A collection of published articles from members of the Department of Computer Science at Kennesaw State University.
Visit the full list of Faculty Publications to view the work from other departments on campus.
Submissions from 2019
Pathway-based Deep Clustering for Molecular Subtyping of Cancer, Tejaswini Mallavarapu, Jie Hao, Youngsoon Kim, and Jung Hun Oh
Submissions from 2018
A Multi-objective hybrid filter-wrapper evolutionary approach for feature selection, Marwa Hammami, Slim Bechikh, Chih-Cheng Hung, and Lamjed Ben Said
PASNet: Pathway-associated Sparse Deepneural Network for Prognosis Prediction From High-throughput Data, Jie Hao, Youngsoon Kim, Tae-Kyung Kim, and Mingon Kang
An Image-guided Endoscope System for the Ureter Detection, Enmin Song, Feng Yu, Yunlong Li, and Chih-Cheng Hung
Automatic brain tissue segmentation in MR images using hybrid atlas forest based on confidence‐weighted probability matrix, Lijun Xu, Hong Liu, Enmin Song, and Chih-Cheng Hung
An Augmented Reality Endoscope System for Ureter Position Detection, Feng Yu, Enmin Song, Hong Liu, and Chih-Cheng Hung
Submissions from 2017
Stable solution to l 2,1-based robust inductive matrix completion and its application in linking long noncoding RNAs to human diseases, Ashis Kumer Biswas, Dongchul Kim, Mingon Kang, and Chris Ding
Submissions from 2016
Blocking Negative Influential Node Set in Social Networks: From Host Perspective, Harneet Kaur and Jing (Selena) He
Integrative Approach for Inference of Gene Regulatory Networks using Lasso-Based Random Featuring and Application to Psychiatric Disorders, Dongchul Kim, Mingon Kang, Ashis Biswas, and Chunyu Liu
A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment, Donghyun Kim, Yesenia Velasco, Wei Wang, and R. Uma
Maximum Lifetime Combined Barrier-coverage of Weak Static Sensors and Strong Mobile Sensors, Donghyun Kim, Wei Wang, Junggab Son, and Wonjun Lee
On Cost-Aware Biased Respondent Group Selection for Minority Opinion Survey, Wonjun Lee, Wei Wang, Donghyun Kim, and Matthew Tetteh
Contour Propagation Using Non-Uniform Cubic B-Splines for Lung Tumor Delineation in 4D-CT, Yongchuan Liu, Renchao Jin, Mi Chen, and Chih-Cheng Hung
Cascade Classification with Adaptive Feature Extraction for Arrhythmia Detection, Juyoung Park, Mingon Kang, Jean Gao, and Younghoon Kim
A Novel Endoscope system for Position Detection and Depth Estimation of the Ureter, Enmin Song, Feng Yu, Hong Liu, and Chih-Cheng Hung
Security in Fog Computing through Encryption, Akhilesh Vishwanath, Ramya Peruri, and Jing (Selena) He
A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph, Wei Wang, Bei Liu, Donghyun Kim, and Deying Li
Submissions from 2015
A Comparative Study of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, and Victor Clincy
Advanced Techniques for Computational and Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, and Bor-Chen Kuo
Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks Via Multi-Objective Genetic Algorithm, Jing (Selena) He, Shouling Ji, Raheem Beyah, and Ying Xie
Myocardial Motion Estimation of Tagged Cardiac Magnetic Resonance Images Using Tag Motion Constraints and Multi-level B-splines Interpolation, Hong Liu, Meng Yan, Enmin Song, Jie Wang, Qian Wang, and Chih-Cheng Hung
Automating Trade-Off Analysis of Security Requirements, Liliana Pasquale, Paola Spoletini, Mazeiar Salehie, and Luca Cavallaro
Mobile Phishing Attacks and Mitigation Techniques, Hossain Shahriar, Tulin Klintic, and Victor Clincy
Submissions from 2014
Greedy Construction of Load-Balanced Virtual Backbones in Wireless Sensor Networks, Jing (Selena) He, Shouling Ji, and Yingshu Li
A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks, Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai
Hardware Components in Cybersecurity Education, Dan Chia-Tien Lo, Max North, and Sarah North
DRIP - Data Rich, Information Poor: A Concise Synopsis of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, and Sarah North
