|
|
|
|
|
Mani, Ganapathy
George Washington University
Washington, District of Columbia
|
|
|
|
|
|
|
| Ganapathy Mani is a lecturer of computer science at the George Washington University, Washington, DC. His broad research interests are artificial intelligence, human-computer interaction, information management, and computational biology. He is currently conducting research on crowdsourcing, social computing, and privacy-security paradoxes in social networks. Ganapathy has a master’s degree in computer science from the George Washington University. He holds a bachelor’s degree in electronics and communication engineering from Anna University, India. He graduated with first class honors. Previously, he worked as a research and software development engineer at the World Bank, where he developed a new integrated Internet and intranet architecture (I3), which interconnects open-source and proprietary products, to enhance the communication and collaboration of employees in the organization. Leveraging the proliferation of mobile phones to empower women in developing countries, Ganapathy, in collaboration with women’s self-help groups in India, has built an information service with micro-volunteering that can deliver vital information—educational and training opportunities—to women in remote impoverished villages in India. As a researcher at the George Washington University, he worked on several big data management problems, including the development of fault-tolerant big data processing mechanisms using error-correcting codes. He also designed a new architecture and information flow model for surgical training with cloud computing and 3D web technologies. He built a model of the system using OpenGL and an intubation robot for generating a 3D simulation of a surgery, which is stored in the cloud and rendered through a webpage built using WebGL. It reduces the computation and storage cost while extending the service to doctors with a simple Internet connection. With these projects, Ganapathy has also developed protocols for detecting clone attacks and preventing data losses in mobile ad hoc networks. Collaborating with the University of Medicine and Dentistry in New Jersey (UMDNJ), Ganapathy has developed an operational scheme of mental disorders in the framework of a big data computational model. As part of this project, he has developed interactive and adaptive virtual learning tools for treating autistic children. These projects and their findings have been published in international conferences as well as journals. Apart from his research in computer science, Ganapathy has a keen research interest in physics and biology. He spends his spare time conducting research to find explanations for quantum entanglement, quantum gravity, variations in radioactive decay, and the movement of stars in galaxies. He also conducts biological research to find the disparities among gradual and punctual evolutionary theories in order to develop a generic evolutionary theory with both gradual and punctual evolution aided by epigenetics. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 10
reviews
|
|
|
|
|
|
|
|
Big-data applications in the government sector Kim G., Trimi S., Chung J. Communications of the ACM 57(3): 78-85, 2014. Type: Article
Big data analysis is used in both public and private sectors. This article aims to differentiate between the uses of big data analytics in these sectors....
|
Jun 2 2014 |
|
|
|
|
|
|
Toward a social-technological system that inactivates false rumors through the critical thinking of crowds Tanaka Y., Sakamoto Y., Matsuka T. HICSS 2013 (Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Maui, HI, Jan 7-10, 2013) 649-658, 2013. Type: Proceedings
Mass media, the Internet in particular, often spreads false rumors and claims before they can be verified or critiqued by experts. These rumors can cause significant harm during violent events such as natural disasters. This paper pres...
|
May 29 2014 |
|
|
|
|
|
|
Beliefs and biases in web search White R. SIGIR 2013 (Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval, Dublin, Ireland, Jul 28-Aug 1, 2013) 3-12, 2013. Type: Proceedings
It is a fact widely accepted by psychologists that people’s judgments are influenced by their beliefs and unconscious biases. Although companies that provide Internet-related services excel in tracking user behavior online, l...
|
Mar 25 2014 |
|
|
|
|
|
|
Paper generators: harvesting energy from touching, rubbing and sliding Karagozler M., Poupyrev I., Fedder G., Suzuki Y. UIST 2013 (Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology, St. Andrews, Scotland, UK, Oct 8-11, 2013) 23-30, 2013. Type: Proceedings
Paper generators are novel, paper-like energy-harvesting structures that generate energy through user gestures such as sliding, tapping, rubbing, and touching. Most importantly, these paper generators are built with electrets, which ar...
|
Mar 10 2014 |
|
|
|
|
|
|
Analyzing user-generated YouTube videos to understand touchscreen use by people with motor impairments Anthony L., Kim Y., Findlater L. CHI 2013 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 1223-1232, 2013. Type: Proceedings
People with disabilities face considerable challenges when using touchscreens. The authors of this paper investigate how well touchscreen devices work out of the box, evaluating the extent to which they affect interaction and how disab...
|
Dec 20 2013 |
|
|
|
|
|
|
Network formation in the presence of contagious risk Blume L., Easley D., Kleinberg J., Kleinberg R., Tardos É. ACM Transactions on Economics and Computation 1(2): 1-20, 2013. Type: Article
All interconnected networks may reap the benefits of neighboring nodes. But these complex networks, some of which have millions of nodes and edges, risk failure due to a very few compromised or flawed nodes. For example, replica attack...
|
Nov 7 2013 |
|
|
|
|
|
|
Cross-domain sentiment classification using a sentiment sensitive thesaurus Bollegala D., Weir D., Carroll J. IEEE Transactions on Knowledge and Data Engineering 25(8): 1719-1731, 2013. Type: Article
Sentiment classification systems are vital for applications such as targeted and contextual advertising, market analysis, opinion mining, and so on. Sentiments are expressed on sites across the web, from online shopping to movie review...
|
Sep 24 2013 |
|
|
|
|
|
|
Is simplicity the key to engagement for children on the autism spectrum? Keay-Bright W., Howarth I. Personal and Ubiquitous Computing 16(2): 129-141, 2012. Type: Article
Children with autism have difficulties with social interaction, communication (verbal and nonverbal), behavior, and interests. Computer technologies (like video games and virtual reality) are widely used in treating children with autis...
|
Aug 8 2013 |
|
|
|
|
|
|
Target to sensor allocation: a hierarchical dynamic distributed constraint optimization approach Hosseini Semnani S., Basir O. Computer Communications 36(9): 1024-1038, 2013. Type: Article
Target to sensor allocation means finding trajectories of targets moving over the sensing field and assigning sensors based on them. This is one of the important issues in fields such as military operations, surveillance, biodiversity ...
|
Jul 15 2013 |
|
|
|
|
|
|
The complexity of the list homomorphism problem for graphs Egri L., Krokhin A., Larose B., Tesson P. Theory of Computing Systems 51(2): 143-178, 2012. Type: Article
Homomorphisms are very useful in combinatorial problems in mapping and assignments. Homomorphism problems involve greater modeling power than graph coloring, yet compared to general constraint satisfaction problems (CSPs), they are sim...
|
May 8 2013 |
|
|
|
|
|
|
|
|
|
|
|