- Advanced Steganography and Watermarking Techniques
- Medical Image Segmentation Techniques
- Digital Media Forensic Detection
- Image Retrieval and Classification Techniques
- Neural Networks and Applications
- Digital Games and Media
- Neurotransmitter Receptor Influence on Behavior
- Early Modern Spanish Literature
- Image and Signal Denoising Methods
- Chaos-based Image/Signal Encryption
- Lexicography and Language Studies
- Renaissance and Early Modern Studies
- Image and Object Detection Techniques
- Libraries, Manuscripts, and Books
- Digital Humanities and Scholarship
- Digital Image Processing Techniques
- Shakespeare, Adaptation, and Literary Criticism
- Cinema and Media Studies
- Generative Adversarial Networks and Image Synthesis
- American and British Literature Analysis
- Web and Library Services
- Neuroscience and Neuropharmacology Research
- Technology Use by Older Adults
- Historical Linguistics and Language Studies
- Open Source Software Innovations
Iowa State University
2002-2024
Children's Hospital Colorado
2019-2024
University of Colorado Denver
2019-2024
University of Technology Sydney
2020
Takeda (United States)
2018
Moraine Valley Community College
2018
Heinz Optical Engineering (United States)
2015
Oregon State University
2010-2014
Tufts University
2011-2014
Australian Catholic University
2014
Researchers often use participatory design -- involving endusers in technology ideation as this is found to lead more useful and relevant products. have sought involve older adults the of emerging technologies like smartphones, with which little experience. Therefore, their effectiveness co-designers could be questioned. We examine whether can create novel ideas, critiquing existing applications prior helps or hinders creativity. Panelists from industry academia evaluated ideas generated by...
In a companion paper by A.A. Fouad et al. the concept of system vulnerability is introduced as new framework for power dynamic security assessment. Using transient energy function (TEF) method stability analysis, margin /spl Delta/V used an indicator level security, and its sensitivity to changing parameter p (/spl delta//spl Delta/V//spl delta/p) trend with conditions. These two indicators are combined determine degree contingent disturbances in stability-limited system. Thresholds...
High-speed tomographic imaging of hostile engineering processes using absorptionbased measurements presents a number difficulties.In some cases, these challenges include severe limitations on the available measurement paths through subject, and process designing geometrical arrangement those for best performance.This paper considers case chemical species tomography system based near-IR spectroscopic absorption measurements, intended application to one cylinder multicylinder production...
The theory of classical artificial neural networks has been used to solve pattern recognition problems in image processing that is different from traditional approaches. In standard network theory, the first step performing a calculation involves linear operation multiplying values by their synaptic strengths and adding results. Thresholding usually follows order provide for non-linearity network. This paper presents fundamental morphological which, instead multiplication summation, uses...
Concurrent cigarette smoking and cocaine use is well documented. However, the behavioral pharmacology of nicotine combinations poorly understood, there a need for animal models to examine this form polydrug abuse. The purpose study was twofold: first assess effects on discriminative stimulus cocaine, second, self-administration nicotine/cocaine in novel abuse model. In drug discrimination experiments, increased low doses two three monkeys, but did not substitute any monkey....
Older adults are increasingly savvy consumers of smartphone-based health solutions and information. These technologies may enable older to age-in-place more successfully. However, many app creators fail do needs assessments their end-users. To rectify this issue, we involved (aged 65+) in the beginning stages designing a mobile wellness application. We conducted participatory design study, where 5 groups created designs. Four identified at least 1 metric not currently offered either iPhone...
Despite oxycodone's (4,5-epoxy-14-hydroxy-3-methoxy-17-methylmorphinan-6-one) history of clinical use and the attention it has received as a drug abuse, few reports have documented its pharmacology's relevance to abuse or mechanism action. The purposes present study were further characterize analgesic effects oxycodone, action, in terms liability. results indicate that oxycodone had potent antinociceptive mouse paraphenylquinone writhing, hot-plate, tail-flick assays, which appeared be...
Steganography is the study of data hiding for purpose covert communication. A secret message inserted into a <i>cover file</i> so that very existence not apparent. Most current steganography algorithms insert in spatial or transform domains; common transforms include discrete cosine transform, Fourier and wavelet transform. In this paper, we present data-hiding algorithm exploits decomposition representation instead frequency-based transformation data. The used <i>singular value...
Modafinil is a central nervous system stimulant used to promote wakefulness, and it being evaluated clinically as an agonist-based medication treat abuse.This the first report of effects modafinil on abuse-related cocaine in nonhuman primates.Three studies were conducted examine behavioral modafinil.In study, discriminative stimulus monkeys trained discriminate either low (0.18 mg/kg, IM) or high (0.4 doses from saline.Modafinil dosedependently substituted for 6/7 monkeys.In second...
Free/Open Source Software (FOSS) communities often use open bug reporting to allow users participate by bugs. This practice can lead more duplicate reports, as be less rigorous about researching existing reports. paper examines how FOSS projects deal with We examined 12 projects: 4 small, medium and large, where size was determined number of code contributors. First, we found that contrary what has been reported from studies individual large like Mozilla Eclipse, reports are a problem for...
Steganalysis is used to detect hidden content in innocuous images. Many successful steganalysis algorithms use a large number of features relative the size training set and suffer from "curse dimensionality": feature values data size. High dimensionality space can reduce classification accuracy, obscure important for classification, increase computational complexity. This paper presents filter-type selection algorithm that selects reduced sets using Mahalanobis distance measure, develops...
Chronic Fatigue Syndrome (CFS) is a neuroimmunoendocrine disease affecting about 1% of the US population, mostly women. It characterized by debilitating fatigue for six or more months in absence cancer other systemic diseases. Many CFS patients also have fibromyalgia and skin hypersensitivity that worsen with stress. Corticotropin-releasing hormone (CRH) neurotensin (NT), secreted under stress, activate mast cells (MC) necessary allergic reactions to release inflammatory mediators could...
The global population is aging rapidly, and older adults are becoming increasingly technically savvy. This paper explores ways to engage these individuals contribute free/open source software (FOSS) projects. We conducted a pilot diary study explore motivations, barriers, the contribution processes of first-time contributors in real time, qualitative manner. In addition, we measured their self-efficacy before after participation. found that what drove participants were intrinsic altruism,...