Prasad Calyam

Prasad Calyam
University of Missouri | Mizzou · Electrical Engineering and Computer Science

PhD

About

192
Publications
26,911
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,986
Citations
Citations since 2016
122 Research Items
1439 Citations
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300

Publications

Publications (192)
Article
Full-text available
Virtual Reality Learning Environments (VRLEs) are a new form of immersive environments which are integrated with wearable devices for delivering distance learning content in a collaborative manner in e.g., special education , surgical training . Gaining unauthorized access to these connected devices can cause security, privacy attacks (SP) that...
Preprint
Full-text available
Cybersickness can be characterized by nausea, vertigo, headache, eye strain, and other discomforts when using virtual reality (VR) systems. The previously reported machine learning (ML) and deep learning (DL) algorithms for detecting (classification) and predicting (regression) VR cybersickness use black-box models; thus, they lack explainability....
Conference Paper
Full-text available
Cybersickness can be characterized by nausea, vertigo, headache, eye strain, and other discomforts when using virtual reality (VR) systems. The previously reported machine learning (ML) and deep learning (DL) algorithms for detecting (classification) and predicting (regression) VR cybersickness use black-box models; thus, they lack explainability....
Article
Full-text available
There is a growing need for next‐generation science gateways to increase the accessibility of emerging large‐scale datasets for data consumers (e.g., clinicians, researchers) who aim to combat COVID‐19‐related challenges. Such science gateways that enable access to distributed computing resources for large‐scale data management need to be made more...
Chapter
Full-text available
Identifying high-quality publications remains a critical challenge for health-care data consumers (e.g., immunologists, clinical researchers) who seek to make timely decisions related to the COVID-19 pandemic response. Currently, researchers perform a manual literature review process to compile and analyze publications from disparate medical journa...
Chapter
Unmanned aerial vehicles (a.k.a. drones) have a wide range of applications in e.g., aerial surveillance, mapping, imaging, monitoring, maritime operations, parcel delivery, and disaster response management. Their operations require reliable networking environments and location-based services in air-to-air links with co-operative drones, or air-to-g...
Article
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent threats, Cryptojacking which threaten service availability. Recently, methods for threat information sharing and defense require cooperation and trust between multiple domains/entities. There is a need for mechanisms that establish distributed trust to allow f...
Article
Full-text available
Understanding and controlling the self-assembly of vertically oriented carbon nanotube (CNT) forests is essential for realizing their potential in myriad applications. The governing process–structure–property mechanisms are poorly understood, and the processing parameter space is far too vast to exhaustively explore experimentally. We overcome thes...
Conference Paper
While the physical properties of carbon nanotubes (CNTs) are often superior to conventional engineering materials, their widespread adoption into many applications is limited by scaling the properties of individual CNTs to macroscale CNT assemblies known as CNT forests. The self-assembly mechanics of CNT forests that determine their morphology and...
Article
Full-text available
Medical schools store large sets of patient data. The data is important for the analysis of trends and patterns in healthcare practice. However, obtaining access to the data can be problematic due to the data protection mechanisms. In this study, we investigate the current practices from the lens of both the data requester and the data provider. Re...
Conference Paper
Full-text available
Insurance claims processing involves multi-domain entities and multi-source data, along with a number of human-agent interactions. Consequently, this processing is traditionally manually-intensive and time-consuming. Blockchain technology-based platforms for intelligent automation can significantly improve the scale and response time of claims proc...
Article
Full-text available
Social Virtual Reality Learning Environments (VRLE) offer a new medium for flexible and immersive learning environments with geo-distributed users. Ensuring user safety in VRLE application domains such as education, flight simulations, military training is of utmost importance. Specifically, there is a need to study the impact of “immersion attacks...
Article
Full-text available
The COVID-19 pandemic is an unprecedented global emergency. Clinicians and medical researchers are suddenly thrown into a situation where they need to keep up with the latest and best evidence for decision-making at work in order to save lives and develop solutions for COVID-19 treatments and preventions. However, a challenge is the overwhelming nu...
Article
Full-text available
Healthcare innovations are increasingly becoming reliant on high variety and standards-compliant (e.g., HIPAA, common data model) distributed data sets that enable predictive analytics. Consequently, health information systems need to be developed using cooperation and distributed trust principles to allow protected data sharing between multiple do...
Preprint
Full-text available
Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In th...
Conference Paper
Full-text available
Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In th...
Conference Paper
Full-text available
Unmanned aerial vehicles or drones provide new capabilities for disaster response management (DRM). In a DRM scenario, multiple heterogeneous drones collaboratively work together forming a flying ad-hoc network (FANET) instantiated by a ground control station. However, FANET air-to-air and air-to-ground links that serve critical application expecta...
Article
Shortened time to knowledge discovery and adapting prior domain knowledge is a challenge for computational and data-intensive communities such as e.g., bioinformatics and neuroscience. The challenge for a domain scientist lies in the actions to obtain guidance through query of massive information from diverse text corpus comprising of a wide-rangin...