Classification of Clickjacking Attacks and Detection Techniques, Hossain Shahriar and Vamshee Krishna Devendran
Information Theoretic XSS Attack Detection in Web Applications, Hossain Shahriar, Sarah North, Wei-Chuen Chen, and Edward Mawangi
Server-Side Code Injection Attack Detection Based on Kullback-Leibler Distance, Hossain Shahriar, Sarah M. North, Yoonji Lee, and Roger Hu
Effective Detection of Vulnerable and Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, and Thibaud Lutellier
Multi-Regional Query Scheduling in Wireless Sensor Networks with Minimum Latency, Minggyuan Yan, Jing (Selena) He, Shouling Ji, and Yingshu Li
OpenFlow Security Threat Detection and Defense Services, Wanqing You, Kai Qian, Xi He, and Ying Qian
Hierarchical Queue-Based Task Scheduling, Wanqing You, Kai Qian, and Ying Qian
Developing Health Information Technology (HIT) Programs and HIT Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, and Andy Ju An Wang
Assessment Metrics, Challenges, and Strategies for Mobile Health Apps, Chi Zhang, Xihui Zhang, and Richard Halstead-Nussloch
Submissions from 2013
Qualitative Evaluation of Latency and Packet Loss in a Cloud-based Games, Victor Clincy and Brandon Wilgor
Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, Jing He, Shouling Ji, Yi Pan, and Yingshu Li
Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Jing Selena He, Shouling Ji, Yi Pan, and Zhipeng Cai
Constructing Data Aggregation and Capacity in Probabilistic Wireless Sensor Networks, Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li
Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Networks, Shouling Ji, Jing Selena He, Yi Pan, and Yingshu Li
Cell-Based Snapshot and Continuous Data Collection in Wireless Sensor Networks, Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, and Raheem Beyah
Scalable Matrix Decompositions with Multiple Cores on FPGAs, Yi-Gang Tai, Dan Chia-Tien Lo, and Kleanthis Psarris
Energy-Efficient Task Scheduling Algorithms on Heterogenous Computers with Continuous and Discrete Speeds, Luna Mingyi Zhang, Keqin Li, Dan Chia-Tien Lo, and Yanqing Zhang
Submissions from 2012
Area Query Processing Based on Gray Code in Wireless Sensor Networks, Chunyu Ai, Yueming Duan, Mingyuan Yan, and Jing He
Load-Balanced CDS Construction in Wireless Sensor Networks Via Genetic Algorithm, Jing (Selena) He, Shouling Ji, Mingyuan Yan, and Yi Pan
Hypotheses Generation as Supervised Link Discovery with Automated Class Labeling on Large-scale Biomedical Concept Networks, Jayasimha R. Katukuri, Ying Xie, Vijay Raghavan, and Ashish Gupta
Android-Based Hands-on Labware for Computing Education, Kai Qian, Dan Lo, Yi Pan, and Yanqing Zhang
Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction, Yi-Gang Tai, Dan Chia-Tien Lo, and Kleanthis Psarris
Submissions from 2011
Introduction to Elementary Computational Modeling: Essential Concepts, Principles, and Problem Solving, José M. Garrido
Principles Of Modern Operating Systems, 2nd Edition, José M. Garrido, Richard Schlessinger, and Kenneth E. Hoganson
Reliable and Energy Efficient Target Coverage for Wireless Sensor Networks, Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li
COID: A Cluster–Outlier Iterative Detection Approach to Multi-Dimensional Data Analysis, Yong Shi and Li Zhang
An Approach to Nearest Neighboring Search for Multi-dimensional Data, Yong Shi, Li Zhang, and Lei Zhu
Submissions from 2010
A Novel Clustering Topology Control for Reliable Multi-Hop Routing in Wireless Sensor Networks, Ruiying Du, Chunyu Ai, Longjiang Guo, and Jing He
Teaching Programming Concepts with GameMaker, Ken Hoganson
Lab Exercises Built around a Substantial Example, Ben Setzer
A Scalable Approach to Multi-dimensional Data Analysis, Yong Shi
Improving the Ability of Mining for Multi-dimensional Data, Yong Shi and Tyler Kling
An Attempt to Find Neighbors, Yong Shi and Ryan Rosenblum
