Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Given the recent interest in non-binary forms of spreading sequences, there is a gap in knowledge on code tracking techniques for noise-like spreading codes. This paper presents t...
This paper proposes a Real-Time Pricing (RTP)-based power scheduling scheme as demand response for residential power usage. In this scheme, the Energy Management Controller (EMC) ...
The transformation of the voiced segments of a speech recording has many applications such as expressivity synthesis or voice conversion. This paper addresses the pitch transposit...
In a non-ideal PLL circuit, leakage of the reference signal into the control line produces spurious tones. When the distorted PLL signal is used as a clock signal, it creates spur...