If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact us at scholarworks@unr.edu.
 

Recent Submissions

  • .

    .

    .

    Atypical Asymmetry for Processing Human and Robot Faces in Autism Revealed by fNIRS 

    Jung, Corinne E.; Strother, Lars; Feil-Seifer, David J.; Hutsler, Jeffrey J. (2016)
    Deficits in the visual processing of faces in autism spectrum disorder (ASD) individuals may be due to atypical brain organization and function. Studies assessing asymmetric brain function in ASD individuals have suggested ...
  • .

    .

    .

    A New Data Fusion Algorithm for Wireless Sensor Networks Inspired by Hesitant Fuzzy Entropy 

    Wang, Jiayao; Tawose, Olamide T.; Jiang, Linhua; Zhao, Dongfang (2019)
    The wireless sensor network (WSN) is mainly composed of a large number of sensor nodes that are equipped with limited energy and resources. Therefore, energy consumption in wireless sensor networks is one of the most ...
  • .

    .

    .

    A Comprehensive Survey of Tools and Software for Active Subnetwork Identification 

    Nguyen, Hung; Shrestha, Sangam; Tran, Duc; Shafi, Adib; Draghici, Sorin; Nguyen, Tin (2019)
    A recent focus of computational biology has been to integrate the complementary information available in molecular profiles as well as in multiple network databases in order to identify connected regions that show significant ...
  • .

    .

    .

    Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection 

    An, Xingshuo; Lu, Xing; Yang, Lei; Zhou, Xianwei; Lin, Fuhong (2019)
    This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs ...
  • .

    .

    .

    A Multi-Cohort and Multi-Omics Meta-Analysis Framework to Identify Network-Based Gene Signatures 

    Shafi, Adib; Nguyen, Tin; Peyvandipour, Azam; Nguyen, Hung; Draghici, Sorin (2019)
    Although massive amounts of condition-specific molecular profiles are being accumulated in public repositories every day, meaningful interpretation of these data remains a major challenge. In an effort to identify the ...
  • .

    .

    .

    Formation control for autonomous robots with collision and obstacle avoidance using a rotational and repulsive force-based approach 

    Dang, Anh D.; La, Hung M.; Nguyen, Thang; Horn, Joachim (2019)
    In this article, we address a formation control problem for a group of autonomous robots to track a moving target in the presence of obstacles. In the proposed method, desired formations, which consist of virtual nodes ...
  • .

    .

    .

    Community assessment to advance computational prediction of cancer drug combinations in a pharmacogenomic screen 

    Menden, Michael P.; Wang, Dennis; Mason, Mike J.; Szalai, Bence; Bulusu, Krishna C.; Guan, Yuanfang; Yu, Thomas; Kang, Jaewoo; Jeon, Minji; Wolfinger, Russ; Nguyen, Tin; Zaslavskiy, Mikhail; Jang, In S.; Ghazoui, Zara; Ahsen, Mehmet E.; Vogel, Robert; Neto, Elias C.; Norman, Thea; Tang, Eric K. Y.; Garnett, Mathew J.; Di Veroli, Giovanni Y.; Fawell, Stephen; Stolovitzky, Gustavo; Guinney, Justin; Dry, Jonathan R.; Saez-Rodriguez, Julio (2019)
    The effectiveness of most cancer targeted therapies is short-lived. Tumors often develop resistance that might be overcome with drug combinations. However, the number of possible combinations is vast, necessitating data-driven ...
  • .

    .

    .

    Intent Understanding Using an Activation Spreading Architecture 

    Saffar, Mohammad T.; Nicolescu, Mircea; Nicolescu, Monica N.; Rekabdar, Banafsheh (Robotics, 2015)
    In this paper, we propose a new approach for recognizing intentions of humans by observing their activities with a color plus depth (RGB-D) camera. Activities and goals are modeled as a distributed network of inter-connected ...
  • .

    .

    .

    petal: Co-expression network modelling in R 

    Petereit, Juli; Smith, Sebastian; Harris, Frederick C. Jr.; Schlauch, Karen A. (BMC Systems Biology, 2016)
    Networks provide effective models to study complex biological systems, such as gene and protein interaction networks. With the advent of new sequencing technologies, many life scientists are grasping for user-friendly ...
  • .

