92 Publications (Page 2 of 4)
2020
Development of a support vector machine learning and smart phone Internet of Things-based architecture for real-time sleep apnea diagnosis.Ma, Bin⋅Ma, Bin⋅Ma, Bin⋅Ma, Bin⋅Wu, Zhaolong⋅Wu, Zhaolong⋅Wu, Zhaolong⋅Wu, Zhaolong⋅Li, Shengyu⋅Li, Shengyu⋅Li, Shengyu⋅Li, Shengyu⋅Benton, Ryan⋅Benton, Ryan⋅Benton, Ryan⋅Benton, Ryan⋅Li, Dongqi⋅Li, Dongqi⋅Li, Dongqi⋅Li, Dongqi⋅Huang, Yulong⋅Huang, Yulong⋅Huang, Yulong⋅Huang, Yulong⋅Kasukurthi, Mohan Vamsi⋅Mohan, Vamsi K⋅Kasukurthi, Mohan Vamsi⋅Kasukurthi, Mohan Vamsi⋅Lin, Jingwei⋅Lin, Jingwei⋅Lin, Jingwei⋅Lin, Jingwei⋅Borchert, Glen M⋅Borchert, Glen M⋅Borchert, Glen M⋅Borchert, Glen M⋅Tan, Shaobo⋅Tan, Shaobo⋅Tan, Shaobo⋅Tan, Shaobo⋅Li, Gang⋅Li, Gang⋅Li, Gang⋅Li, Gang⋅Yang, Meihong⋅Yang, Meihong⋅Yang, Meihong⋅Yang, Meihong⋅Huang, Jingshan⋅Huang, Jingshan⋅Huang, Jingshan and Huang, JingshanBMC medical informatics and decision making, vol. 20, pp. 298, December 15, 2020.
| Journal Article
DFS3: Automated distributed file system storage state reconstructionHarshany, E.⋅Benton, R.⋅Bourrie, D.⋅Black, M. and Glisson, W.
Dynamic Thresholding Leading to Optimal Inventory MaintenanceChoubey, S.⋅Benton, R. and Johnsten, T.(pp. 4112-4121)
Effects of Missing Members on Classifier Ensemble AccuracyAustin, A. and Benton, R.(pp. 4998-5006)
Identification of Technology-relevant Entities Based on Trend Curves and Semantic Similarities
Jung, Sukhwan⋅Kandadi, Rachana Reddy⋅Datta, Rituparna⋅Benton, Ryan and Segev, Aviv
International journal of Web & Semantic Technology, vol. 11, pp. 1–16. | Journal Article
Network attack detection using an unsupervised machine learning algorithmKumar, A.⋅Glisson, W.B. and Benton, R.(pp. 6496-6505)
Network Attack Detection Using an Unsupervised Machine Learning AlgorithmKumar, Avinash⋅Glisson, William and Cho, HyukHawaii International Conference on System Sciences. | Conference Proceeding
TADS: Transformation of Anomalies in Data StreamsGreen, W.⋅Johnsten, T. and Benton, R.G.(pp. 4284-4292)
2019
A deep learning approach to phase-space analysis for seizure detectionLuckett, P.⋅Watts, T.⋅McDonald, J.T.⋅Hively, L. and Benton, R.ACM-BCB 2019 - Proceedings of the 10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, pp. 190-196. | Conference Proceeding
Android Malware Detection Using Step-Size Based Multi-layered Vector Space ModelsParker, C.⋅McDonald, J.T.⋅Johnsten, T. and Benton, R.G.MALWARE 2018 - Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software, pp. 49-58. | Conference Proceeding
A SVM-Based Algorithm to Diagnose Sleep ApneaMa, B.⋅Tan, S.⋅Yang, M.⋅Huang, J.⋅Wu, Z.⋅Li, S.⋅Benton, R.⋅Li, D.⋅Huang, Y.⋅Kasukurthi, M.V.⋅Lin, J. and Borchert, G.M.(pp. 1556-1560)
Discovery of Action Rules for Continuously Valued DataJohnsten, Tom⋅Green, Wyatt⋅Crook, Lowell⋅Chan, Ho Yin⋅Benton, Ryan G. and Bourrie, David M.IEEE. | Conference Proceeding
Enhancing Itemset Tree Rules and PerformanceLewis, Jay⋅Benton, Ryan G.⋅Bourrie, David and Lavergne, JenniferIEEE. | Conference Proceeding
Insight from a Docker Container IntrospectionWatts, Thomas⋅Thomas Watts, William Glisson⋅Benton, Ryan⋅Shropshire, Jordan⋅Glisson, William and Shropshire, JordanHawaii International Conference on System Sciences.
