Trevor J. Bihl

Learn More
The proliferation of low-cost IEEE 802.15.4 ZigBee wireless devices in critical infrastructure applications presents security challenges. Network security commonly relies on bit-level credentials that are easily replicated and exploited by hackers. Unauthorized access can be mitigated by physical layer (PHY) security measures that exploit device-dependent(More)
The objective of this case study was to describe the neuropsychological rehabilitation of a 16-year-old patient who presented a Cerebellar Cognitive Affective Syndrome (CCAS) following a bilateral cerebellar hemorrhage. The patient presented severe and diffuse cognitive deficits, massive behavioral disorders, and emotion regulation difficulties. The(More)
INTRODUCTION Humans are naturally suited for recognizing and interpreting patterns; however, large and complex datasets, as in Big Data, preclude efficient human analysis. Computational pattern recognition encompasses means of describing, classifying, grouping, categorization, and/or clustering data (Jain, Duin, & Mao, 2000). Expanding on the concept of(More)
Qualia-based Exploitation of Sensing Technology (QuEST) is a dual process framework that leverages what is known about human neurophysiological and neuropsychological processes to create an artificial cognitive exoskeleton functioning similarly to the human mind. In this paper, we present a quick QuEST overview and a visionary approach using QuEST methods(More)