The faculty and student of the ARCTIC are simultaneously engaged in several projects. As each of these projects develops, individual pages will be added to this list documenting the current progress.
- Cloud Strategic Initiative Synopsis
The goal of the project is two-fold: (1) Create a cloud computing environment for nationally competitive research and education in computing and applications; (2) Develop innovative, multidisciplinary approaches to user authentication problems of information security in mobile-cloud environments.
- An Adaptive Fuzzy Classifier Approach to Edge Detection in Latent Fingerprint Images
This reseaerch focuses on proposing an Adaptive Fuzzy Classifier Approach (AFCA) to local edge detection in order to address the challenges of detecting latent fingerprint in severely degraded images. The proposed approach adapts classifier parameters to different parts of input images using the concept of reference neighborhood. Three variants of AFCAs, namely K-means-clustering AFCA, Entropy-based AFCA, and Statistical AFCA, were developed.
- User-customizable Health Journal Software System: MyHealth Journal
Important as health is to everyone, and especially to those who have conditions to control, most people find it hard to keep a daily log of health information. The fast pace of life and the unavailability of media to record on the go makes it challenging. The old-fashioned hard copy of personal journal is neither convenient nor available enough. In this project, we design and implement MyHealth Journal, a user-customizable journal software system which can be used to record and analyze personal health information to control health conditions. Not only data can be easily collected, visualized and reproduced, it can also be securely backed up on servers and accessed online. The software system is tested and proved to be fully functional. We plan to further develop this project to extend its application to mobile devices, such as smart phones and iPad. The significance of this project include the following:
- it challenges the traditional way of personal health information management by leveraging the current information technology
- it will also help health professionals and researchers monitor patient health and conduct research to improve health care
- Web-Based Security Monitoring System: WebEye_101w
Home/Office Security is becoming increasingly important, especially during an economical downturn. Every day individuals have to make decisions on purchasing security equipment and services. The high cost of such equipment and services makes them non-affordable for many people. Our project developed a simple and affordable webcam-based security monitoring system.
WebEye_101w is easy to set up, platform independent, and user friendly. Our system offers full freedom to set up alert notification, thresholds for motion, e-mail notification text, and other system monitoring settings. The module-based structure makes the process of adding new functionally easy, and our next step is to allow users to select particular areas on the video stream to monitor. In that case, only motions inside the area will trigger an alert. This system can be further developed for monitoring security of museums, hospitals, schools and other organizations.
- Visual Analytics on Large Network Traffic Data using Cloud Computing
This project focuses on designing a visual analytics system for detecting anomalies in large network traffic data through interactive visual analysis. Since understanding and analyzing exponentially growing network traffic data is difficult, an efficient interactive visual analytics system is developped to explore and examine large amounts of data quickly and efficiently.
Hunt, Ray; Zeadally, Sherali; , "Network Forensics: An Analysis of Techniques, Tools, and Trends," Computer , vol.45, no.12, pp.36-43, Dec. 2012, doi: 10.1109/MC.2012.252
Sherali Zeadally, Byunggu Yu, Dong Hyun Jeong & Lily Liang (2012): Detecting Insider Threats: Solutions and Trends, Information Security Journal: A Global Perspective, 21:4, 183-192. http://dx.doi.org/10.1080/19393555.2011.654318
Juan F. Ramirez Rochac, Lily Liang, Byunggu Yu, and Zhao Lu, An Adaptive Fuzzy Classifier Approach to Edge Detection in Latent Fingerprint Images, ICTAI International Conference on Tools with Artificial Intelligence, Vol. 1, pp. 178-185, 2010, IEEE. http://dx.doi.org/10.1109/ICTAI.2010.32
B. Yu, R. Sen, D.H. Jeong, An integrated framework for managing sensor data uncertainty using cloud computing, Information Systems (2012), http://dx.doi.org/10.1016/j.is.2011.12.003
Shore, M., Du, Y. and Zeadally, S. (2011), A Public-Private Partnership Model for National Cybersecurity. Policy & Internet, 3: 1-23. doi: 10.2202/1944-2866.1114
Isaac, J.T.; Zeadally, S.; Camara, J.S.; "Security attacks and solutions for vehicular ad hoc networks," Communications, IET , vol.4, no.7, pp.894-903, April 30 2010, doi:10.1049/iet-com.2009.0191
H. Moustafa and S. Zeadally (Editors), Media Networks: Architectures, Applications, and Standards, CRC Press, New York, ISBN 1439877289, 2012.
S. Zeadally and N. Chilamkurti, "Home Networking: Technologies and Management", Book Chapter, The Handbook of Technology Management, Volume 3: Management Support Systems, Electronic Commerce, Legal and Security Considerations, Hossein Bidgoli, ISBN: 978-0-470-24949-9, 2010
S. Zeadally, H. El-Sayed, and F. Siddiqui, "VoIP: Fundamentals and Managerial Issues", Book Chapter, Handbook of Technology Management, Vol. III, Chapter 4, editor H. Bidgoli, John Wiley and Sons, 2010.
S. Fowler, S. Zeadally, and A. Mellouk, "Quality of Service Support for MPLS-based Wired-Wireless Domains", Book Chapter, End to End Quality of Service Engineering in Next Generation Heterogeneous Networks, editor A. Mellouk, Wiley/ISTE Publishing, 2010.