Nikolaos G. Bourbakis's research while affiliated with Wright State University and other places

Publications (260)

Article
The technical document is an entity that consists of several essential and interconnected parts, often referred to as modalities. Despite the extensive attention that certain modalities have already received, say per the textual information, there are several aspects that get disproportional attention throughout the bibliography. An instance of suc...
Article
The holistic understanding of the information contained in technical documents depends on the understanding of the document’s individual modalities. These modalities are tables, graphics, diagrams, formulas, etc. and each of them is a standalone research topic that requires a different way of processing and understanding. These modalities, processe...
Article
This paper presents a formal generalized stochastic Petri net (GSPN)–based modeling of a virtual doctor (VDr) dialogue system. The interaction model between the VDr dialogue system and the human patient is a modified version of the Wickens model. The purpose of this model is to provide a better understanding of the interaction between the VDr dialo...
Chapter
The direct medical costs for falls only—what patients and insurance companies pay—was $34 billion [Center for Disease Control and Prevention, 2013]. The necessity for continuous monitoring and assisting of persons in risk, and the increasing prevalence of chronic conditions among our aging population present great challenges to our healthcare syste...
Chapter
A fundamental priority of modern societies is to provide assistance to vulnerable people, including elderly people, people with cognitive disabilities, such as memory problems or dementia, and people with functional disabilities, such as those needing support in toileting, moving around, eating, bathing, dressing, grooming and taking personal care....
Chapter
Lately smart shoes have also become a kind of a fashion for the general public and athletes. However, leggs and feet diseases are more common problems among elderly people as time progresses and to those with certain feet disabilities [1], so smart shoes may offer some comfort to their situation. In particular people with osteoarthritis suffer for...
Chapter
Recognition and understanding human activity is a challenging research topic for the last 30 years with significant advances, but with major open problems to be solved. Researchers have proposed a variety of advanced methodologies by approaching this interesting topic from a single direction. By saying a single direction we mean using either formal...
Article
Recent modeling of brain activities encompasses the fusion of different modalities. However, fusing brain modalities requires not only the efficient and compatible representation of the signals but also the benefits associated with them. For instance, the combination of the functional characteristics of EEGs with the structural features of function...
Article
Humans are capable of understanding the knowledge that is included in technical documents automatically by consciously combining the information that is presented in the document’s individual modalities. These modalities are mathematical formulas, charts, tables, diagram images and etc. In this paper, we significantly enhance a previously presented...
Article
Humans have the privilege to automatically have a deep understanding of technical documents, since they have the ability to deal with complex concepts coming from many different modalities, like diagrams, text, tables, formulas, graphics, pictures, etc. For many years researchers are working to transfer such potential to AI based machines. This pap...
Article
The automatic deep understanding of technical documents is a privilege only to humans so far, since it requires knowledge coming from many different modalities, like text, diagrams, formulas, tables, graphics, pictures, etc. Thus, in response to this very large and complex challenge, this paper investigates the synergistic association of only two m...
Article
Curve and surface-fitting are classic problems of approximation that find use in many fields, including computer vision. There are two broad approaches to the problem — interpolation, which seeks to fit points exactly, and regression, which seeks a rougher approximation which is more robust to noise. This survey looks at several techniques of both...
Article
In the last few decades the medical and healthcare scientific communities have focused their attention on the use or development of real-time monitoring devices and remote control systems. New generations of wearable, portable, and implantable devices offer better and more accurate measurements/prognosis for those that suffer from diseases and/or d...
Article
A Technical Document (TD) is mainly composed by a set of modalities appropriately structured and associated. These modalities could be NL-text, block diagrams, formulas, tables, graphics, pictures etc. A deep understanding of a TD will be based on the synergistic understanding and associations of these modalities. This paper offers a novel methodol...
Article
The pieces of information that are being collected from regions of disaster is critical as the rapid deployment of the first responders rely on them. Another critical part of that deployment is the acquisition of different types of information (visual, sounds, and others). Even with that information the rescuing teams still face the difficult task...
Article
Within this paper, we present two neural nets for view-independent complex human activity recognition (HAR) from video frames. For our study here, we reduce the number of frames produced by a video sequence given that we can identify activities from a sparsely sampled sequence of body poses, and, at the same time, we are able to reduce the processi...
Article
Full-text available
The current incremental need for immediate responses (real-time) on many medical emergencies is necessity for an advanced society. In many cases, people who are living in rural areas need a critical, for their healthy, commuting time to a Medical Center (Hospital). In addition, human physicians have limited capability for offering their services to...
