Now showing items 1-20 of 26

  • .

    .

    .

    Cognitive Radio Enabled Wireless Sensor Networks and Survivability Challenges 

    Sengupta, Shamik; Saad, Walid; Roy, Abhishek (1/1/2015)
    The rapid growth in computation, smart networking, spectrum agile devices, and hardware miniaturization technologies has led to a major revolution in the wireless sensor networking landscape in recent times. In particular, ...
  • .

    .

    .

    A Novel Cpu/Gpu Simulation Environment for Large-Scale Biologically Realistic Neural Modeling 

    Hoang, Roger V.; Tanna, Devyani; Bray, Jayet L. C.; Dascalu, Sergiu M.; Harris, Frederick C. Jr. (2013)
    Computational Neuroscience is an emerging field that provides unique opportunities to study complex brain structures through realistic neural simulations. However, as biological details are added to models, the execution ...
  • .

    .

    .

    Intent Understanding Using an Activation Spreading Architecture 

    Saffar, Mohammad T.; Nicolescu, Mircea; Nicolescu, Monica N.; Rekabdar, Banafsheh (Robotics, 2015)
    In this paper, we propose a new approach for recognizing intentions of humans by observing their activities with a color plus depth (RGB-D) camera. Activities and goals are modeled as a distributed network of inter-connected ...
  • .

    .

    .

    Atypical Asymmetry for Processing Human and Robot Faces in Autism Revealed by fNIRS 

    Jung, Corinne E.; Strother, Lars; Feil-Seifer, David J.; Hutsler, Jeffrey J. (2016)
    Deficits in the visual processing of faces in autism spectrum disorder (ASD) individuals may be due to atypical brain organization and function. Studies assessing asymmetric brain function in ASD individuals have suggested ...
  • .

    .

    .

    A Survey of Social Network Forensics 

    Karabiyik, Umit; Canbaz, Abdullah M.; Aksoy, Ahmet; Tuna, Tayfun; Akbas, Esra; Gonen, Bilal; Aygun, Ramazan S. (Journal of Digital Forensics, Security and Law, 2016)
    Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily ...
  • .

    .

    .

    petal: Co-expression network modelling in R 

    Petereit, Juli; Smith, Sebastian; Harris, Frederick C. Jr.; Schlauch, Karen A. (BMC Systems Biology, 2016)
    Networks provide effective models to study complex biological systems, such as gene and protein interaction networks. With the advent of new sequencing technologies, many life scientists are grasping for user-friendly ...
  • .

    .

    .

    ParkSense: Automatic Parking Positioning by Leveraging In-Vehicle Magnetic Field Variation 

    Nguyen, Phuc; Nguyen, Hieu; Nguyen, Dong; Dinh, Thang N.; La, Hung M.; Vu, Tam (2017)
    Drivers often park their vehicles without consciously (physically or mentally) noting down the parked location which makes it hard and inconvenient for the users to later locate their vehicles. Existing solutions either ...
  • .

    .

    .

    Ieee Access Special Section Editorial: Recent Advances in Socially-Aware Mobile Networking 

    Peng, Mugen; Yang, Lei; Zhang, Junshan; Chen, Tao; Celentano, Ulrico; Roning, Juha; Ermolova, Natalia Y.; Tirkkonen, Olav (2017)
    Mobile data traffic has been growing exponentially over the past few years. A report from Cisco shows that the mobile data traffic in 2014 grew 69 percent and was nearly 30 times the size of the entire global Internet ...
  • .

    .

    .

    5G Wireless with Cognitive Radio and Massive IoT 

    Roy, Abhishek; Sengupta, Shamik; Wong, Kai-Kit; Raychoudhury, Vaskar; Govindan, Kannan; Singh, Sukhdeep (2017)
  • .

    .

    .

    A novel approach for data integration and disease subtyping 

    Nguyen, Tin; Tagett, Rebecca; Diaz, Diana; Draghici, Sorin (2017)
    Advances in high-throughput technologies allow for measurements of many types of omics data, yet the meaningful integration of several different data types remains a significant challenge. Another important and difficult ...
  • .

