Mason Archival Repository Service

Browsing Volgenau School of Engineering by Title

Browsing Volgenau School of Engineering by Title

Sort by: Order: Results:

  • Hudson, Linwood D.; Ware, Bryan S.; Laskey, Kathryn B.; Mahoney, Suzanne M. (2005-11-18)
    Recent events underscore the need for effective tools for managing the risks posed by terrorists. Assessing the threat of terrorist attack requires combining information from multiple disparate sources, most of ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi (2006-07-30)
    Ontologies have become ubiquitous in current-generation information systems. An ontology is an explicit, formal representation of the entities and relationships that can exist in a domain of application. Following a ...
  • Costa, Paulo C. G. (George Mason University, 2005-07-12)
    Uncertainty is ubiquitous. Any representation scheme intended to model real-world actions and processes must be able to cope with the effects of uncertain phenomena. A major shortcoming of existing Semantic Web technologies ...
  • Laskey, Kathryn B. (North-Holland, 1989)
    In the canonical examples underlying Shafer-Dempster theory, beliefs over the hypotheses of interest are derived from a probability model for a set of auxiliary hypotheses. A belief function differs from a Bayesian probability ...
  • Mahapasuthanon, Pattiya; Hoffman, Kimberly (Mason Graduate Interdisciplinary Conference, 2019-04-06)
    Bibliometric methods, using citations as data, are an alternate way to learn from the literature of science and technology. These statistical methods are used, with visualization tools, to determine the relationship between ...
  • Bush, Joshua (2020)
    The brain remains the key to our experiential reality. From sensory perception to an internal expanse the brain remains the hardware and processing unit. The age in which we can precisely alter the hardware with which we ...
  • Lee, Hojun; Zeigler, Bernard (2009-10-05)
    This paper explores the Information Exchange Framework (IEF) concept of distributed data fusion sensor networks in Network-centric environment. It is used to build up integrative battlefield pictures through the Battle ...
  • Hassan, Rakibul (2019)
    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for ...
  • Hachem, Stephanie (Teknos, 2020)
    Proprioception, the internal sense of where your body parts are relative to each other, is essential for many, particularly bimanual, daily activities. Unfortunately, because modern prosthetics lacks this sense it is often ...
  • Wright, Edward J.; Laskey, Kathryn B. (2006-07)
    This paper presents a technical approach for fusing information from diverse sources. Fusion requires appropriate weighting of information based on the quality of the source of the information. A credibility model ...
  • Gunderson, C.R.; Raytheon, David Minton (2008)
    Coalition Warrior Interoperability Demonstration 2008 (CWID 08), Interoperability Trial (IT) #5.64 “Trusted Enterprise Service Bus” (T-ESB) demonstrates a potentially quantum improvement in the government procurement model ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wang, Xun; Barbará, Daniel; Shackelford, Thomas; Wright, Edward J.; Fitzgerald, Julie (2006-03-06)
    This paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of ...
  • Vargas, Merlyn (2020-05)
    DNA nanotechnology has great potential as a platform to enhance neural engineering approaches. DNA based nanoparticles are biocompatible and easy to functionalize [1]. Peptides or proteins can be conjugated to DNA nanoparticles ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi; Barbará, Daniel; Shackelford, Thomas; Mirza, Sepideh; Revankar, Mehul (MITRE Corporation, 2005-05)
    This paper describes the Detection of Threat Behavior (DTB) project, a joint effort being conducted by George Mason University (GMU) and Information Extraction and Transport, Inc. (IET). DTB uses novel approaches for ...
  • Kamath, Uday; De Jong, Kenneth; Shehu, Amarda (Public Library of Science, 2014-07-17)
    Background Many open problems in bioinformatics involve elucidating underlying functional signals in biological sequences. DNA sequences, in particular, are characterized by rich architectures in which functional signals ...
  • Powell, Walter A.; Laskey, Kathryn Blackmond; Adelman, Leonard; Johnson, Ryan; Dorgan, Shiloh; Hieb, Micheal; Braswell, Kenneth; Powers, Michael (2010-04-20)
    Geospatial Reasoning has been an essential aspect of military planning since the invention of cartography. Geospatial Digital Support Products (GDSPs) are ubiquitous within current military forces as well as civil and ...
  • Powell, Walter A.; Laskey, Kathryn Blackmond; Adelman, Leonard; Johnson, Ryan; Altenau, Michael; Goldstein, Andrew; Visone, Daniel; Braswell, Kenneth (Proceeding of 14th International Command and Control Research and Technology Symposium, 2009-06)
    How does the underlying data affect the ability of warfighters to derive useful information and make decisions? The Army Topographic Engineering Center (TEC) and GMU endeavor to shed light on this question with the third ...
  • O'Shea, Bailey (2020)
    A novelty to counter neurodegenerative diseases such as Alzheimer’s or peripheral nerve injury (PNI) has been in high demand for the past century. Alzheimer’s disease is a well-known disorder that causes nerve tissue to ...
  • Ryan, Andrew (2020)
    For people who are mute, or are completely paralyzed, one of the primary problems they have to deal with is being able to communicate. One potential solution to compensate for decreased communication functions is by using ...
  • Hieb, Michael R.; Pullen, J. Mark (2006-05-05)
    Agents assist users with performing tasks in computer-based applications. The current practice of building an agent involves a developer programming it for each task it must perform, but agents constructed in this manner ...

Search MARS


Browse

My Account