    .

    .

    A Survey of Social Network Forensics 

    Karabiyik, Umit; Canbaz, Abdullah M.; Aksoy, Ahmet; Tuna, Tayfun; Akbas, Esra; Gonen, Bilal; Aygun, Ramazan S. (Journal of Digital Forensics, Security and Law, 2016)
    Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily ...
  • .

    .

    .

    Emotion Recognition Using Smart Watch Sensor Data: Mixed-Design Study 

    Quiroz, Juan C.; Geangu, Elena; Yong, Min H. (2018)
    Research in psychology has shown that the way a person walks reflects that person's current mood (or emotional state). Recent studies have used mobile phones to detect emotional states from movement data. Objective: The ...
  • .

    .

    .

    5G Wireless with Cognitive Radio and Massive IoT 

    Roy, Abhishek; Sengupta, Shamik; Wong, Kai-Kit; Raychoudhury, Vaskar; Govindan, Kannan; Singh, Sukhdeep (2017)
  • .

    .

    .

    VETO: An Immersive Virtual Environment for Tele-Operation 

    Wilson, Brandon; Bounds, Matthew; McFadden, David; Regenbrecht, Jace; Ohenhen, Loveth; Tavakkoli, Alireza; Loffredo, Donald (2018)
    This work investigates an over-arching question: how can an immersive virtual environment be connected with its intelligent physical counterpart to allow for a more efficient man-machine collaboration. To this end, an ...
  • .

    .

    .

    Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC 

    An, Xingshuo; Zhou, Xianwei; Lu, Xing; Lin, Fuhong; Yang, Lei (2018)
    Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...
  • .

    .

    .

    Recent Developments in Deep Learning for Engineering Applications 

    Voulodimos, Athanasios; Doulamis, Nikolaos; Bebis, George; Stathaki, Tania (2018)
    The aim of this Special Issue is to present new academic research advances and industrial developments of machine learning with emphasis on deep learning for engineering applications. We received twenty-four (24) submissions ...
  • .

    .

    .

    A novel approach for data integration and disease subtyping 

    Nguyen, Tin; Tagett, Rebecca; Diaz, Diana; Draghici, Sorin (2017)
    Advances in high-throughput technologies allow for measurements of many types of omics data, yet the meaningful integration of several different data types remains a significant challenge. Another important and difficult ...
  • .

    .

    .

    Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal 

    Singandhupe, Ashutosh; La, Hung M.; Feil-Seifer, David J. (2018)
    Unmanned aerial vehicles (UAVs) have been applied for both civilian and military applications scientific research involving UAVs has encompassed a wide range of scientific study. However, communication with unmanned vehicles ...
  • .

    .

    .

    Extended rapidly exploring random tree-based dynamic path planning and replanning for mobile robots 

    Connell, Devin; La, Hung M. (2018)
    It is necessary for a mobile robot or even a multi-robot team to be able to efficiently plan a path from its starting or current location to a desired goal location. This is a trivial task when the environment is static. ...
  • .

    .

    .

    ParkSense: Automatic Parking Positioning by Leveraging In-Vehicle Magnetic Field Variation 

    Nguyen, Phuc; Nguyen, Hieu; Nguyen, Dong; Dinh, Thang N.; La, Hung M.; Vu, Tam (2017)
    Drivers often park their vehicles without consciously (physically or mentally) noting down the parked location which makes it hard and inconvenient for the users to later locate their vehicles. Existing solutions either ...
  • .

    .

    .

    Ieee Access Special Section Editorial: Recent Advances in Socially-Aware Mobile Networking 

    Peng, Mugen; Yang, Lei; Zhang, Junshan; Chen, Tao; Celentano, Ulrico; Roning, Juha; Ermolova, Natalia Y.; Tirkkonen, Olav (2017)
    Mobile data traffic has been growing exponentially over the past few years. A report from Cisco shows that the mobile data traffic in 2014 grew 69 percent and was nearly 30 times the size of the entire global Internet ...

View more