Now showing items 666-685 of 911

    • Radiation pressure of light pulses and conservation of linear momentum in dispersive media 

      Scalora, Michael; D’Aguanno, Giuseppe; Mattiucci, Nadia; Bloemer, Mark J.; Centini, Marco; Sibilia, Concita; Haus, Joseph W. (American Physical Society (APS), 2006-05-16)
      We derive an expression for the Minkowski momentum under conditions of dispersive susceptibility and permeability, and compare it to the Abraham momentum in order to test the principle of conservation of linear momentum ...
    • RadSense: Enabling one hand and no hands interaction for sterile manipulation of medical images using Doppler radar 

      Miller, Elishiah; Li, Zheng; Mentis, Helena; Park, Adrian; Zhu, Ting; Banerjee, Nilanjan (Elsevier, 2019-11-15)
      In this paper, we show how surgeons can interact with medical images using finger and hand gestures in two situations: one hand-free and no hands-free interaction. We explain how interaction with only one hand or a couple ...
    • Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas 

      Pappachan, Primal; Yus, Roberto; Joshi, Anupam; Finin, Tim (IEEE, 2014-10-22)
      Community Health Workers (CHWs) act as liaisons between health-care providers and patients in underserved or un-served areas. However, the lack of information sharing and training support impedes the effectiveness of CHWs ...
    • RAM: Radar-based Activity Monitor 

      Khan, Md Abdullah Al Hafiz; Kukkapalli, Ruthvik; Waradpande, Piyush; Kulandaivel, Sekar; Banerjee, Nilanjan; Roy, Nirmalya; Robucc, Ryan (IEEE, 2016-07-20)
      Activity recognition has applications in a variety of human-in-the-loop settings such as smart home health monitoring, green building energy and occupancy management, intelligent transportation, and participatory sensing. ...
    • RBM Image Generation Using the D-Wave 2000Q 

      Sleeman, Jennifer; Halem, Milton; Dorband, John (UMBC, 2019-10-30)
      We describe a hybrid approach that combines a deep convolutional neural network autoencoder and a quantum Restricted Boltzmann Machine (RBM) for image generation using the D-Wave 2000Q. We compare the quantum learned ...
    • RDF123: a mechanism to transform spreadsheets to RDF 

      Han, Lushan; Parr, Cynthia; Sachs, Joel; Joshi, Anupam; Finin, Tim (2007-08-17)
      We describe RDF123, a highly flexible open-source tool for transforming spreadsheet data to RDF. Existing spreadsheet-to-RDF tools typically map only to star-shaped RDF graphs, i.e. each spreadsheet row is an instance, ...
    • A Reactive Service Composition Architecture for Pervasive Computing Environments 

      Chakraborty, Dipanjan; Perich, Filip; Joshi, Anupam; Finin, Timothy; Yesha, Yelena (2002-03-12)
      Technological advances in semiconductor processing and design as well as wireless networking are leading us towards the vision of Pervasive Computing. We envision that in the (near) future, devices all around a person, ...
    • Real Time Global Illumination Solutions to the Radiosity Algorithm using Hybrid CPU/GPU Nodes 

      Adenikinju, Oluwapelumi; Gilyard, Julian; Massey, Joshua; Stitt, Thomas; Graf, Jonathan; Huang, Xuan; Khuvis, Samuel; Gobbert, Matthias K.; Wang, Yu; Olano, Marc (2014)
      We investigate high performance solutions to the global illumination problem in computer graphics. An existing CPU serial implementation using the radiosity method is given as the performance baseline where a scene and ...
    • Real-Time Path Planning for a Robotic Arm 

      Krishnaswamy, Kavita; Sleeman, Jennifer; Oates, Tim (ACM, 2011-05-25)
      With robotics technology, services can be provided to care for individuals with disabilities. This paper describes an eff ort to improve path planning performance for a robotic arm, resulting in faster user response in ...
    • Reflections on: Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization 

