Mason Archival Repository Service

Browsing Volgenau School of Engineering by Title

Browsing Volgenau School of Engineering by Title

Sort by: Order: Results:

  • Hudson, Linwood D.; Ware, Bryan S.; Laskey, Kathryn B.; Mahoney, Suzanne M. (2005-11-18)
    Recent events underscore the need for effective tools for managing the risks posed by terrorists. Assessing the threat of terrorist attack requires combining information from multiple disparate sources, most of ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi (2006-07-30)
    Ontologies have become ubiquitous in current-generation information systems. An ontology is an explicit, formal representation of the entities and relationships that can exist in a domain of application. Following a ...
  • Costa, Paulo C. G. (George Mason University, 2005-07-12)
    Uncertainty is ubiquitous. Any representation scheme intended to model real-world actions and processes must be able to cope with the effects of uncertain phenomena. A major shortcoming of existing Semantic Web technologies ...
  • Laskey, Kathryn B. (North-Holland, 1989)
    In the canonical examples underlying Shafer-Dempster theory, beliefs over the hypotheses of interest are derived from a probability model for a set of auxiliary hypotheses. A belief function differs from a Bayesian probability ...
  • Mahapasuthanon, Pattiya; Hoffman, Kimberly (Mason Graduate Interdisciplinary Conference, 2019-04-06)
    Bibliometric methods, using citations as data, are an alternate way to learn from the literature of science and technology. These statistical methods are used, with visualization tools, to determine the relationship between ...
  • Bush, Joshua (2020)
    The brain remains the key to our experiential reality. From sensory perception to an internal expanse the brain remains the hardware and processing unit. The age in which we can precisely alter the hardware with which we ...
  • Lee, Hojun; Zeigler, Bernard (2009-10-05)
    This paper explores the Information Exchange Framework (IEF) concept of distributed data fusion sensor networks in Network-centric environment. It is used to build up integrative battlefield pictures through the Battle ...
  • Hassan, Rakibul (2019)
    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for ...
  • Mirzaeian, Ali (2021)
    The applications of machine learning algorithms are innumerable and cover nearly every domain of modern technology. During this rapid growth of this area, more and more companies have expressed a desire to utilize machine ...
  • Hachem, Stephanie (Teknos, 2020)
    Proprioception, the internal sense of where your body parts are relative to each other, is essential for many, particularly bimanual, daily activities. Unfortunately, because modern prosthetics lacks this sense it is often ...
  • Mirzaeian, Ali; Manoj P D, Sai; Vakil, Ashkan; Homayoun, Houman; Sasan, Avesta (2021)
    Deep convolutional neural networks have shown high efficiency in computer visions and other applications. However, with the increase in the depth of the networks, the computational complexity is growing exponentially. In ...
  • Wright, Edward J.; Laskey, Kathryn B. (2006-07)
    This paper presents a technical approach for fusing information from diverse sources. Fusion requires appropriate weighting of information based on the quality of the source of the information. A credibility model ...
  • Gunderson, C.R.; Raytheon, David Minton (2008)
    Coalition Warrior Interoperability Demonstration 2008 (CWID 08), Interoperability Trial (IT) #5.64 “Trusted Enterprise Service Bus” (T-ESB) demonstrates a potentially quantum improvement in the government procurement model ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wang, Xun; Barbará, Daniel; Shackelford, Thomas; Wright, Edward J.; Fitzgerald, Julie (2006-03-06)
    This paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of ...
  • Zhang, Jeremy (2021)
    A child’s education during adolescence is essential for mental and confidence development. As one is exposed to a constantly changing learning environment, unaccounted factors are extremely detrimental. One such factor is ...
  • Mirzaeian, Ali; Kosecka, Jana; Homayoun, Houman; Mohsenin, Tinoosh; Sasan, Avesta (2021)
    This paper proposes an ensemble learning model that is resistant to adversarial attacks. To build resilience, we introduced a training process where each member learns a radically distinct latent space. Member models are ...
  • Vargas, Merlyn (2020-05)
    DNA nanotechnology has great potential as a platform to enhance neural engineering approaches. DNA based nanoparticles are biocompatible and easy to functionalize [1]. Peptides or proteins can be conjugated to DNA nanoparticles ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi; Barbará, Daniel; Shackelford, Thomas; Mirza, Sepideh; Revankar, Mehul (MITRE Corporation, 2005-05)
    This paper describes the Detection of Threat Behavior (DTB) project, a joint effort being conducted by George Mason University (GMU) and Information Extraction and Transport, Inc. (IET). DTB uses novel approaches for ...
  • Dunn, Bryce (2021)
    Brain-computer interface (BCI) paradigms have existed for decades to improve communication and technological control. Electroencephalography (EEG) represents one of the most common non-invasive approaches toward recording ...
  • Kamath, Uday; De Jong, Kenneth; Shehu, Amarda (Public Library of Science, 2014-07-17)
    Background Many open problems in bioinformatics involve elucidating underlying functional signals in biological sequences. DNA sequences, in particular, are characterized by rich architectures in which functional signals ...

Search MARS


Browse

My Account