Skip to main content
In this paper we introduce a new methodology that integrates system resilience engineering and hazard analysis into complex system design. We then demonstrate its performance by applying it to the design of a Prognosis and Health... more
    • by 
    •   18  
      ResilienceSystem DesignRisk AnalysisComplex System
Various implementations of wireless sensor networks (i.e. personal area-, wireless body area-networks) are prone to node and network failures by such characteristics as limited node energy resources and hardware damage incurred from their... more
    • by 
    •   2  
      Computer ScienceWireless Sensor Network
This paper describes a pattern for the architecture of web-based wireless sensor network monitoring. Sensor nodes are used to measure characteristics of the physical environment and sensed data is stored on the Internet using web-based... more
    • by 
    •   8  
      Computer ScienceWireless Sensor NetworksRemote MonitoringCommunications
We describe a wireless link management framework for an ocean platform-to-shore communication system that uses time series forecasting to predict the available link capacity using ocean platform sensor data metrics to boost link... more
    • by 
    •   2  
      EngineeringComputer Science
This paper presents a REST-compliant service oriented architecture of a web-based heterogeneous wireless sensor network monitoring system that has applicability in remote patient monitoring in healthcare. As smartphone and webpage... more
    • by 
    •   7  
      Computer ScienceService Oriented ArchitecturePatient MonitoringData Collection
This paper details the architecture and describes the preliminary experimentation with the proposed framework for anomaly detection in medical wireless body area networks for ubiquitous patient and healthcare monitoring. The architecture... more
    • by 
    •   4  
      Computer ScienceTechnologyAnomaly DetectionSupport vector machine
Wireless Sensor Networks are vulnerable to a plethora of different fault types and external attacks after their deployment. We focus on sensor networks used in healthcare applications for vital sign collection from remotely monitored... more
    • by 
    •   11  
      Computer ScienceWireless Sensor NetworksAnomaly DetectionDecision Trees
The System Hazard Indication and Extraction Learning Diagnosis (SHIELD) methodology was developed as a novel method to perform system hazard analysis and resilient design. In an earlier paper we described SHIELD conceptually and outlined... more
    • by 
    •   2  
      EngineeringComputer Science
Addressed in this paper is an information-theoretics inspired entropy co-occurrence approach to extract subset features denoting relative extents of gene expression levels in a DNA microarray data. Experimentally deduced microarray data... more
    • by  and +1
    •   3  
      BioinformaticsImage ProcessingComputational Biology
To ascertain specific features in bio-/medical-images, a new avenue of using the so-called Needleman-Wunsch (NW) and Smith-Waterman (SW) algorithms (of bioinformatics) is indicated. In general, NW/SW algorithms are adopted in genomic... more
    • by 
Time-evolution and hence, forecasting the growth profiles of business-centric technoeconomics are ascertained. As an example, the vast telecommunication (telco)-specific business is considered as a complex enterprise depicting a... more
    • by 
    •   2  
      Time SeriesTelecommunication Services
Objective: The present study is concerned with the need that exists in bioinformatics to identify and delineate overlapping codon and noncodon structures in a deoxyribonucleic acid (DNA) complex so as to ascertain the boundary of... more
    • by 
    •   10  
      EngineeringAlgorithmsArtificial IntelligenceFuzzy Logic
In neural networks the activation process controls the output as a nonlinear function of the input; and, this output remains bounded between limits as decided by a logistic function known as the sigmoid (S-shaped). Presently, by applying... more
    • by 
    •   10  
      Cognitive ScienceMathematicsStatistical MechanicsProcess Control
A closed form formulation to calculate the quasistatic magnetic field above the earth's surface induced by an underground, three-phase high-voltage power-line is derived. Computed results are compared with measured data.
    • by 
    •   3  
      Electromagnetic FieldMathematical FormulaElectrical And Electronic Engineering
    • by 
    •   13  
      Low FrequencyMagnetic fieldMessage Oriented MiddlewareMagnetic Shielding
This article describes a passive, economical strategy towards enhancing the security feature of conventional plastic cards by embedding a set of electromagnetic (EM) material that emulates an invisible "watermarking". This is an overlay... more
    • by 
    •   2  
      EngineeringPhysical sciences
An "active" method of controlling acoustical beamforming with a linear array of electrodes configured on a composite piezoelectric rubber sheet is demonstrated. The active control is achieved by applying a dc bias on the electrode... more
    • by 
    • Multidisciplinary
This paper addresses a study on simulated space radiation effects on charge-coupled devices (CCD). An implicit method of assessing the performance degradation and field reliability of CCDs operated in natural ionizing-radiation ambients... more
    • by 
    •   2  
      Ionizing RadiationElectrical And Electronic Engineering
Information-theoretic notion of entropy (in Shannon sense) is a versatile avenue in analyzing bioinformatic details as well as in mining data pertinent to molecular biology. Also, the informatics of bio-and medical-imaging can be... more
    • by 
    •   12  
      BioinformaticsMicrobiologyData MiningMolecular Biology
Review Focus: General considerations on ablation procedure advocated in clinical contexts using electromagnetic (EM) energy are comprehensively reviewed. Relevant radiofrequency (RF) and/or microwave ablation techniques that have been in... more
    • by