Poster
Full-text available
Goal: To understand the impact of different attack scenarios on the ClaimChain system and show the effectiveness of the fraud detection module in our system. • We use a dataset with 15,430 claims out of which 924 are fraudulent claims and each claim comprises 33 attributes. • In Hyperledger composer, as the number of accounts increases, the process...
Article
There is an increasing trend in cloud-adoption of enterprise applications in e.g., manufacturing, health-care, and finance. Such applications are routinely subject to targeted cyber attacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to resource...
Article
Multi-Unmanned Aerial Vehicle (UAV) systems with high-resolution cameras have been found useful for operations such as smart city and disaster management. These systems feature Flying Ad-Hoc Networks (FANETs) that connect the computation edge with UAVs and a Ground Control Station (GCS) through air-to-ground wireless network links. Leveraging the e...
Article
Full-text available
The rapid growth of COVID-19 publications has driven clinical researchers and healthcare professionals in pursuit to reduce the knowledge gap on reliable information for effective pandemic solutions. The manual task of retrieving high-quality publications based on the evidence pyramid levels, however, presents a major bottleneck in researchers’ wor...
Article
Full-text available
Virtual Learning Environments (VLEs) are spaces designed to educate student groups remotely via online platforms. Although traditional VLEs have shown promise in educating students, they offer limited immersion that overall diminishes learning effectiveness. In this paper, we describe vSocial, a cloud-based virtual reality learning environment (VRL...
Conference Paper
Full-text available
Big data computation tools are vital for researchers and educators from various domains such as plant science, animal science, biomedical science, and others. With the growing computational complexity of biology big data, advanced analytic systems, known as prescriptive systems, are being built using machine learning models to intelligently predict...
Article
Full-text available
Patients are becoming aware of the importance of taking secure control and managing access over their medical data, thereby leading to the rise in the adoption of personal health record (PHR) systems. However, today’s PHR systems fall short in providing secure and trustable data sharing and access facilities to patients when they are in emergency s...
Article
Scientists in disciplines such as neuroscience and bioinformatics are increasingly relying on science gateways for experimentation on voluminous data, as well as analysis and visualization in multiple perspectives. Though current science gateways provide easy access to computing resources, data sets and tools specific to the disciplines, scientists...
Article
Full-text available
Cyber foraging has been shown to be especially effective for augmenting low-power Internet-of-Thing (IoT) devices by offloading video processing tasks to nearby edge/cloud computing servers. Factors such as dynamic network conditions, concurrent user access, and limited resource availability, cause offloading decisions that negatively impact overal...
Conference Paper
Full-text available
The continuous evolution of commercial Unmanned Aerial Systems (UAS) is fueling a rapid advancement in the fields of network edge-communication applications for smart agriculture, smart traffic management, and border security. A common problem in UAS (a.k.a. drone systems) research and development is the cost related to deploying and running realis...
Conference Paper
Full-text available
Industry 4.0 is the latest industrial revolution primarily merging automation with advanced manufacturing to reduce direct human effort and resources. Predictive maintenance (PdM) is an industry 4.0 solution, which facilitates predicting faults in a component or a system powered by state-of-the-art machine learning (ML) algorithms (especially deep...
Chapter
Geospatial video analytics involves “data collection” of massive image/video data from the Internet of Things (IoT), and “data processing” through seamless computing at the infrastructure edge and core/public cloud platforms. Particularly in cases of (man‐made or natural) disaster incident response coordination scenarios, geospatial video analytics...
Article
Full-text available
Traditionally, Network Function Virtualization uses Service Function Chaining (SFC) to place service functions and chain them with corresponding flows allocation. With the advent of Edge computing and IoT, a reliable orchestration of latency-sensitive SFCs is needed to compose and maintain them in geo-distributed cloud infrastructures. However, the...
Article
With the increase of DDoS attacks, resource adaptation schemes need to be effective to protect critical cloud-hosted applications. Specifically, they need to be adaptable to attack behavior, and be dynamic in terms of resource utilization. In this paper, we propose an intelligent strategy for proactive and reactive application migration by leveragi...
Article
Full-text available
Nowadays the abundance of IoT devices has the potential of changing our lives dramatically, but brings new routing and traffic orchestration challenges for the next-generation Internet providers: core routers are already overwhelmed, see e.g, the routing table size growth problem. Although some researchers still argue whether or not the next-genera...
Preprint
The parameter space of CNT forest synthesis is vastand multidimensional, making experimental and/or numericalexploration of the synthesis prohibitive. We propose a morepractical approach to explore the synthesis-process relationshipsof CNT forests using machine learning (ML) algorithms toinfer the underlying complex physical processes. Currently, n...
Preprint
Full-text available
Industry 4.0 is the latest industrial revolution primarily merging automation with advanced manufacturing to reduce direct human effort and resources. Predictive maintenance (PdM) is an industry 4.0 solution, which facilitates predicting faults in a component or a system powered by state-of-the-art machine learning (ML) algorithms (especially deep...