The lab specializes in designing and developing algorithms and technologies geared towards improving the ability of both software systems and hardware components to perform autonomously in real time environments. Integration of both hardware and software components to create autonomous artifacts that can operate under different size, weight, power and time constraints is also a major thrust in the lab. Research in the lab fall under the broad fields of artificial intelligence, robotics, machine learning and artificial cognition — including data mining, image processing, bioinformatics, natural language understanding, time-series analysis, knowledge representation, common sense reasoning, metacognition and sensor data integration.
The focus in this lab is on systems, software and equipment used in graphic related research like 2D, and 3D rendering. Methods for detecting and analyzing facial expressions and affect gestures for system recognition. Realistic emotion and gesture synthesis for an anthropomorphic agent through computer graphics. Computer animation and simulation, human-computer interaction, and video image processing.
LIISA: Laboratory for Information and Infrastructure Security and Assurance:
The Laboratory for Information and Infrastructure Security and Assurance (LIISA) provides students with state-of-the-technology equipment and software to both attack and defend target computer networks in a secure environment that is not connected to the Internet and isolated from the campus computer network. The network consists of three policy domains—Attack, Target, and Administrative/Research.
The attack domain (never connected to the Internet) will support commonly used operating systems. The stations in the attack domain use emulators such as VMware to simulate a variety of operating systems on a single computer. This domain allows students to exploit the vulnerabilities of the target domain. The target domain includes/supports Windows systems, Linux, Solaris, and operating systems for mobile devices, such as the Apple iOS and the Google Android. To prevent eavesdropping on traffic by attackers, all the traffic in the target domain is packet-switched.
The administrative/research domain will monitor traffic between the attack and target domains in real-time. Network isolation is a fundamental requirement for this lab to prevent undesirable consequences while studying security topics such as worms, viruses, and Trojan horses.
In this lab, research focuses on Cyber security risk management and the latest equipment and tools used in cyber security trends and practices. Encryption/Decryption technologies are explored as well as software and operating system security.
Virtual Reality Laboratory consists of the VR Software Laboratory and the VR Hardware Laboratory in the Computer Science Building. The VR Hardware Lab is equipped with current state of art equipment which includes high quality stereoscopic displays (Corner Cave, 3D Wall), motion trackers, Head mounted displays (nVisor SX111, Z800 Dual Pro, Oculus Rift, HTC Vive), 3D input devices (Cyber gloves III, 5DT Data glove), and force feedback devices. The VR Software Lab is equipped with high quality 3D graphics workstations (Alien ware 3D Gaming Desktops). Our current research projects focus in areas of Virtual Reality (VR), Augmented Reality (AR), and Software Engineering (SE). The students and faculty are pioneering the use of VR technology in areas such as evacuation simulation, way finding, battlefield simulation, emergency response, multi-user virtual environment (MUVE), VR instructional modules, mobile augmented reality application (MARA), and VR classroom environment. The lab has conducted virtual evacuation drills in collaborative virtual environments (CVE) for immersive and non-immersive environments.
Collaborative Virtual Reality Environment (CVE) Real-time Emergency Evacuation of Kiss Nightclub Fire at Santa Maria, Brazil
Emergency preparedness is achieved by planning, training, equipping, and exercising the emergency response. The preparation and training for emergency events is critically important for safety in our day to day lives. We can learn a lot from previous disasters which are valuable for accuracy in decision making strategies. The CVE platform acts as a training and educational tool by exploring the environment in Virtual Reality. Read full research here
Click Topic to Read Article