Addison Clark’s research while affiliated with The University of Texas at Arlington and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (12)


An illustrative example showing a graph (a) before an attack and (b) after an attack that maximizes the damage with a fixed budget. Gray nodes are the nodes that were attacked. Red nodes are ones disabled by failure propagation. Green nodes are still functional. (c) shows the graph after an attack that minimizes the cost with fixed damage output
Example graphs (left) and solution attack (right) for Barabási–Albert scale-free graphs using uniform distributions for weights
Example graphs (left) and solution attack (right) for Erdős–Rényi graphs using uniform distributions for weights
Change in the number of nodes attacked w.r.t. average node degree for Barabási–Albert scale free graphs using uniform distribution for weights. Solved for maximum damage based on a fixed budget
Change in the execution time w.r.t. average node degree for Barabási–Albert scale free graphs using uniform distribution for weights. Solved for maximum damage based on a fixed budget

+6

Determining critical nodes in optimal cost attacks on networked infrastructures
  • Article
  • Full-text available

January 2024

·

80 Reads

·

3 Citations

Discover Internet of Things

·

Addison Clark

·

·

[...]

·

Alex Aved

A wide range of critical infrastructures are connected via wide area networks as well as the Internet-of-Thing (IoT). Apart from natural disasters, these infrastructures, providing services such as electricity, water, gas, and Internet, are vulnerable to terrorist attacks. Clearly, damages to these infrastructures can have dire consequences on economics, health services, security and safety, and various business sectors. An infrastructure network can be represented as a directed graph in which nodes and edges denote operation entities and dependencies between entities, respectively. A knowledgeable attacker who plans to harm the system would aim to use the minimum amount of effort, cost, or resources to yield the maximum amount of damage. Their best strategy would be to attack the most critical nodes of the infrastructure. From the defender’s side, the strategy would be to minimize the potential damage by investing resources in bolstering the security of the critical nodes. Thus, in the struggle between the attacker and defender, it becomes important for both the attacker and defender to identify which nodes are most critically significant to the system. Identifying critical nodes is a complex optimization problem. In this paper, we first present the problem model and then propose a solution for computing the optimal cost attack while considering the failure propagation. The proposed model represents one or multiple interconnected infrastructures. While considering the attack cost of each node, the proposed method computes the optimal attack that a rational attacker would make. Our problem model simulates one of two goals: maximizing the damage for a given attack budget or minimizing the cost for a given amount of damage. Our technique obtains solutions to optimize the objective functions by utilizing integer-linear programming while observing the constraints for each of the specified goals. The paper reports an extensive set of experiments using various graphs. The results show the efficacy of our technique in terms of its ability to obtain solutions with fast turnaround times.

Download

Technological Views for IoT for Sustainable Development

November 2023

·

4 Reads

Sustainable development is defined as meeting the needs of the present without compromising the ability of future generations to meet their needs. A sustainable approach aims to maintain a delicate balance between the current resource utilization and future requirements. This implies meeting developmental needs without harming the resources ecosystem. IoT is spearheading the technological transformation of the world and can play a very crucial role in achieving sustainable use of resources. In this chapter, we provide an overview of the challenges faced to achieve a sustainable world and highlight opportunities that the use of IoT offers for achieving sustainable development. We briefly cover sustainability, Sustainable Development Goals (SDGs) set forth by the United Nations, and IoT protocols and architectures. Next, we review various application of IoT in areas related to SDGs. Specifically, salient application areas covered include clean energy, healthcare, smart cities, climate action, food security, and some other selected applications. Finally, we briefly elaborate on a myriad of challenges in the use of IoT for sustainable development.


