Sponsored by:
NSF logo
Contact Information:
Oakland University

2012 Projects

Advisor: Dr. Zohdy
In this project, SOFM are to be trained to categorize presented mathematical objects in the form of families of curves. Optimal features shall be extracted from x-domain,frequency-domain as well as joint x-frequency spaces obtained by transformations from the curves.Testing of learned curve classes shall be done following the training and convergence. New contributions are to be attempted, such as new features from joint x-frequency space, applying multiple similarity norms,use of pattern correlations, history keeping functions,and more effective initializations and input sequencing.
Advisor: Dr. Shu
Classical key establishment mechanisms, such as the famous Diffie-Hellman key exchange scheme, rely on the computational hardness assumption in solving certain hard problems (e.g., the discrete logarithm problem). The validity of this assumption has been seriously challenged by the tremendous computation capacity of today's parallel computing technology. Meanwhile, the most recently proposed physical-layer key extraction schemes are subject to the limitation of single-hop point-to-point channels. In this project, we will investigate novel mechanisms of generating secret keys by utilizing network layer characteristics such as routing, traffic signature, and nodes mobility. Such a mechanism enables two or more communicating parties that are multiple hops apart to establish secret keys without the needs of meeting each other before communication or relying on the computational hardness assumption. This research covers the current state of the arts in networking, security, and privacy. The research outcomes may contribute to the next generation security paradigm for mobile ad hoc networks.
Advisor: Dr. Fu
With so many people inputting their private information into smartphones, the privacy of the users is a growing concern.This project presents various growing concerns about smartphone privacy issues. Our research covers current concepts of networking, security and privacy in 3G and 3GPP with respect to hardware, software, and application implementations on contemporary smartphones. After analysis of these recommended protocols, we will address ways to compromise users' privacy rights, and potentially develop fixes to these attacks.
Advisor: Dr. Li
Prostate cancer is the most commonly diagnosed cancer in men and is the second leading cause of cancer-related deaths in men. Functional imaging techniques such as diffusion weighted MRI (DW-MRI) are emerging that makes use of differences in microvascular and cellular content of normal and tumor-containing tissues. Although functional MRI has been used in staging, use of these techniques in tumor prognosis and therapy response assessment for prostate cancer has not been exploited. The goal of this study is to generate automatic statistical map based on anatomical and textural features to detect tumor likelihood and classify tumor aggressiveness in a DWI.
Advisor: Dr. Qu
In this project, we will investigate methods for medical error detection and clinical behavior analysis. The team will work to design a new logging system on the top of the existing acute pain system (APS) that the information including patient medical records, nurses daily rounding, inpatient/outpatient follow ups and surgery procedure will be captured and also the uses of the APS system. Upon the collected data, instance based learning methods will be deployed. Once we have these two functions implemented, we will be able to answer the following questions in collaborating with the doctors: 1) what are the main reasons to cause medical errors? 2) how to avoid medical errors? 3) who is the nearest neighbor(s) for a specified patient?