- Interconnection Networks and Systems
- Distributed and Parallel Computing Systems
- Network Security and Intrusion Detection
- Parallel Computing and Optimization Techniques
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Topic Modeling
- VLSI and FPGA Design Techniques
- Opportunistic and Delay-Tolerant Networks
- Cloud Computing and Resource Management
- Indoor and Outdoor Localization Technologies
- Context-Aware Activity Recognition Systems
- Online Learning and Analytics
- Anomaly Detection Techniques and Applications
- Advanced Graph Theory Research
- Advanced Text Analysis Techniques
- Web Data Mining and Analysis
- Software System Performance and Reliability
- Algorithms and Data Compression
- Advanced Proteomics Techniques and Applications
- Matrix Theory and Algorithms
- Neural Networks and Applications
- Natural Language Processing Techniques
- Human Mobility and Location-Based Analysis
- Distributed systems and fault tolerance
Western Michigan University
2013-2024
Old Dominion University
2005-2023
Narsee Monjee Institute of Management Studies
2023
Dr. B. R. Ambedkar National Institute of Technology Jalandhar
2018-2023
Barts Health NHS Trust
2022
St Bartholomew's Hospital
2022
William Harvey Research Institute
2022
Queen Mary University of London
2022
Imperial College London
2013-2022
Royal London Hospital
2022
Subscribers to the popular news or blog feeds (RSS/Atom) often face problem of information overload as these feed sources usually deliver large number items periodically. One solution this could be clustering similar in reader make more manageable for a user. Clustering at end is challenging task only small part actual article received through feed. In paper, we propose method improving accuracy short texts by enriching their representation with additional features from Wikipedia. Empirical...
Future buildings will offer new convenience, comfort, and efficiency possibilities to their residents. Changes occur the way people live as technology involves people's lives information processing is fully integrated into daily living activities objects. The future expectation of smart includes making residents' experience easy comfortable possible. massive streaming data generated captured by building appliances devices contain valuable that needs be mined facilitate timely actions better...
Unlike signature or misuse based intrusion detection techniques, anomaly is capable of detecting novel attacks. However, the use in practice hampered by a high rate false alarms. Specification-based techniques have been shown to produce low alarms, but are not as effective attacks, especially when it comes network probing and denial-of-service This paper presents new approach that combines specification-based anomaly-based detection, mitigating weaknesses two approaches while magnifying...
Deep learning has been successfully applied in several fields such as machine translation, manufacturing, and pattern recognition. However, successful application of deep depends upon appropriately setting its parameters to achieve high-quality results. The number hidden layers the neurons each layer a network are two key parameters, which have main influence on performance algorithm. Manual parameter grid search approaches somewhat ease users' tasks these important parameters. Nonetheless,...
We propose lightweight methods to detect anomaly intrusions in wireless sensor networks (WSNs). The main idea is reuse the already available system information that generated at various layers of a network stack. To best our knowledge, this first such approach for intrusion detection WSNs.
A new approach to Buss's ${\textbf{NC}}^1 $ algorithm [Proc. 19th ACM Symposium on Theory of Computing, Association for Computing Machinery, New York, 1987, pp. 123–131] evaluation Boolean formulas is presented. This problem shown be complete over ${\textbf{AC}}^0 reductions. then used solve the more general evaluating arithmetic by using circuits.
We present a novel paradigm of opportunistic networks or oppnets in the context emergency preparedness and response (EPR). Oppnets constitute category ad hoc where diverse systems, not employed originally as nodes an oppnet, join it dynamically order to perform certain tasks they have been called participate in. After describing their operation, we discuss oppnet virtual machine (OVM) - standard implementation framework for applications. can significantly improve effectiveness efficiency EPR...
Text mining, though still a nascent industry, has been growing quickly along with the awareness of importance unstructured data in business analytics, customer retention and extension, social media, legal applications. There recent increase number commercial text mining product service offerings, but successful or wide-spread deployments are rare, mainly due to dependence on expertise skill practitioners. Accordingly, there is need for re-usable repositories mining. In this paper, we focus...
Knowing how many people occupy a building, and where they are located, is key component of smart building services. Commercial, industrial residential buildings often incorporate systems used to determine occupancy. However, relatively simple sensor technology control algorithms limit the effectiveness In this paper we propose replace with time series models that can predict number occupants at given location time. We use Wi-Fi datasets readily available in abundance for services train Auto...
ABSTRACT Heavy equipment overhaul facilities such as aircraft service centers and railroad yards face the challenge of minimizing makespan for a set preventive maintenance (PM) tasks, requiring single or multiple skills, within workforce availability constraints. In this paper, we examine utility evolution strategies to problem. Comparison computational efforts with exhaustive enumeration reach optimal solutions 60 small problems illustrates ability yield increasingly efficiently increasing...
Computed Tomography Perfusion (CTP) imaging is a cost-effective and fast approach to provide diagnostic images for acute stroke treatment. Its cine scanning mode allows the visualization of anatomic brain structures blood flow; however, it requires contrast agent injection continuous CT over an extended time. In fact, accumulative radiation dose patients will increase health risks such as skin irritation, hair loss, cataract formation, even cancer. Solutions reducing exposure include tube...
Growing competition has made today's banks understand the value of knowing their customers better. In this paper, we describe a tool, LIPTUS, that associates customer interactions (emails and transcribed phone calls) with account profiles stored in an existing data warehouse. The associations discovered by LIPTUS enable analytics spanning on one hand meta-data associated or derived from interaction (using text mining techniques) other. We illustrate consolidated analysis through specific...
Studies related to public transportation systems help the commuting by increasing road safety and circulation. These result in optimized traffic flow, shorter origin-destination travel time reduced incident rate. Vehicular Ad-Hoc Network uses a number of sensors gather data on road. Intelligent Transportation Systems (ITS) draw inference from gathered data. In this paper we discuss our experience using Auto Regressive Integrated Moving Average (ARIMA) based techniques emphasizing integration...
The integration of latent heat storage solutions into modern heating and cooling systems has the potential to enhance overall system performance compared standard hot water (radiators tanks) due an augmentation stored by a suitable material. This paper presents computational predictions complemented experimental measurements dynamic behavior active thermal for domestic applications, based on use hydrated salt phase change material (PCM) conventional cylindrical tank. (heating) extraction...
Wearable sensors have become increasingly accurate in measuring various aspects of health monitoring humans. Individuals living with dementia often experience problematic agitated behaviors. There are many proven methods to intervene during behavior outbursts, and the earlier these used better results. We using off-the-shelf technology, smart watches phones, monitor location individuals facility measure physical physiological changes such as limb movements, vocalizations, heart rate that...