Conference Paper
Full-text available
Humans are used to express their feelings of self-confidence/powerfulness or their distress/sadness through either expansive postures that occupy as much space as possible or closing postures occupying as less space as possible to avoid contact. This conduct suggests that feelings of self-confidence/powerfulness or distress/sadness change our body...
Conference Paper
Full-text available
This work investigates disparities between children and middle aged adults in their ability to decode the six primary facial expressions of emotions when portrayed by contemporary children and adult faces. The analyses were conducted on a sample of 40 (20 females) very closely aged children (mean age=7.4; SD=±0.2), and 40 middle aged (mean age=54.3...
Conference Paper
Full-text available
This work investigates disparities between children and middle aged adults in their ability to decode the six primary facial expressions of emotions when portrayed by contemporary children and adult faces. The analyses were conducted on a sample of 40 (20 females) very closely aged children (mean age=7.4; SD=±0.2), and 40 middle aged (mean age=54.3...
Chapter
Full-text available
This paper is positioned inside a research project investigating elders’ preferences and acceptance toward robots, in order to collect insights for the design and implementation of socially assistive robots. To this aim, short video clips of five manufactured robots (Roomba, Nao, Pepper, Ishiguro, and Erica) were shown to 100 seniors (50 Female) ag...
Article
The vision of smart cities has emerged from the integration of advances in information technologies to a city's infrastructures and assets. The use of information will improve the daily operations, and lead to greener, safer, and more human friendly cities. The most preeminent city asset is the electrical power grid, upon which the modernization of...
Conference Paper
Full-text available
Humans are used to express their feelings of self-confidence/powerfulness or their distress/sadness through either expansive postures that occupy as much space as possible or closing postures occupying as less space as possible to avoid contact. This conduct suggests that feelings of self-confidence/powerfulness or distress/sadness change our body...
Article
The human cerebellum contains almost fifty percent of the neurons in the brain, although its volume does not exceed ten percent of the total brain volume. The ultimate goal of this study is to derive the functional network of the cerebellum during resting-state and then compare the ensuing group networks between males and females. Towards this dire...
Article
Natural Language Understanding (NLU) is an old and really challenging field with a variety of research work published on it. In this paper we present a formal language methodology based on a state machine for efficiently representing natural language events/actions and their associations in well-written documents. The methodology consists of the fo...
Chapter
A surveillance system for assisting the elderly in remaining independent in their familiar environment is one of the subjects interest in recent healthcare studies. When mature, it is expected that this system will have the ability to track objects that a resident may lose periodically, detect falls within the home, alert family members or healthca...
Article
In a world where technological achievements and breakthroughs are astonishing and where computers and all kinds of electronic devices have become one with their users, there are still people that need assistance. This type of aid often has to come through technology and the implementation of ideas. People with disabilities and the elderly usually r...
Article
The main idea of this paper is to provide an insight to the reader and create awareness on some of the basic Curve Fitting techniques that have evolved and existed over the past few decades. A critical survey has been done on the various Curve Fitting methodologies proposed by various Mathematicians and Researchers who had been working in the field...
Article
Page layout analysis and the creation of an XML document from a document image are useful for many applications including the preservation of archived documents, robust electronic access to printed documents, and access to print materials by the visually impaired. In this paper, the authors describe a document image process pipeline comprised of te...
Conference Paper
Reverse Engineering has gained great importance over time and is directed towards many fields. In this paper, a survey of reverse engineering of electronic or digital systems is presented. After providing a classification and a summarization of the research associated with this field, a maturity metric is presented to highlight weaknesses and stren...
Conference Paper
Dialogue systems are computer systems that communicate with a human in spoken or written form. Their popularity has increased in recent years and they attract a large research and development interest. In this paper, a survey on dialogue systems is presented. A classification scheme is proposed and then the reviewed methodologies are evaluated base...
Article
We present a novel synergistic methodology for the spatio-temporal analysis of single Electroencephalogram (EEG) trials. This new methodology is based on the novel synergy of Local Global Graph (LG graph) to characterize define the structural features of the EEG topography as a global descriptor for robust comparison of dominant topographies (micro...
Conference Paper
In smart power distribution systems price forecasting is an indispensable participant tool for developing purchase strategies. This paper places itself in price directed power systems, where participants respond with their load demand to incoming price signals. To that end, a two hour-ahead forecasting method using a linear composition of kernel ma...
