluation of protocol performance ... -
Mn2Au: body centered tetragonal bimetallic antiferromagnet grown by molecular beam epitaxy
(2012): Mn2Au, a layered bimetal, has been successfully grown using MBE technique in AFM/FM bilayer setting. Our experiments and first principle calculations suggest that Mn2Au film is an antiferromagnet with a much lower critical ... -
On Software Tools and Stack Architectures for Wireless Network Experiments
(2011)Simulation is still the most widely adopted perfor- mance evaluation technique in mobile ad hoc network research, in spite of a growing number of questions about the fidelity of this technique. Implementation-based ... -
Thermoelectric behavior of organic thin film nanocomposites
(2013)Organic thin film nanocomposites, prepared by liquid-phase exfoliation, were investigated for their superior electrical properties and thermoelectric behavior. Single-walled carbon nanotubes (SWNT) were stabilized by ... -
The trouble with STEAM and why we use it anyway
(2021)As an emerging field of theory, research, and practice, STEAM (Science, Technology, Engineering, Arts, and Mathematics) has received attention for its efforts to incorporate the arts into the rubric of STEM (Science, ... -
Tunneling processes in asymmetric double barrier magnetic tunnel junctions with a thin top MgO layer
(2013)Dynamic conductance dI/dV and inelastic electron tunneling spectroscopy (IETS) d 2I/dV 2 have been measured at different temperatures for double barrier magnetic tunnel junctions with a thin top MgO layer. The resistance ... -
Type-safe execution of mobile agents in anonymous networks (Extended Abstract).
(Springer-Verlag, 1999)We study type-safety properties of open distributed systems of mobile agents, where not all sites are known to be well-typed. We adopt the underlying model of an anonymous network, allowing that code may be corrupted on ...