Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Enhancing Informative Frame Filtering By Water And Bubble Detection In Colonoscopy Videos, Ashok Dahal, Junghwan Oh, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen Jun 2017

Enhancing Informative Frame Filtering By Water And Bubble Detection In Colonoscopy Videos, Ashok Dahal, Junghwan Oh, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen

Johnny Wong

Colonoscopy has contributed to a marked decline in the number of colorectal cancer related deaths. However, recent data suggest that there is a significant (4-12%) miss-rate for the detection of even large polyps and cancers. To address this, we have been investigating an ‘automated feedback system’ which informs the endoscopist of possible sub-optimal inspection during colonoscopy. A fundamental step of this system is to distinguish non-informative frames from informative ones. Existing methods for this cannot classify water/bubble frames as non-informative even though they do not carry any useful visual information of the colon mucosa. In this paper, we propose a …


Quo Vadis-A Framework For Intelligent Routing In Large Communication Networks., Armin Mikler, Johnny S. Wong, Vasant Honavar Jun 2017

Quo Vadis-A Framework For Intelligent Routing In Large Communication Networks., Armin Mikler, Johnny S. Wong, Vasant Honavar

Johnny Wong

This paper presents Quo Vadis, an evolving framework for intelligent traffic management in very large communication networks. Quo Vadis is designed to exploit topological properties of large networks as well as their spatio-temporal dynamics to optimize multiple performance criteria through cooperation among nodes in the network. It employs a distributed representation of network state information using local load measurements supplemented by a less precise global summary. Routing decisions in Quo Vadis are based on parameterized heuristics designed to optimize various performance metrics in an anticipatory or pro-active as well as compensatory or reactive mode and to minimize the overhead associated …


An Object Oriented Approach To Modeling And Simulation Of Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar Jun 2017

An Object Oriented Approach To Modeling And Simulation Of Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar

Johnny Wong

The complexity (number of entities, interactions between entities, and resulting emergent dynamic behavior) of large communication environments which contain hundreds of nodes and links make simulation an important tool for the study of such systems. Given the difficulties associated with complete analytical treatment of complex dynamical systems, it is often the only practical tool that is available. This paper presents an example of a flexible, modular, object-oriented toolbox designed to support modeling and experimental analysis of a large family of heuristic knowledge representation and decision functions for adaptive self-managing communication networks with particular emphasis on routing strategies. It discusses in …


Feature Selection In Intrusion Detection System Over Mobile Ad-Hoc Network, Xia Wang, Tu-Liang Lin, Johnny S. Wong Jun 2017

Feature Selection In Intrusion Detection System Over Mobile Ad-Hoc Network, Xia Wang, Tu-Liang Lin, Johnny S. Wong

Johnny Wong

As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people�s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitoring intrusion detection method. Further analysis shows that the features collected by each node are too many for wireless devices with limited capacity. We apply Markov Blanket algorithm [1] to the feature selection of the intrusion detection method. Experimental studies have shown that Markov Blanket algorithm can …


Quo Vadis - Adaptive Heuristics For Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar Jun 2017

Quo Vadis - Adaptive Heuristics For Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar

Johnny Wong

This paper presents Quo Vadis, an evolving framework for intelligent traffic management in very large communication networks. Quo Vadis is designed to exploit topological properties of large networks as well as their spatio-temporal dynamics to optimize multiple performance criteria through cooperation among nodes in the network. It employs a distributed representation of network state information using local load measurements supplemented by a less precise global summary. Routing decisions in Quo Vadis are based on parameterized heuristics designed to optimize various performance metrics in an anticipatory or pro-active as well as compensatory or reactive mode and to minimize the overhead associated …


Tree-Based Algorithm To Find The K-Th Value In Distributed Systems, Yoonsik Cheon, Johnny S. Wong Jun 2017

Tree-Based Algorithm To Find The K-Th Value In Distributed Systems, Yoonsik Cheon, Johnny S. Wong

Johnny Wong

In this paper, we study distributed algorithms for finding the k-th value in the decentralized systems. First we consider the case of circular configuration of processors where no processor knows the total number of participants. Later a network of arbitrary configuration is examined and a tree-based algorithm is proposed. The proposed algorithm requires O(N) messages and O(log N) rounds of message passing, where N is the number of nodes in the network.