      Padia, Ankur; Kalpakis, Konstantinos; Ferraro, Francis; Finin, Tim
      We present a family of four novel methods for embedding knowledge graphs into real-valued tensors that capture the ordered relations found in RDF. Unlike many previous models, these can easily use prior background knowledge ...
    • Reflectivity control via second-order interaction process in one-dimensional photonic band-gap structures 

      Centini, M.; Sibilia, C.; D’Aguanno, G.; Bertolotti, M.; Scalora, M.; Bloemer, M. J.; Bowden, C. M. (Elsevier, 2000-10-06)
      We exploit the nonlinear reflectivity of a pulse at the fundamental frequency induced by a second harmonic signal in one-dimensional photonic band gap structures for applications to fast control of light-by-light and all ...
    • Reflexive Memory Authenticator: a proposal for effortless renewable biometrics 

      Blanchard, Nikola K.; Kachanovich, Siargey; Selker, Ted; Waligorski, Florentin
      Today’s biometric authentication systems are still struggling with replay attacks and irrevocable stolen credentials. This paper introduces a biometric protocol that addresses such vulnerabilities. The approach prevents ...
    • Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata 

      Ayanzadeh, Ramin; Halem, Milton; Finin, Tim (Nature Research, 2020-05-14)
      We introduce the notion of reinforcement quantum annealing (RQA) scheme in which an intelligent agent searches in the space of Hamiltonians and interacts with a quantum annealer that plays the stochastic environment role ...
    • Relational Clustering Based on a New Robust Estimator with Application to Web Mining 

      Nasraoui, Olfa; Krishnapuram, Raghu; Joshi, Anupam (IEEE, 1999-10-24)
      Mining typical user profiles and URL associations from the vast amount of access logs is an important component of Web personalization. In this paper, we define the notion of a ""user session" as being a temporally compact ...
    • RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement 

      Pingle, Aditya; Piplai, Aritran; Mittal, Sudip; Joshi, Anupam; Holt, James; Zak, Richard (2019-05-16)
      Security Analysts that work in a `Security Operations Center' (SoC) play a major role in ensuring the security of the organization. The amount of background knowledge they have about the evolving and new attacks makes a ...
    • Representation Learning by Learning to Count 

      Noroozi, Mehdi; Pirsiavash, Hamed; Favaro, Paolo (IEEE, 2017-12-25)
      We introduce a novel method for representation learning that uses an artificial supervision signal based on counting visual primitives. This supervision signal is obtained from an equivariance relation, which does not ...
    • Resonant and nonresonant funneling through plasmonic gratings in the limit of the aperture width approaching zero 

      Bloemer, M. J.; Mattiucci, N.; D’Aguanno, G.; Trimm, R.; Akozbek, N. (AIP publishing, 2014-01-13)
      We experimentally and theoretically investigate electromagnetic funneling in thick plasmonic gratings as the aperture size approaches zero. Both resonant and nonresonant funneling mechanisms were observed to provide near ...
    • Retriever: Improving Web Search Engine Results Using Clustering 

      Jiang, Zhihua; Joshi, Anupam; Krishnapuram, Raghu; Yi, Liyu (2000-10-24)
      Web search engine have become increasingly ineffective as the number of documents on the web have proliferated. Typical queries retrieve hundreds of documents, most of which have no relation with what the use was looking ...
    • Robots That Use Language 

      Tellex, Stefanie; Gopalan, Nakul; Kress-Gazit, Hadas; Matuszek, Cynthia (Annual Reviews, 2020-01-31)
      This article surveys the use of natural language in robotics from a robotics point of view. To use human language, robots must map words to aspects of the physical world, mediated by the robot's sensors and actuators. This ...
    • A Robust Free Size OCR for Omni-font Persian/Arabic Printed Document using Combined MLP/SVM 

      Pirsiavash, Hamed; Mehran, Ramin; Razzazi, Farbod (Springer, Berlin, Heidelberg, 2005)
      Optical character recognition of cursive scripts present a number of challenging problems in both segmentation and recognition processes and this attracts many researches in the field of machine learning. This paper presents ...