Search Results - tongtong+li

5 Results Sort By:

Secure and Efficient Orthogonal Frequency Division Multiplexing Transmission System with Disguised Jamming

VALUE PROPOSITION The use of orthogonal frequency division multiplexing (OFDM) signal modulation has become widespread in current electronics. Currently 4G, 5G, LTE and other data and telecommunications systems utilize this modulation technique due to its numerous advantages.. With integration of OFDM into consumer, government, and corporate fields,...
Published: 8/16/2024   |   Inventor(s): Tongtong Li, Jian Ren, Yuan Liang
Keywords(s):   Category(s): Computer Software, Telecommunications and Internet, Defense

Detection and Prediction of Mild Cognitive Impairment using Resting-State EEG

VALUE PROPOSITION Early discrimination and prediction of mild cognitive impairment (MCI) are crucial for the study of neurodegenerative mechanisms and interventions to promote cognitive resiliency. Existing work mainly focuses on the detection of MCI before Alzheimer’s onset; however, quantitative methods which enable prediction of progression...
Published: 8/13/2024   |   Inventor(s): Tongtong Li, Jinxian Deng, Boxin Sun, Bruno Giordani, Mingyan Liu, Voyko Kavcic
Keywords(s):   Category(s): Medical

Blockchain-based Mobile Electronic Voting

VALUE PROPOSITION Electronic voting presents a convenient and cost-effective alternative to current paper ballot-based voting. It provides many benefits such as increased voter turnout and accuracy in the decision-making process. While presenting many improvements, e-voting still faces serious security challenges that hinder its adoption, especially...
Published: 6/25/2024   |   Inventor(s): Jian Ren, Ehab Zaghloul, Tongtong Li
Keywords(s):   Category(s): Computer Software, Informatics

Regenerating Code uses Rate-matching to Improve Retrieval from Hostile Networks

Executive SummaryA combination of two new regenerating algorithms increases the ability to recover information in a hostile network. This layered approach yields a more efficient and reliable way of detecting and correcting malicious nodes.Description of TechnologyIn a hostile network, conventional regeneration codes struggle to restore corrupt nodes...
Published: 6/8/2021   |   Inventor(s): Jian Ren, Jian Li, Tongtong Li
Keywords(s):   Category(s): Computer Software, Communication

Defense Against Primary User Emulation Attacks In Cognitive Radio Networks

Executive SummaryCognitive radio (CR) networks take advantage of unused bandwidth through which secondary unlicensed users may share the spectrum with the licensed primary users to better utilize the spectrum at any given time. Primary user emulation attacks (PUEAs) are malicious attacks in which a malicious user mimics the signal of a primary user...
Published: 6/8/2021   |   Inventor(s): Tongtong Li, Jian Ren, Mai Abdelhakim, Ahmed Alahmadi
Keywords(s):   Category(s): Communication