Article
Combining information from Electroencephalography (EEG) and Functional Magnetic Resonance Imaging (fMRI) has been a topic of increased interest recently. The main advantage of the EEG is its high temporal resolution, in the scale of milliseconds, while the main advantage of fMRI is the detection of functional activity with good spatial resolution....
Article
Full-text available
Presents a summary of the articles included in this issue of the publication that focus on haptic assistive technology for people that are visually impaired.
Article
DIAS is a distributed, multiprocessor picture information system architecture. It consists of four main cooperating parts (Input-Preprocessing; Planning-Control; Image Processing/Analysis/Understanding; Backend). The performance of the DIAS system is mainly based on the performance of the Image Processing/Analysis/Understanding (IA) section, which...
Article
Wireless Sensor Networks (WSN) have been widely applied in monitoring and surveillance fields in recent years and have dramatically changed the methodologies and technologies in monitoring and surveillance. However, the sensor nodes in WSN have very limited computing resources and power supply, and thus the maximization of network life is a very cr...
Conference Paper
This research study here deals with the development of an Intelligent Robotic Chair (IRC) based on an appropriately modified wheelchair (Nosokoma) for assisting people at need. The main use of this IRC will be for paraplegic people, people with disabilities and the elderly. It will assist them to move inside their home by transferring them in vario...
Article
Segmentation of human bodies in images is a challenging task that can facilitate numerous applications, like scene understanding and activity recognition. In order to cope with the highly dimensional pose space, scene complexity, and various human appearances, the majority of existing works require computationally complex training and template matc...
Conference Paper
In today's digital world the information exchange has reached very large volumes per minute, assisting people in doing their business from long distances, without their presence being necessary. At the same time, Human Machine Interaction (HMI) devices are used in many places of service and interaction by removing humans from the loop. Although the...
Conference Paper
In this paper, we investigate robotic wheelchairs mounted with robotic arms. Several projects have been studied and analyzed. The abilities of these wheelchairs vary from simple orders as door opening to more complex as lifting objects from the ground. With the aging of the society, the demand for human-interactive robotic wheelchairs that can help...
Article
Price-directed demand in smart grids operating within deregulated electricity markets calls for real-time forecasting of the price of electricity for the purpose of scheduling demand at the nodal level (e.g., appliances, machines, and devices) in a way that minimizes energy cost to the consumer. In this paper, a novel hybrid methodology for electri...
Article
This paper presents the design, performance analysis, security evaluation and the extended instruction set architecture (ISA) of the SCAN secure processor (SCAN-SP). The SCAN-SP is security enhanced SparcV8 processor architecture with an extended ISA to interface with an off-chip FPGA co-processor to handle lossless image compression, encryption an...
Article
In this paper we present a novel method for describing the EEG as a sequence of topographies, based on the notion of microstates. We use Hidden Markov Models (HMM) to model the temporal evolution of the topography of the average Event Related Potential (ERP) and we calculate the Fisher score of the sequence by taking the gradient of the trained mod...
Article
In the present paper we have focused our efforts in de-noising/despeckling methods for ultrasound images based on a novel multi - transducer architecture. Frequency compounding schemes have been implemented and tested in two different images and the results are compared with the state of the art software based methods for ultrasound image despeckli...
Article
A surveillance system for assisting the elderly in remaining independent in their familiar environment is one of the subjects interest in recent healthcare studies. When mature, it is expected that this system will have the ability to track objects that a resident may lose periodically, detect falls within the home, alert family members or healthca...
Article
This paper offers a review of the state-of-the-art document image processing methods and their classification by identifying new trends for automatic document processing and understanding. Document image processing (DIP) is an important problem related with most of the challenges coming from the image processing field and with applications to digit...
Article
Memory errors have long been a critical security issue primarily for C/C++ programming languages and are still considered one of the top three most dangerous software errors according to the MITRE ranking. In this paper the authors focus on their exploitation via control-flow hijacking and data-only attacks stack, and partially heap G. Novarck & E....
Article
In today's dynamic network environments like smart cities, information evolves in distributed resources and in different forms or modalities. An agent or a system that wants to be actively part of this evolution has to be interactive, adaptive, autonomous and intelligent. The paper presents a new version of a distributed model-framework called Demo...
Article
In today's dynamic network environments like smart cities, information evolves in distributed resources and in different forms or modalities. An agent or a system that wants to be actively part of this evolution has to be interactive, adaptive, autonomous and intelligent. The paper presents a new version of a distributed model-framework (called Dem...