    .

    .

    Understanding Agency in Interactions Between Children With Autism and Socially Assistive Robots 

    Short, Elaine S.; Deng, Eric C.; Feil-Seifer, David J.; Mataric, Maja J. (2017)
    Socially assistive robotics (SAR) has increasingly been shown to have potential as a tool for social skills therapy for children with autism, a developmental disorder associated with atypical social development. This work ...
  • .

    .

    .

    Editorial Introduction Are You Reviewer 2: Three Ideas for Better Reviewing 

    Feil-Seifer, David J. (2017)
    I have been given the honor and privilege to write the editorial introduction for this final issue of the Journal of Human-Robot Interaction, before its reemergence as the ACM Transactions on Human-Robot Interaction. It ...
  • .

    .

    .

    VETO: An Immersive Virtual Environment for Tele-Operation 

    Wilson, Brandon; Bounds, Matthew; McFadden, David; Regenbrecht, Jace; Ohenhen, Loveth; Tavakkoli, Alireza; Loffredo, Donald (2018)
    This work investigates an over-arching question: how can an immersive virtual environment be connected with its intelligent physical counterpart to allow for a more efficient man-machine collaboration. To this end, an ...
  • .

    .

    .

    Software Tools to Facilitate Systematic Review Used for Cancer Hazard Identification 

    Shapiro, Andrew J.; Antoni, Sebastien; Guyton, Kathryn Z.; Lunn, Ruth M.; Loomis, Dana; Rusyn, Ivan; Jahnke, Gloria D.; Schwingl, Pamela J.; Mehta, Suril S.; Addington, Josh; Guha, Neela (2018)
    Objective and systematic methods to search, review, and synthesize published studies are a fundamental aspect of carcinogen hazard classification. Systematic review is a historical strength of the International Agency for ...
  • .

    .

    .

    Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC 

    An, Xingshuo; Zhou, Xianwei; Lu, Xing; Lin, Fuhong; Yang, Lei (2018)
    Fog computing, as a new paradigm, has many characteristics that are different from cloud computing. Due to the resources being limited, fog nodes/MEC hosts are vulnerable to cyberattacks. Lightweight intrusion detection ...
  • .

    .

    .

    Recent Developments in Deep Learning for Engineering Applications 

    Voulodimos, Athanasios; Doulamis, Nikolaos; Bebis, George; Stathaki, Tania (2018)
    The aim of this Special Issue is to present new academic research advances and industrial developments of machine learning with emphasis on deep learning for engineering applications. We received twenty-four (24) submissions ...
  • .

    .

    .

    Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal 

    Singandhupe, Ashutosh; La, Hung M.; Feil-Seifer, David J. (2018)
    Unmanned aerial vehicles (UAVs) have been applied for both civilian and military applications scientific research involving UAVs has encompassed a wide range of scientific study. However, communication with unmanned vehicles ...
  • .

    .

    .

    Extended rapidly exploring random tree-based dynamic path planning and replanning for mobile robots 

    Connell, Devin; La, Hung M. (2018)
    It is necessary for a mobile robot or even a multi-robot team to be able to efficiently plan a path from its starting or current location to a desired goal location. This is a trivial task when the environment is static. ...
  • .

    .

    .

    Emotion Recognition Using Smart Watch Sensor Data: Mixed-Design Study 

    Quiroz, Juan C.; Geangu, Elena; Yong, Min H. (2018)
    Research in psychology has shown that the way a person walks reflects that person's current mood (or emotional state). Recent studies have used mobile phones to detect emotional states from movement data. Objective: The ...
  • .

    .

    .

    A Multi-Cohort and Multi-Omics Meta-Analysis Framework to Identify Network-Based Gene Signatures 

    Shafi, Adib; Nguyen, Tin; Peyvandipour, Azam; Nguyen, Hung; Draghici, Sorin (2019)
    Although massive amounts of condition-specific molecular profiles are being accumulated in public repositories every day, meaningful interpretation of these data remains a major challenge. In an effort to identify the ...