92 Publications (Page 2 of 4)
2020
Development of a support vector machine learning and smart phone Internet of Things-based architecture for real-time sleep apnea diagnosis.
Ma, BinMa, BinMa, BinMa, BinWu, ZhaolongWu, ZhaolongWu, ZhaolongWu, ZhaolongLi, ShengyuLi, ShengyuLi, ShengyuLi, ShengyuBenton, RyanBenton, RyanBenton, RyanBenton, RyanLi, DongqiLi, DongqiLi, DongqiLi, DongqiHuang, YulongHuang, YulongHuang, YulongHuang, YulongKasukurthi, Mohan VamsiMohan, Vamsi KKasukurthi, Mohan VamsiKasukurthi, Mohan VamsiLin, JingweiLin, JingweiLin, JingweiLin, JingweiBorchert, Glen MBorchert, Glen MBorchert, Glen MBorchert, Glen MTan, ShaoboTan, ShaoboTan, ShaoboTan, ShaoboLi, GangLi, GangLi, GangLi, GangYang, MeihongYang, MeihongYang, MeihongYang, MeihongHuang, JingshanHuang, JingshanHuang, Jingshan and Huang, Jingshan
BMC medical informatics and decision making, vol. 20, pp. 298, December 15, 2020. | Journal Article
 
DFS3: Automated distributed file system storage state reconstruction
Harshany, E.Benton, R.Bourrie, D.Black, M. and Glisson, W.
 
Dynamic Thresholding Leading to Optimal Inventory Maintenance
Choubey, S.Benton, R. and Johnsten, T.
(pp. 4112-4121)
 
Effects of Missing Members on Classifier Ensemble Accuracy
Austin, A. and Benton, R.
(pp. 4998-5006)
 
Identification of Technology-relevant Entities Based on Trend Curves and Semantic Similarities
Jung, SukhwanKandadi, Rachana ReddyDatta, RituparnaBenton, Ryan and Segev, Aviv
International journal of Web & Semantic Technology, vol. 11, pp. 1–16. | Journal Article
 
Network attack detection using an unsupervised machine learning algorithm
Kumar, A.Glisson, W.B. and Benton, R.
(pp. 6496-6505)
 
Network Attack Detection Using an Unsupervised Machine Learning Algorithm
Kumar, AvinashGlisson, William and Cho, Hyuk
Hawaii International Conference on System Sciences. | Conference Proceeding
 
TADS: Transformation of Anomalies in Data Streams
Green, W.Johnsten, T. and Benton, R.G.
(pp. 4284-4292)
2019
A deep learning approach to phase-space analysis for seizure detection
Luckett, P.Watts, T.McDonald, J.T.Hively, L. and Benton, R.
ACM-BCB 2019 - Proceedings of the 10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, pp. 190-196. | Conference Proceeding
 
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models
Parker, C.McDonald, J.T.Johnsten, T. and Benton, R.G.
MALWARE 2018 - Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software, pp. 49-58. | Conference Proceeding
 
A SVM-Based Algorithm to Diagnose Sleep Apnea
Ma, B.Tan, S.Yang, M.Huang, J.Wu, Z.Li, S.Benton, R.Li, D.Huang, Y.Kasukurthi, M.V.Lin, J. and Borchert, G.M.
(pp. 1556-1560)
 
Discovery of Action Rules for Continuously Valued Data
Johnsten, TomGreen, WyattCrook, LowellChan, Ho YinBenton, Ryan G. and Bourrie, David M.
IEEE. | Conference Proceeding
 
Enhancing Itemset Tree Rules and Performance
Lewis, JayBenton, Ryan G.Bourrie, David and Lavergne, Jennifer
IEEE. | Conference Proceeding
 
Insight from a Docker Container Introspection
Watts, ThomasThomas Watts, William GlissonBenton, RyanShropshire, JordanGlisson, William and Shropshire, Jordan
Hawaii International Conference on System Sciences. | Conference Proceeding
 