Chapter
Digital security has always been an important concern in computer systems with the advent of the Internet, sharing of information and services between distant points never being easier before. Threats to security in computer systems can be classified into four broad categories: interception, interruption, modification, and fabrication. This chapter...
Chapter
This chapter offers a survey of wireless capsule endoscopy (WCE) and endoscopic imaging by evaluating some representative methodologies as well as that WCE technology is also used in colonoscopy. The detection of various organs inside the digestive tract is an important tool for the physician. The chapter presents challenges related to the WCE appr...
Article
In this work we present a methodology for modeling the trajectory of EEG topography over time, using Dynamic Bayesian Networks (DBNs). Based on the microstate model we are using DBNs to model the evolution of the EEG topography. Analysis of the microstate model is being usually limited in the wide band signal or an isolated band. We are using Coupl...
Conference Paper
The general field of health monitoring and health information exchange has garnered a keen research and market interest for the past few decades. This is indicated by the development of a plethora of wearable health monitoring systems, as well as research efforts and projects concerning the security issues in health information exchange. In this pa...
Conference Paper
In this paper a new approach for electricity consumption scheduling for smart grids/cities in price-directed electricity markets is presented. The new approach, named virtual cost, integrates electricity price forecasting and load forecasting to obtain an optimal consumption pattern. The goal of virtual cost approach is to provide the springboard f...
Conference Paper
Security has always been an important concern in Computer Systems. In this paper we focus on zero-day, memory-based attacks, one of the top three most dangerous attacks according to the MITRE ranking, and propose AMYNA, a novel security generator framework/model., which can automatically create personalized optimum security solutions. Motivated by...
Article
Full-text available
Applying engineering precepts to biological systems has spawn the field of systems biology to investigate a network of interacting components, including the coordination of internal systems of living organisms such as endocrine, nervous, and respiratory with gene and gene product expression, and behavior and environmental factors, and understand ho...
Article
This survey and analysis presents the functional components, performance, and maturity of graph-based methods for natural language processing and natural language understanding and their potential for mature products. Resulting capabilities from the methods surveyed include summarization, text entailment, redundancy reduction, similarity measure, w...
Article
The development of vision-based human activity recognition and analysis systems has been a matter of great interest to both the research community and practitioners during the last 20 years. Traditional methods that require a human operator watching raw video streams are nowadays deemed as at least ineffective and expensive. New, smart solutions in...
Conference Paper
The topography of the electrical field does not vary randomly with time but rather displays short periods of stable topographical configurations or spatial patterns, known as microstates. The search of such patterns takes place in the high dimensional electrode space with all the problems that comes with it. In this paper, we present a technique fo...
Conference Paper
Ultrasound imaging (USI) or Medical Sonography (MS) as it is formally called is widely used in biomedical applications over the last decades. Form the Intensive Care Unit minimally invasive monitoring to the recent point of care testing besides the patient's bed. US imaging outcomes can provide clinicians with a thorough view of the internal parts...
Conference Paper
Detection of hands in single, unconstrained, monocular images is a very difficult task. Localization and extraction of the hand regions, however, provides important and useful knowledge that can facilitate many other tasks, such as gesture recognition, pose estimation and action recognition. In this paper we present a simple appearance-based method...
Conference Paper
In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no...
Conference Paper
This paper presents a hardware architecture scheme that implements the local-global (LG) graph methodology. The LG graph method has the capability to efficiently represent the context of a segmented image and hold its structure independent to rotation, translation and scaling. The LG graph method has been successfully used on object/pattern recogni...
Conference Paper
Extraction of the human body in single, unconstrained, monocular images is a very difficult task. Localization and extraction of the body region, however, provides important and useful knowledge that can facilitate many other tasks, such as gesture recognition, pose estimation and action recognition. In this paper we present a simple appearance-bas...
Article
Offering an alternative mode of interaction with the surrounding 3-D space to the visually impaired for collision free navigation is a goal of great significance that includes several key challenges. In this paper, we study the alternative 3-D space sensation that is interpreted by our computer vision prototype system and transferred to the user vi...
Article
Detecting faces and facial expressions has become a common task in human-computer interaction systems. A face-facial detection system must be able to detect faces under various conditions and extract their facial expressions. Many approaches for face detection have been proposed in the literature mainly dealing with the detection or recognition of...
Article
Ultrasound imaging (USI) or Medical Sonography (MS) as it is formally called is widely used in biomedical applications over the last decades. Form the Intensive Care Unit (ICU) minimally invasive monitoring to the recent point of care testing besides the patient's bed. US imaging outcomes can provide clinicians with a thorough view of the internal...
