C68: A Retrospective Study to Assess an Automated Novel Approach for Navigating Catheter Movements

This general research area utilizes the fields of Biomedical Engineering and Computer Science to solve a real-world problem. Ventricular arrhythmias (VA) are abnormal heartbeats oftentimes associated with morbidity, mortality, and impaired quality of life. They can be treated using catheter ablation, where a tube is guided through one’s heart to destroy the small areas of […]

C49: Quantum Computing: A Gateway to Rapid Function Processing

My general research area is quantum computing. The tool used is IBM’s public qubit simulator to experiment with different quantum functions and compare them to traditional computer functions. The research question is whether we can use quantum computers in our everyday lives to speed up different tasks in comparison to traditional computers. This is relevant […]

A58: Neighbor Discovery in a Multi-Transceiver Free-Space-Optical Ad Hoc Network

Through our research in wireless communication, we present a novel neighbor discovery method for a wireless ad hoc network network where each node is equipped with a Free-Space-Optical (FSO) transceivers capable of electronic beam switching. Directional neighbor discovery can be very challenging due to the requirement of strict line-of-sight (LOS) alignment and can result in […]

A36-P: Oblivious Neighbor Discovery in Direction Multi-Transceiver Networks

In a network of multiple devices, neighbor discovery is the process in which the individual devices make their existence known to other devices in the network in order to begin communicating with one another. The neighbor discovery protocol is an essential part of wireless networks used for communication between devices. In our design, we are […]

C37-P: Internet of Things Botnet Detection Using Network Flow Analysis

Our general research area is cybersecurity in the Internet of Things(IoT). The Internet of Things proposes an unprecedented opportunity as everything can be interconnected; however, it also raises countless security risks. Adversely, a network of bots can be deployed to attack a variety of systems and devices, causing malicious activity. We are working on creating […]

Begin typing your search term above and press enter to search. Press ESC to cancel.

Back To Top