Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Ganapathy Mani
George Washington University
Washington, District of Columbia

Ganapathy Mani is a lecturer of computer science at the George Washington University, Washington, DC. His broad research interests are artificial intelligence, human-computer interaction, information management, and computational biology. He is currently conducting research on crowdsourcing, social computing, and privacy-security paradoxes in social networks. Ganapathy has a master’s degree in computer science from the George Washington University. He holds a bachelor’s degree in electronics and communication engineering from Anna University, India. He graduated with first class honors.

Previously, he worked as a research and software development engineer at the World Bank, where he developed a new integrated Internet and intranet architecture (I3), which interconnects open-source and proprietary products, to enhance the communication and collaboration of employees in the organization. Leveraging the proliferation of mobile phones to empower women in developing countries, Ganapathy, in collaboration with women’s self-help groups in India, has built an information service with micro-volunteering that can deliver vital information—educational and training opportunities—to women in remote impoverished villages in India.

As a researcher at the George Washington University, he worked on several big data management problems, including the development of fault-tolerant big data processing mechanisms using error-correcting codes. He also designed a new architecture and information flow model for surgical training with cloud computing and 3D web technologies. He built a model of the system using OpenGL and an intubation robot for generating a 3D simulation of a surgery, which is stored in the cloud and rendered through a webpage built using WebGL. It reduces the computation and storage cost while extending the service to doctors with a simple Internet connection. With these projects, Ganapathy has also developed protocols for detecting clone attacks and preventing data losses in mobile ad hoc networks.

Collaborating with the University of Medicine and Dentistry in New Jersey (UMDNJ), Ganapathy has developed an operational scheme of mental disorders in the framework of a big data computational model. As part of this project, he has developed interactive and adaptive virtual learning tools for treating autistic children. These projects and their findings have been published in international conferences as well as journals.

Apart from his research in computer science, Ganapathy has a keen research interest in physics and biology. He spends his spare time conducting research to find explanations for quantum entanglement, quantum gravity, variations in radioactive decay, and the movement of stars in galaxies. He also conducts biological research to find the disparities among gradual and punctual evolutionary theories in order to develop a generic evolutionary theory with both gradual and punctual evolution aided by epigenetics.


Big-data applications in the government sector
Kim G., Trimi S., Chung J.  Communications of the ACM 57(3): 78-85, 2014. Type: Article

Big data analysis is used in both public and private sectors. This article aims to differentiate between the uses of big data analytics in these sectors....


 Cross-domain sentiment classification using a sentiment sensitive thesaurus
Bollegala D., Weir D., Carroll J.  IEEE Transactions on Knowledge and Data Engineering 25(8): 1719-1731, 2013. Type: Article

Sentiment classification systems are vital for applications such as targeted and contextual advertising, market analysis, opinion mining, and so on. Sentiments are expressed on sites across the web, from online shopping to movie reviews. Using...


Target to sensor allocation: a hierarchical dynamic distributed constraint optimization approach
Hosseini Semnani S., Basir O.  Computer Communications 36(9): 1024-1038, 2013. Type: Article

Target to sensor allocation means finding trajectories of targets moving over the sensing field and assigning sensors based on them. This is one of the important issues in fields such as military operations, surveillance, biodiversity research...


Network formation in the presence of contagious risk
Blume L., Easley D., Kleinberg J., Kleinberg R., Tardos É.  ACM Transactions on Economics and Computation 1(2): 1-20, 2013. Type: Article

All interconnected networks may reap the benefits of neighboring nodes. But these complex networks, some of which have millions of nodes and edges, risk failure due to a very few compromised or flawed nodes. For example, replica attacks in mobile ...


Analyzing user-generated YouTube videos to understand touchscreen use by people with motor impairments
Anthony L., Kim Y., Findlater L.  CHI 2013 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 1223-1232, 2013. Type: Proceedings

People with disabilities face considerable challenges when using touchscreens. The authors of this paper investigate how well touchscreen devices work out of the box, evaluating the extent to which they affect interaction and how disabled users...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2014 ThinkLoud, Inc.
Terms of Use
| Privacy Policy