Local Gaussian Process Features for Clinical Sensor Time Series
Brown, C. and Benton, R.G.
(pp. 1288-1295)
 
Mapping Common Data Elements to a Domain Model Using an Artificial Neural Network
Renner, R.Li, S.Huang, Y.Tan, S.Li, D.Zijp-Tan, A.C.V.D.Benton, R.Borchert, G.M.Huang, J. and Jiang, G.
Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018, pp. 1532-1535. | Conference Proceeding
 
Muscle fatigue detection and treatment system driven by internet of things
Ma, BinMa, BinLi, ChunxiaoLi, ChunxiaoWu, ZhaolongWu, ZhaolongHuang, YulongHuang, YulongTan, ShaoboTan, ShaoboLi, DongqiLi, DongqiFong, AdaFong, AdaBasetty, ChandanBasetty, ChandanBorchert, Glen MBorchert, Glen MBenton, RyanBenton, RyanWu, BinWu, BinHuang, Jingshan and Huang, Jingshan
BMC Medical Informatics and Decision Making , vol. 19(Suppl 7), pp. 1-9, 2019. | Journal Article
 
Oinnionn - Outward inward neural network and inward outward neural network evolution
Segev, A.Datta, R.Benton, R. and Curtis, D.
GECCO 2019 Companion - Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion, pp. 79-80. | Conference Proceeding
 
Prescriptive Equipment Maintenance: A Framework
Choubey, S.Benton, R. and Johnsten, T.
(pp. 4366-4374)
 
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Li, J.Tan, S.Ma, B.Yang, M.Huang, J.Zhang, Z.Li, S.Benton, R.Huang, Y.Kasukurthi, M.V.Li, D.Lin, J. and Borchert, G.M.
(pp. 1526-1530)
 
SURFr: Algorithm for identification and analysis of ncRNA-derived RNAs
Kasukurthi, M.V.Li, S.Borchert, G.M.Huang, J.Zhang, D.Housevera, M.Huang, Y.Tan, S.Ma, B.Li, D.Benton, R. and Lin, J.
(pp. 1504-1507)
 
Use CPET data to predict the intervention effect of aerobic exercise on young hypertensive patients
Yang, G.Benton, R.Borchert, G.M.Ma, B.Huang, J.Leng, X.Huang, F.Kasukurthi, M.V.Huang, Y.Li, D.Lin, J.Tan, S. and Lu, G.
(pp. 1699-1702)
 
Using an artificial neural network to map cancer common data elements to the biomedical research integrated domain group model in a semi-automated manner
Renner, RobinetteRenner, RobinetteRenner, RobinetteLi, ShengyuLi, ShengyuLi, ShengyuHuang, YulongHuang, YulongHuang, YulongTan, ShaoboTan, ShaoboTan, ShaoboLi, DongqiLi, DongqiLi, DongqiMohan, Vamsi KMohan, Vamsi KMohan, Vamsi KBenton, RyanBenton, RyanBenton, RyanBorchert, Glen MBorchert, Glen MBorchert, Glen MHuang, JingshanHuang, JingshanHuang, JingshanJiang, GuoqianJiang, Guoqian and Jiang, Guoqian
BMC Medical Informatics and Decision Making , vol. 19(Suppl 7), pp. 1-13, 2019. | Journal Article
2018
A Multi-Objective Evolutionary Action Rule Mining Method
Daly, G.Benton, R. and Johnsten, T.
2018 IEEE Congress on Evolutionary Computation, CEC 2018 - Proceedings. | Conference Proceeding
 
Identifying stealth malware using CPU power consumption and learning algorithms
Luckett, P.Luckett, P.McDonald, J.T.McDonald, J.T.Glisson, W.B.Glisson, W.B.Benton, R.Benton, R.Dawson, J.Dawson, J.Doyle, B.A. and Doyle, B.A.
Journal of Computer Security, vol. 26, pp. 589-613. | Journal Article