Touchless and nonverbal human-robot interfaces: An overview of the state-of-the-art

December 2022

·

41 Reads

·

2 Citations

Smart Health

Human-robot interfaces encompass developing technologies that determine how a user interacts with robot systems. Touchless and nonverbal interfaces are a subset of these in which the user can interact with robots without the use of buttons, speech, or other physical methods. The two driving forces behind the development of these methods are the desire for more natural Human-Robot Interaction (HRI) and the need for more efficacious assistive technologies. Many interface methods inspired by natural human interaction can improve HRIs. These include gaze/eye contact, emotion detection, and gesture recognition. Assistive robot systems can efficiently utilize these methods, as well as other interfaces that are uncommon in human interactions. These includes several unexplored methods such as biopotential signals, the electroencephalogram (EEG) being one example. Research is also underway in exploring the use of involuntary or subconscious signals in human interaction, such as lie detection or behavior analysis. This paper compiles research findings in several of these areas and discusses the benefits, limitations, and potential for future development in several essential touchless and nonverbal human-robot interface methods. This includes a discussion of Internet-of-Things (IoT) devices as they relate to how robot systems can gather information through the use of sensors. The paper also examines cognitive robots and explores possible advancements that can be explored in this area using next-generation mobile networking (5G and 6G) to allow for high data transfer rates, highlighting important information gathered by robots through different interfacing methods. This leads to several new avenues of future research.


Fall risk assessment and visualization through gait analysis

September 2022

·

63 Reads

·

4 Citations

Smart Health

Falls are a major health concern among elderly populations. There is a critical need to develop automated systems for assessing a patient's fall risk although the methodologies for determining this risk vary in efficacy, accessibility, and comfort. With advancements in smart home technol-ogy, aging in place and accurate fall risk assessment are no longer mutually exclusive. This paper presents a user friendly fall risk assessment system designed for care providers to non-invasively but continuously monitor their patient's risk of falling. The proposed system employs a pressure sensor-embedded floor - a SmartFloor - installed in the patient's home to monitor trends in gait pa-rameters like gait speed, stride length, and step width. The system should allow care providers to visualize dangerous changes to their patient's gait 24/7 and without disturbing the patient. How-ever, falls are few and far between, making it hard to evaluate how effective fall prediction systems are. To facilitate diagnoses and fall risk assessment, the system also reconstructs a skeletal visu-alization of each recorded walking segment. This is done using a motion similarity algorithm and a database of SmartFloor and Microsoft Kinect data. We tested the accuracy of several variations of the motion similarity algorithm using a small pool of seven participants and the results are presented in this paper.


An AI-based Approach for Improved Sign Language Recognition using Multiple Videos

February 2022

·

208 Reads

·

9 Citations

People with hearing and speaking disabilities face significant hurdles in communication. The knowledge of sign language can help mitigate these hurdles, but most people without disabilities, including relatives, friends, and care providers, cannot understand sign language. The availability of automated tools can allow people with disabilities and those around them to communicate ubiquitously and in a variety of situations with non-signers. There are currently two main approaches for recognizing sign language gestures. The first is a hardware-based approach, involving gloves or other hardware to track hand position and determine gestures. The second is a software-based approach, where a video is taken of the hands and gestures are classified using computer vision techniques. However, some hardware, such as a phone's internal sensor or a device worn on the arm to track muscle data, is less accurate, and wearing them can be cumbersome or uncomfortable. The software-based approach, on the other hand, is dependent on the lighting conditions and on the contrast between the hands and the background. We propose a hybrid approach that takes advantage of low-cost sensory hardware and combines it with a smart sign-recognition algorithm with the goal of developing a more efficient gesture recognition system. The Myo band-based approach using the Support Vector Machine method achieves an accuracy of only 49%. The software-based approach uses the Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) methods to train the Myo-based module and achieves an accuracy of over 80% in our experiments. Our method combines the two approaches and shows the potential for improvement. Our experiments are done with a dataset of nine gestures generated from multiple videos, each repeated five times for a total of 45 trials for both the software-based and hardware-based modules. Apart from showing the performance of each approach, our results show that with a more improved hardware module, the accuracy of the combined approach can be significantly improved.







Citations (9)


... The proposed algorithms require O(log(n)) time for convergence and O(δ(logn)) for Critical Node detection, n represents the number of IoT devices, and δ is the cost required to forward the message. Recently, Ishfaq et al. [29] have addressed the CNDP in an IoT network. They developed an efficient and minimalistic integer linear programming solution, designed to optimize the cost of an attack on the network. ...