The Methodology For Evaluating Response Cost For Intrusion Response Systems, Christopher Roy Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong Jun 2017

The Methodology For Evaluating Response Cost For Intrusion Response Systems, Christopher Roy Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong

Johnny Wong

Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to the detected attack was selected and deployed manually, in the recent years the focus has shifted towards developing automated and semi-automated methodologies for responding to intrusions. In this context, the cost-sensitive intrusion response models have gained the most interest mainly due to their emphasis on the balance between potential damage incurred by the intrusion and cost of the response. However, one of the challenges in applying this approach is defining consistent and adaptable measurement of these cost factors on the …


A Taxonomy Of Intrusion Response Systems, Natalia Stakhanova, Samik Basu, Johnny S. Wong Jun 2017

A Taxonomy Of Intrusion Response Systems, Natalia Stakhanova, Samik Basu, Johnny S. Wong

Johnny Wong

Recent advances in intrusion detection field brought new requirements to intrusion prevention and response. Traditionally, the response to an attack was manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years showed acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively developed, research efforts in intrusion response are still isolated. In this work we present taxonomy of intrusion response systems, together with a review of current trends in intrusion response research. We also provide a set of essential fetures as a requirement for an ideal intrusion response system.


Design And Implementation Of A Media Uploading System, Mu Zhang, Johnny S. Wong, Wallapak Tavanapong Jun 2017

Design And Implementation Of A Media Uploading System, Mu Zhang, Johnny S. Wong, Wallapak Tavanapong

Johnny Wong

This paper presents the design and performance analysis of an uploading system that automatically uploads multimedia files to a centralized server given client hard deadlines. If not uploaded by the deadlines, existing files may be lost or new files cannot be recorded. The uploading systems with hard deadlines have several important applications in practice. For instance, such systems can be used in hospitals to gather videos generated from medical devices from various operating rooms for post-procedure analysis and in law enforcement to collect video recordings from police cars during routine patrolling. In this paper, we study the uploading system with …


Cable Footprint History: Spatio-Temporal Technique For Instrument Detection In Gastrointestinal Endoscopic Procedures, Chuanhai Zhang, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen, Junghwan Oh Jun 2017

Cable Footprint History: Spatio-Temporal Technique For Instrument Detection In Gastrointestinal Endoscopic Procedures, Chuanhai Zhang, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen, Junghwan Oh

Johnny Wong

We propose a new fast spatio-temporal technique that detects an operation scene---a video segment corresponding to a single purpose diagnosis action or a single purpose therapeutic action. The technique utilizes (1) color contrast of the cable region and the background, (2) the new area-based coordinate system to compute spatial features, and (3) the history of locations of detected cables of the instrument in a video to discard false regions. The proposed technique and software are useful for (1) automatic documentation of diagnostic or therapeutic operations at the end of the procedure, (2) a second review for causes of complications due …


Specification Synthesis For Monitoring And Analysis Of Manet Protocols, Natalia Stakhanova, Samik Basu, Zhang Wensheng, Xia Wang, Johnny S. Wong Jun 2017

Specification Synthesis For Monitoring And Analysis Of Manet Protocols, Natalia Stakhanova, Samik Basu, Zhang Wensheng, Xia Wang, Johnny S. Wong

Johnny Wong

This paper introduces an approach to automatic synthesis of the specification models of rout- ing protocol behavior from the observed flow of the network traffic. In particular, our technique generalizes the monitored sequences of routing messages constructing a high-level abstract view of the protocol. The basis of our method is similar to Inductive Logic Programming technique that derives a sound hypothesis from the individual examples. We conduct preliminary experi- ments on the example of AODV and DSR ad-hoc routing protocols and discuss the effectiveness of the generated specification models in detecting protocol misuses.


