Match!
Trevor J. Bihl
Air Force Institute of Technology
39Publications
5H-index
89Citations
Publications 39
Newest
#1Jeffrey B. Travers (Wright State University)H-Index: 37
#2Chien Poon (Wright State University)H-Index: 2
Last.Heidi B. Donnelly (Wright State University)H-Index: 4
view all 22 authors...
We investigated the change in optical properties and vascular parameters to characterize skin tissue from mild photodamage to actinic keratosis (AK) with comparison to a published photodamage scale. Multi-wavelength spatial frequency domain imaging (SFDI) measurements were performed on the dorsal forearms of 55 adult subjects with various amounts of photodamage. Dermatologists rated the levels of photodamage based upon the photographs in blinded fashion to allow comparison with SFDI data. For ch...
2019 in AAAI (National Conference on Artificial Intelligence)
#1Trevor J. Bihl (AFRL: Air Force Research Laboratory)H-Index: 5
#2Todd Jenkins (AFRL: Air Force Research Laboratory)H-Index: 2
view all 0 authors...
#1Robert J Gutierrez (AFIT: Air Force Institute of Technology)
#2Kenneth W. Bauer (AFIT: Air Force Institute of Technology)H-Index: 14
Last.Trevor J. Bihl (AFRL: Air Force Research Laboratory)H-Index: 5
view all 5 authors...
Firewalls, especially at large organizations, process high velocity internet traffic and flag suspicious events and activities. Flagged events can be benign, such as misconfigured routers, or malignant, such as a hacker trying to gain access to a specific computer. Confounding this is that flagged events are not always obvious in their danger and the high velocity nature of the problem. Current work in firewall log analysis is manual intensive and involves manpower hours to find events to invest...
#1Harris K Butler (AFIT: Air Force Institute of Technology)
#2Mark A. Friend (AFIT: Air Force Institute of Technology)H-Index: 2
Last.Trevor J. Bihl (AFIT: Air Force Institute of Technology)H-Index: 5
view all 4 authors...
In classification applications, the goal of fusion techniques is to exploit complementary approaches and merge the information provided by these methods to provide a solution superior than any single method. Associated with choosing a methodology to fuse pattern recognition algorithms is the choice of algorithm or algorithms to fuse. Historically, classifier ensemble accuracy has been used to select which pattern recognition algorithms are included in a multiple classifier system. More recently,...
#1DeVante Moore (MSU: Mississippi State University)
#2Trevor J. Bihl (AFRL: Air Force Research Laboratory)H-Index: 5
Last.Christopher Archibald (MSU: Mississippi State University)H-Index: 5
view all 4 authors...
In planning operations involving searching all nodes in a networks, one is interested in determining an optimal search. Optimal searches aim to use all available agents to find the quickest allocations and paths to search all nodes. However, problems arise when an agent is dropped during the search process; for example in a search and rescue mission an Unmanned Aerial Vehicle (UAV) might be tasked to stay at a location after finding survivors while the remaining agents search the rest of the map...
#1Trevor J. Bihl (AFRL: Air Force Research Laboratory)H-Index: 5
Last.Todd Jenkins (AFRL: Air Force Research Laboratory)H-Index: 2
view all 3 authors...
Autonomous machines promise to reduce the workload of human operators by replacing some or all cognitive functions with intelligent software. However, development is retarded by disagreement among researchers at very basic levels, including what is meant by autonomy and how to achieve it. Clear definitions are few and no one has successfully bridged the gap between philosophical notions and engineering methods. A variety of autonomy measures are reviewed, highlighting their strengths and weaknes...
12345