Reference:

A Distributed Algorithm to Critical Node Identification in IoT Networks
Determining critical nodes in optimal cost attacks on networked infrastructures

Discover Internet of Things

... II. IMPORTANCIA DEL ANÁLISIS DE LA MARCHA HUMANA EN LA SALUD: VARIABLES ANALIZADAS, CONSIDERACIONES Y TECNOLOGÍAS DE CAPTURA El análisis de la marcha humana desempeña un papel crucial en la detección de problemas de salud vinculados a enfermedades neurológicas [7], [8], como el Parkinson [9], [10], la parálisis cerebral [11] y la esclerosis múltiple [12], entre otras; las cuales han demostrado influir en los patrones de marcha de las personas. También, se ha utilizado como herramienta para cuantificar el riesgo de caídas en adultos mayores, así como para optimizar el rendimiento deportivo [3], [13]- [16], Dentro de las múltiples variables analizadas en estudios de marcha humana, se encuentran: la velocidad de la marcha, la cadencia, la duración de las fases de apoyo y despegue, las fuerzas de reacción entre el pie y el suelo, la longitud y el ancho de paso; estos últimos haciendo referencia a la distancia entre los puntos de contacto de pies alternos con el suelo y la separación entre ambos pies, respectivamente [17]. Estas variables son objeto importante de estudio para identificar anomalías en la marcha. ...

Fall risk assessment and visualization through gait analysis
  • Citing Article
  • September 2022

Smart Health

... The results showed an outstanding overall accuracy of 90%. Nevertheless, other research that have compared the accuracy of SVM and K-NN using equivalent train and test data sizes have consistently demonstrated that K-NN generally exhibits a comparatively lower overall accuracy [101]. However, K-NN is advantageous due to its computational efficiency and ease of implementation. ...

An AI-based Approach for Improved Sign Language Recognition using Multiple Videos

... This section provides a brief overview of reviews in related research areas. A review of input modalities has been conducted by Clark and Ahmad (2021), who present eye tracking, computer vision and EEG approaches, emotion recognition, gestures, and lie detection. Advantages and challenges are presented along with an extensive literature review. ...

Interfacing with Robots without the use of Touch or Speech
  • Citing Conference Paper
  • June 2021

... There exist prior works that have modeled smart grid defense scenarios as a two player security game, and either directly solve for the Nash equilibrium or apply tabular Reinforcement Learning (RL) to learn approximate optimal strategies [10,11,12,14,15]. However, these methods are only applied at the scale of selecting a single target at a time from a set of no more than 50. ...

Maximizing Resilience under Defender Attacker Model in Heterogeneous Multi-Networks
  • Citing Conference Paper
  • June 2020

... For a human being to express their feelings and thoughts, collaborate with others, and contribute to the overall growth of society, communication is a necessary activity [1]. There is a difficulty in communication between members of deaf communities and the general population around the world [2,3], and there are few methods for making online material accessible to those who have hearing loss [4]. As a result, they face substantial obstacles to accessing education, work, and healthcare, and they require effective translation at a reasonable price in order to do so [5][6][7]. ...

Improving Sign Language Recognition by Combining Hardware and Software Techniques
  • Citing Conference Paper
  • June 2020

... Research by Kawaguchi et al. [11] present a fuzzybased predictive model for controlling a wheelchair in crowded environments allowing obstacle avoidance based on the prediction of behavior and other factors. In [12]- [20] authors describe various techniques, voice control, IoT, hand movements, movement of the head, blink-of-an-eye use of artificial intelligence, and other modes to control the movement of a wheelchair for easy navigation. ...

A Human-Computer Interface For Smart Wheelchair Control Using Forearm EMG Signals
  • Citing Conference Paper
  • June 2020

... In [5], four points were proposed which are activity area monitoring, physiological function, prevention of fall, and emergency assist. In [6], they are concerned with the risk of fall for the elderly patient and continuously monitoring them. The researchers in [7] introduced monitoring signal condition aware IoT enabled ECG system for continuous HCS, where two communication mechanisms had been applied using crypto primitives to ensure the privacy of the transmission. ...

Gait analysis and visualization in a fall risk assessment system
  • Citing Conference Paper
  • June 2020

... Additionally, to post photos and videos, smart canes such as the WeWalk's smart cane integrate cameras to recognize objects, faces, and text for audible identification [23]. Users can take photos by tapping the cane and share them on social sites. ...

Object detection and sensory feedback techniques in building smart cane for the visually impaired: an overview
  • Citing Conference Paper
  • June 2020