Efficient Algorithm for Discovering Potential Interesting Patterns with Closed Itemsets, Raj Singh, Tom Johnsten, Vijay Raghavan, and Ying Xie
Biomedical Relationship Extraction from Literature Based on Bio-Semantic Token Subsequences, Ying Xie, Jayasimha R. Katukuri, and Vijay V. Raghavan
A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots, Naixue Xiong, Jing (Selena) He, Yan Yang, and Yanxiang He
Networked Games Based on Web Services, Chong-wei Xu, Hongwei Lei, and Daniel Xu
Submissions from 2009
Security and Network Analysis Using Simulation, Victor A. Clincy
Object Oriented Program Correctness with OOSimL, José M. Garrido
Object Oriented Simulation: A Modeling and Programming Perspective, José M. Garrido
Reducing MLFQ Scheduling Starvation with Feedback and Exponential Averaging, Kenneth E. Hoganson
Space Optimization on Counters for FPGA-Based Perl Compatible Regular Expressions, Dan Chia-Ten Lo and Yi-Gang Tai
Animated Courseware Support for Teaching Database Design, Meg C. Murray and Mario Guimaraes
Developing Real World Software, Richard Schlesinger
A Dynamic Insertion Approach for Multi-Dimensional Data Using Index Structures, Yong Shi
Towards Solving Similarity Search Problems Using Fuzzy Concept for Multi-Dimensional Data, Yong Shi
A Neutral Network Based Vehicle Classification System for Pervasive Smart Road Security, Naixue Xiong, Jing (Selena) He, Jong Hyuk Park, and Donald Cooley
Submissions from 2008
An Exploratory Overview of Teaching Computer Game Development, Mario Guimaraes and Meg C. Murray
Hybridization of Particle Swarm Optimization with Unsupervised Clustering Algorithms for Image Segmentation, Wenping Liu, Ethan McGrath, Chih-Cheng Hung, and Bor-Chen Kuo
A Model for Using a Capstone Experience as One Method of Assessment of an Information Systems Degree Program, Meg C. Murray, Jorge Pérez, and Mario Guimaraes
Animated Database Courseware: Using Animations to Extend Conceptual Understanding of Database Concepts, Meg Murray and Mario Guimaraes
Expanding the Database Curriculum, Meg Murray and Mario Guimaraes
Detecting Clusters and Outliers for Multi-dimensional Data, Yong Shi
An Integrated Evaluation Method for Module-Based Undergraduate Information Retrieval Education, Yong Shi, Lei Zhu, Jane Wong, Bradley Sturz, and Chun Tang
Examining Granular Computing from a Modeling Perspective, Ying Xie, Jayasimha R. Katukuri, and Vijay V. Raghavan
A Software Framework for Online Mobile Games, Chong-wei Xu
Submissions from 2007
Wiener Indices of Balanced Binary Trees, Sergey Bereg and Hao Wang
Principles of Modern Operating Systems, José M. Garrido and Richard Schlessinger
Pedagogy and Project Management: Should You Practice What You Preach?, Debra B. Geist and Martha E. Myers
Concepts in Computing, Kenneth E. Hoganson
A Comparative Study of Personal Code Management Tools, Huey Mai and Hisham M. Haddad
Learner-Centered Assignments in Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, and Debra B. Geist
Language-Modeling Kernel Based Approach for Information Retrieval, Ying Xie and Vijay V. Raghavan
A Generalized Approach to Possibilistic Clustering Algorithms, Jian Zhou and Chih-Cheng Hung
Submissions from 2006
Color and Texture Image Segmentation Using Uniform Local Binary Patterns, S. Arasteh and Chih-Cheng Hung
Evaluation and Illustration of a Free Software (FS) Tool for Wireless Network Monitoring and Security, Victor A. Clincy and Krithi Sitaram Ajay
Free Tools for Teaching & Researching Wireless Networking Concepts, Victor A. Clincy and Krithi Sitaram Ajay
The Future Leading Mobility Protocol: Mobile IPv4 OR Mobile IPv6?, Victor A. Clincy and Mudiraj Padmaja
Evaluation and illustration of a Free Software (FS) Tool for Wireless Network Monitoring and Security, Victor Clincy and Ajay Sitaram Krithi
The Kennesaw Database Courseware (KDC): Strong Points, Weak Points, and Experience Using It in a Classroom Environment, Mario Guimaraes