Utility-Theoretic Heuristics For Intelligent Adaptive Routing In Large Communcation Networks, Armin Mikler, Vasant Honavar, Johnny S. Wong Jun 2017

Utility-Theoretic Heuristics For Intelligent Adaptive Routing In Large Communcation Networks, Armin Mikler, Vasant Honavar, Johnny S. Wong

Johnny Wong

Utility theory offers an elegant and powerful theoretical framework for design and analysis of autonomous adaptive communication networks. Routing of messages in such networks presents a real-time instance of a multi-criterion quasi-optimization problem in a dynamic and uncertain environment. In this paper, we examine several heuristic decision functions that can be used to guide messages along a near-optimal (e.g., minimum delay) path in a large network. We present an analysis of properties of such heuristics under a set of simplifying assumptions about the network topology and load dynamics. In particular, we identify the conditions under which one such utility-theoretic heuristic …


Automated Caching Of Behavioral Patterns For Efficient Run-Time, Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny S. Wong Jun 2017

Automated Caching Of Behavioral Patterns For Efficient Run-Time, Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny S. Wong

Johnny Wong

Run-time monitoring is a powerful approach for dy- namically detecting faults or malicious activity of software systems. However, there are often two obsta- cles to the implementation of this approach in prac- tice: (1) that developing correct and/or faulty be- havioral patterns can be a difficult, labor-intensive process, and (2) that use of such pattern-monitoring must provide rapid turn-around or response time. We present a novel data structure, called extended action graph, and associated algorithms to overcome these drawbacks. At its core, our technique relies on ef- fectively identifying and caching specifications from (correct/faulty) patterns learnt via machine-learning algorithm. We …


The Potential Of Three Computer-Based Communication Activities For Supporting Older Adult Independent Living, Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser Jun 2017

The Potential Of Three Computer-Based Communication Activities For Supporting Older Adult Independent Living, Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser

Johnny Wong

Technology has become an increasingly integral part of life. For example, technology allows individuals to stay in touch with loved ones, obtain medical services through telehealthcare, and enjoy an overall higher quality of life. Particularly for older adults, using technology increases the likelihood that they will maintain their independence and autonomy. Long-distance caregiving has recently become a feasible option where caregivers for older adults can access reports and information about their loved one’s patterns that day (e.g., food and medication intake). Technology may be able to offset age-related challenges (e.g., caregiving, accessing healthcare, decreased social networks) by applying technology to …


A Brief Review On Leading Big Data Models, Sugam Sharma, Udoyara S. Tim, Johnny S. Wong, Shashi Gadia, Subhash Sharma Jun 2017

A Brief Review On Leading Big Data Models, Sugam Sharma, Udoyara S. Tim, Johnny S. Wong, Shashi Gadia, Subhash Sharma

Johnny Wong

Today, science is passing through an era of transformation, where the inundation of data, dubbed data deluge is influencing the decision making process. The science is driven by the data and is being termed as data science. In this internet age, the volume of the data has grown up to petabytes, and this large, complex, structured or unstructured, and heterogeneous data in the form of “Big Data” has gained significant attention. The rapid pace of data growth through various disparate sources, especially social media such as Facebook, has seriously challenged the data analytic capabilities of traditional relational databases. The velocity …


Contextual Motivation In Physical Activity By Means Of Association Rule Mining, Sugam Sharma, Udoyara Sunday Tim, Marinelle Payton, Hari Cohly, Shashi Gadia, Johnny Wong, Sudharshanam Karakala Jun 2017

Contextual Motivation In Physical Activity By Means Of Association Rule Mining, Sugam Sharma, Udoyara Sunday Tim, Marinelle Payton, Hari Cohly, Shashi Gadia, Johnny Wong, Sudharshanam Karakala

Johnny Wong

The primary thrust of this work is to demonstrate the applicability of association rule mining in public health domain, focusing on physical activity and exercising. In this paper, the concept of association rule mining is shown assisting to promote the physical exercise as regular human activity. Specifically, similar to the prototypical example of association rule mining, market basket analysis, our proposed novel approach considers two events – exercise (sporadic) and sleep (regular) as the two items of the frequent set; and associating the former, exercise event, with latter, the daily occurring activity sleep at night, helps strengthening the frequency of …