Article
Research into eyes-free mobile reading devices has grown in recent years. This research has focused mainly on the image processing required by such a device, with a lower emphasis on the user interaction. In this paper, a model of a voice user interface (VUI) for a mobile reading device is presented. Three field studies with blind participants were...

Citations

... The focus of this paper is to understand the internal knowledge embedded into an image of a document table in order to enhance existing content-based document retrieval techniques. Complementary and at the same time independent research has been done for the recognition and the deep understanding of associated charts 39 and diagram images 40 in documents. The research of a synergistic combination for the information extracted from the aforementioned document modalities and the extracted document text constitute future expansions of the current work. ...
... The focus of this paper is to understand the internal knowledge embedded into an image of a document table in order to enhance existing content-based document retrieval techniques. Complementary and at the same time independent research has been done for the recognition and the deep understanding of associated charts 39 and diagram images 40 in documents. The research of a synergistic combination for the information extracted from the aforementioned document modalities and the extracted document text constitute future expansions of the current work. ...
... They represent the retrieved information with attributed and Stochastic Petri-net graphs. Figure 1 illustrates the general diagram of the overall technical document understanding methodology concerning the text [15], diagram [3], graphics and table [1] modalities. An attributed Local Global graph can showcase the structural features of a given diagram. ...
... MantisTable implements two modern approaches (T2Dv2 and Limaye200) and compares with a baseline method that uses different annotation steps for concepts, data types, and predicates. Finally, a large number of works have appeared recently in connection with the strengthening of the role of machine learning in solving various problems of semantic modeling [31][32][33][34][35][36][37]. These works demonstrate high-level results but require a large amount of training data. ...
... Although input weights do not significantly affect the efficiency of the KELM model, randomly determined input weights and implied layer bias are likely to fail to produce optimal output weights due to the high randomness of the behavioral analysis results [69]. In the standard KELM algorithm, when the input weights and biases cannot be updated, it is very easy to generate local optimization problems, which will reduce the generalization ability of the model [70]. 4. MTS816 rock testing system, where 1 represents Hydraulic control system, 2 represents Triaxial experimental platform, 3 represents Control cabinet, 4 represents Data acquisition system, 5 represents Hydraulic oil, 6 represents Confining pressure cavity, 7 represents Positioning rod, 8 represents Sensor interface, 9 represents Loading device, 10 represents Specimen, 11 represents Ring extensometer. ...
... From the World Health Organization (WHO), 17.9 million people worldwide die each year from heart disease [3]. The most significant behavioral risk factors for CD and stroke include age, sex, poor eating, sedentary lifestyle, cigarette smoking, and problematic alcohol use [5]. As a result of behavioral risk factors, people may have increased blood pressure, blood glucose, or blood lipids [4]. ...
... Consequently, the joint parts that are mostly affected by OA are the knee, hip, and shoulder, being also detected in the hands, feet, and spine (typically at the neck or lower back) [2]. As the disease progresses, the constant "wear and tear" promoted by the body locomotion results finally in "bone against bone" grinding, exposing these tissues to the highest stress, inflammations, loss of proprioception, and extreme pain [3,4]. In fact, pain is the main symptom of this disease, being the most frequent reason why the patient seeks medical care. ...
... For starters, the user cannot remain in the room! New innovations in probe technology such as flexible transducers, wearable probes [8] and capacitive micromachined transducers [9] made from low atomic number material are far more suited to the radiotherapy environment. User dependence is already being tackled in the diagnostic setting with the use of machine learning to automate image interpretation and registration. ...
... In a similar approach, Xu, Qi et al. try to identify sensitive information within unstructured text by utilizing convolutional neural networks [10]. Lastly, Bourbakis and Mertoguno propose a holistic approach for analyzing technical documents with modality mapping [11]. Weston et al used NER for identifying inorganic material mentions, sample descriptors, phase labels, material properties and applications from materials science documents [12]. ...
... The task of search and rescue during disasters was presented by Bourbakis and Ktistakis [5] presented Tzitziki, a system that is designed to extract visual and audio signals of the presence of people under destroyed buildings or inside ground cavities. Smart farming was discussed by Behjati et al. [4], where the authors integrated drones, low-power wide-area networks, and IoT technologies to develop an aerial-based system that can monitor farms' water supply, collect data on large-scale farms, and optimize drone flight paths. ...