| Conference Proceeding
Local Gaussian Process Features for Clinical Sensor Time SeriesBrown, C. and Benton, R.G.(pp. 1288-1295)
Mapping Common Data Elements to a Domain Model Using an Artificial Neural NetworkRenner, R.⋅Li, S.⋅Huang, Y.⋅Tan, S.⋅Li, D.⋅Zijp-Tan, A.C.V.D.⋅Benton, R.⋅Borchert, G.M.⋅Huang, J. and Jiang, G.Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018, pp. 1532-1535. | Conference Proceeding
Muscle fatigue detection and treatment system driven by internet of thingsMa, Bin⋅Ma, Bin⋅Li, Chunxiao⋅Li, Chunxiao⋅Wu, Zhaolong⋅Wu, Zhaolong⋅Huang, Yulong⋅Huang, Yulong⋅Tan, Shaobo⋅Tan, Shaobo⋅Li, Dongqi⋅Li, Dongqi⋅Fong, Ada⋅Fong, Ada⋅Basetty, Chandan⋅Basetty, Chandan⋅Borchert, Glen M⋅Borchert, Glen M⋅Benton, Ryan⋅Benton, Ryan⋅Wu, Bin⋅Wu, Bin⋅Huang, Jingshan and Huang, JingshanBMC Medical Informatics and Decision Making , vol. 19(Suppl 7), pp. 1-9, 2019.
| Journal Article
Oinnionn - Outward inward neural network and inward outward neural network evolutionSegev, A.⋅Datta, R.⋅Benton, R. and Curtis, D.GECCO 2019 Companion - Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion, pp. 79-80. | Conference Proceeding
Prescriptive Equipment Maintenance: A FrameworkChoubey, S.⋅Benton, R. and Johnsten, T.(pp. 4366-4374)
Reversible Data Hiding Based Key Region Protection Method in Medical ImagesLi, J.⋅Tan, S.⋅Ma, B.⋅Yang, M.⋅Huang, J.⋅Zhang, Z.⋅Li, S.⋅Benton, R.⋅Huang, Y.⋅Kasukurthi, M.V.⋅Li, D.⋅Lin, J. and Borchert, G.M.(pp. 1526-1530)
SURFr: Algorithm for identification and analysis of ncRNA-derived RNAsKasukurthi, M.V.⋅Li, S.⋅Borchert, G.M.⋅Huang, J.⋅Zhang, D.⋅Housevera, M.⋅Huang, Y.⋅Tan, S.⋅Ma, B.⋅Li, D.⋅Benton, R. and Lin, J.(pp. 1504-1507)
Use CPET data to predict the intervention effect of aerobic exercise on young hypertensive patientsYang, G.⋅Benton, R.⋅Borchert, G.M.⋅Ma, B.⋅Huang, J.⋅Leng, X.⋅Huang, F.⋅Kasukurthi, M.V.⋅Huang, Y.⋅Li, D.⋅Lin, J.⋅Tan, S. and Lu, G.(pp. 1699-1702)
Using an artificial neural network to map cancer common data elements to the biomedical research integrated domain group model in a semi-automated mannerRenner, Robinette⋅Renner, Robinette⋅Renner, Robinette⋅Li, Shengyu⋅Li, Shengyu⋅Li, Shengyu⋅Huang, Yulong⋅Huang, Yulong⋅Huang, Yulong⋅Tan, Shaobo⋅Tan, Shaobo⋅Tan, Shaobo⋅Li, Dongqi⋅Li, Dongqi⋅Li, Dongqi⋅Mohan, Vamsi K⋅Mohan, Vamsi K⋅Mohan, Vamsi K⋅Benton, Ryan⋅Benton, Ryan⋅Benton, Ryan⋅Borchert, Glen M⋅Borchert, Glen M⋅Borchert, Glen M⋅Huang, Jingshan⋅Huang, Jingshan⋅Huang, Jingshan⋅Jiang, Guoqian⋅Jiang, Guoqian and Jiang, GuoqianBMC Medical Informatics and Decision Making , vol. 19(Suppl 7), pp. 1-13, 2019.
| Journal Article
2018
A Multi-Objective Evolutionary Action Rule Mining MethodDaly, G.⋅Benton, R. and Johnsten, T.2018 IEEE Congress on Evolutionary Computation, CEC 2018 - Proceedings. | Conference Proceeding
Identifying stealth malware using CPU power consumption and learning algorithmsLuckett, P.⋅Luckett, P.⋅McDonald, J.T.⋅McDonald, J.T.⋅Glisson, W.B.⋅Glisson, W.B.⋅Benton, R.⋅Benton, R.⋅Dawson, J.⋅Dawson, J.⋅Doyle, B.A. and Doyle, B.A.Journal of Computer Security, vol. 26, pp. 589-613.
| Journal Article