Projects

The HIPAA privacy and security regulation, the never ending series of operating system updates, the threat of intrusions and viruses from the outside as well as inside, and the requirement for remote access by service providers require a robust security framework for the PACS systems. The problems with the current deployments are: few guidelines to establish this framework, lack of tools, and the tools that are available are not well documented and/or adapted to this specific domain.

Maintaining motivation to meet physical exercise goals is a big challenge in virtual/home-based exercise guidance systems. The project aims to develop a virtual trainer capable of providing efficient feedback and motivation using reinforcement learning.  

Research areas: Pose estimation, Distributed machine learning, and Human Intervention.

In a computer network, network security is accomplished using elements like firewalls, hosts, servers, routers, intrusion detection systems, and honey pots. These network elements need to know the nature or anomaly of the worm in priori to detect the attack. Modern day viruses like Code red, Sapphire and Nimda spread very fast. Therefore it is impractical if not impossible for human mediated responses to these modern day fast spreading viruses. Several epidemic studies show that automatic tracking of resource usage and control is an effective method in containing the damage.

Voice over IP (VoIP) technology has been aggressively deployed for the last one year in several enterprises and it is estimated that by 2006, the deployment of IP phones is going to exceed the PSTN phones. This high level of interest is based on reduced long distance cost and ease of management. But, there are substantial issues in the Quality of Service (QoS) and security of the IP telephony. IP phone threat levels, user behavior and experiences are different from data-specific applications like email.

The Automatic Skills Extraction process is a tool being developed to connect employers in industry to students graduating from university. In order to understand what employers are looking for, we can analyze employer’s career pages and job postings. Those mediums are primary sources for identifying the required skills and knowledge that students need in order to work in those roles. From the scraping of website data, to keyword identification, and clustering and classification of skills -- this tool attempts to bridge the gap between potential employee and employer.

Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based networks. The problem of spam in VoIP networks has to be solved in real time compared to e-mail systems. Many of the techniques devised for e-mail spam detection rely upon content analysis and in the case of VoIP it is too late to analyze the media after picking up the receiver. So we need to stop the spam calls before the telephone rings.

Vehicle manufacturers are adding advanced driver assistance systems (ADAS), such as lane departure warnings, to many of their vehicles. However, vehicles with these newer systems are more expensive, and older vehicles cannot take advantage of these systems. 

We have developed smartphone applications that can be used to monitor driver behavior in any car. 

The Internet is growing on a daily basis and just like any other transport network, any body can use it. But on a daily basis more and more people are annoyed by unwanted emails known as Spam. In general, spammers can use email address on ones web site could send junk mail forever. For years people have been researching the way spam is produced. Different methods have come about to do away with unwanted emails, but to this day we have not found anything that has a long-term effect.

Data Cooperatives are newly established institutions created to address various issues in the current data landscape by empowering individuals to control, receive compensation, and create insights with their data. This project develops an ideal revenue scheme that adequately addresses the novel characteristics of data products as they function within cooperative organizations.

Indoor localization, or identifying where one is within a building, is a significant challenge. Global Positioning System (GPS) signals usually do not work inside buildings. Not all buildings have Wi-Fi access points, and adding enough access points to be usable for indoor localization is expensive. 

We have developed smartphone applications that can detect changes in magnetic fields caused by doors, walls, and other things inside buildings. The smartphone applications can then use these changes to determine a person's location within a building. 

Pages