scispace - formally typeset
Search or ask a question
Institution

Illinois Institute of Technology

EducationChicago, Illinois, United States
About: Illinois Institute of Technology is a education organization based out in Chicago, Illinois, United States. It is known for research contribution in the topics: Electric power system & Wireless network. The organization has 10188 authors who have published 21062 publications receiving 554178 citations. The organization is also known as: IIT & Illinois Tech.


Papers
More filters
Journal ArticleDOI
TL;DR: A study of the literature and surveys conducted in the USA indicated that management commitment to quality and to continuous quality improvement is very important; construction industry professionals are well aware of the importance of quality training; partnering agreements among the parties in the construction process constitute an important step in securing a high quality product; a feedback loop could upgrade the original quality standards used in the industry; the clarity of project scope and requirements as well as of drawings and specifications is a prerequisite for high process quality.

361 citations

Journal ArticleDOI
TL;DR: In this article, the performance of a direct methanol fuel cell (DMFC) is analyzed as a function of three parameters, namely temperature, fuel flow rate and concentration.

358 citations

Journal ArticleDOI
TL;DR: It is demonstrated that hippocampal neurogenesis is persistent through the tenth decade of life and is detectable in patients with mild cognitive impairments and Alzheimer's disease and that it is possibly associated with cognition.

356 citations

Journal ArticleDOI
TL;DR: This review summarizes the last decade of work by the ENIGMA Consortium, a global alliance of over 1400 scientists across 43 countries, studying the human brain in health and disease, and highlights the advantages of collaborative large-scale coordinated data analyses for testing reproducibility and robustness of findings.
Abstract: This review summarizes the last decade of work by the ENIGMA (Enhancing NeuroImaging Genetics through Meta Analysis) Consortium, a global alliance of over 1400 scientists across 43 countries, studying the human brain in health and disease. Building on large-scale genetic studies that discovered the first robustly replicated genetic loci associated with brain metrics, ENIGMA has diversified into over 50 working groups (WGs), pooling worldwide data and expertise to answer fundamental questions in neuroscience, psychiatry, neurology, and genetics. Most ENIGMA WGs focus on specific psychiatric and neurological conditions, other WGs study normal variation due to sex and gender differences, or development and aging; still other WGs develop methodological pipelines and tools to facilitate harmonized analyses of "big data" (i.e., genetic and epigenetic data, multimodal MRI, and electroencephalography data). These international efforts have yielded the largest neuroimaging studies to date in schizophrenia, bipolar disorder, major depressive disorder, post-traumatic stress disorder, substance use disorders, obsessive-compulsive disorder, attention-deficit/hyperactivity disorder, autism spectrum disorders, epilepsy, and 22q11.2 deletion syndrome. More recent ENIGMA WGs have formed to study anxiety disorders, suicidal thoughts and behavior, sleep and insomnia, eating disorders, irritability, brain injury, antisocial personality and conduct disorder, and dissociative identity disorder. Here, we summarize the first decade of ENIGMA's activities and ongoing projects, and describe the successes and challenges encountered along the way. We highlight the advantages of collaborative large-scale coordinated data analyses for testing reproducibility and robustness of findings, offering the opportunity to identify brain systems involved in clinical syndromes across diverse samples and associated genetic, environmental, demographic, cognitive, and psychosocial factors.

355 citations

Proceedings ArticleDOI
10 Apr 2011
TL;DR: This paper investigates secure outsourcing of widely applicable linear programming (LP) computations and develops a set of efficient privacy-preserving problem transformation techniques, which allow customers to transform original LP problem into some random one while protecting sensitive input/output information.
Abstract: Cloud computing enables customers with limited computational resources to outsource large-scale computational tasks to the cloud, where massive computational power can be easily utilized in a pay-per-use manner. However, security is the major concern that prevents the wide adoption of computation outsourcing in the cloud, especially when end-user's confidential data are processed and produced during the computation. Thus, secure outsourcing mechanisms are in great need to not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by validating the computation result. Such a mechanism of general secure computation outsourcing was recently shown to be feasible in theory, but to design mechanisms that are practically efficient remains a very challenging problem. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate security/efficiency tradeoff via higher-level abstraction of LP computations than the general circuit representation. In particular, by formulating private data owned by the customer for LP problem as a set of matrices and vectors, we are able to develop a set of efficient privacy-preserving problem transformation techniques, which allow customers to transform original LP problem into some random one while protecting sensitive input/output information. To validate the computation result, we further explore the fundamental duality theorem of LP computation and derive the necessary and sufficient conditions that correct result must satisfy. Such result verification mechanism is extremely efficient and incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design.

353 citations


Authors

Showing all 10258 results

NameH-indexPapersCitations
David R. Williams1782034138789
David A. Bennett1671142109844
Herbert A. Simon157745194597
Naomi J. Halas14043582040
Ted Belytschko13454781345
Thomas E. Mallouk12254952593
Julie A. Schneider11849256843
Yang-Kook Sun11778158912
Cass R. Sunstein11778757639
D. Errede11089262903
Qian Wang108214865557
Patrick W. Corrigan10650146711
Jürgen Kurths105103862179
Wei Chen103143844994
Richard A. Posner9756640523
Network Information
Related Institutions (5)
Purdue University
163.5K papers, 5.7M citations

87% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

86% related

Pennsylvania State University
196.8K papers, 8.3M citations

86% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

85% related

Michigan State University
137K papers, 5.6M citations

85% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202328
2022146
2021847
2020971
2019889
2018774