- Image and Signal Denoising Methods
- Advanced Data Compression Techniques
- Service-Oriented Architecture and Web Services
- Digital Filter Design and Implementation
- Neural Networks and Applications
- Distributed and Parallel Computing Systems
- Artificial Intelligence in Games
- Innovation and Knowledge Management
- Mobile Agent-Based Network Management
- Knowledge Management and Sharing
- Distributed systems and fault tolerance
- Blind Source Separation Techniques
- Video Analysis and Summarization
- Advanced Steganography and Watermarking Techniques
- Educational Games and Gamification
- Evolutionary Algorithms and Applications
- Scientific Computing and Data Management
- Advanced Image Fusion Techniques
- Gaze Tracking and Assistive Technology
- Sensor Technology and Measurement Systems
- Cell Image Analysis Techniques
- Medical Image Segmentation Techniques
- Cardiac Imaging and Diagnostics
- Teaching and Learning Programming
- Outsourcing and Supply Chain Management
Georgia State University
2012-2024
Citadel
2022-2024
University of Central Oklahoma
2023
Utah Valley University
2022
Houston Baptist University
2015-2018
University of York
2001-2015
University of Tampa
2009-2014
University of Colorado Boulder
2013
Cybula (United Kingdom)
2013
University of Colorado System
2013
In recent years, the range of sensing technologies has expanded rapidly, whereas sensor devices have become cheaper. This led to a rapid expansion in condition monitoring systems, structures, vehicles, and machinery using sensors. Key factors are advances networking such as wireless communication mobile ad hoc coupled with technology integrate devices. Wireless networks (WSNs) can be used for railway infrastructure bridges, rail tracks, track beds, equipment along vehicle health chassis,...
As the outsourcing market has matured over past 20 years, clients and suppliers have begun to examine how these complex relationships can not only achieve cost savings, but also enable innovation in today's dynamic business environment. This article presents four case studies of large-scale information technology that take equal measure suppliers. It develops a model within consisting nine key enablers for achieving innovation. The then links three levels were identified studies. provides...
The disruptive innovation theory of Clayton Christensen was heavily criticized in an article New Yorker magazine by Jill Lepore. Her evaluated Christensen's research methodology and analysis found both lacking. Lepore's criticisms identified several symptoms problems within the research, but stopped short presenting root causes. This looks at diagnoses three causes for recognized Lepore: a lack adequately constrained definition term innovation; failure to identify maintain consistent unit...
Leading in extremis situations, when lives are peril, remains one of the least addressed areas leadership research. Little is known about how leaders make sense these dangerous situations and communicate contexts to others. Because most literature on theoretical, we sought empirical evidence sensemaking proceeds practice. A qualitative study was conducted based interviews with 30 Army who had recently led teams combat. Our findings suggest that during life-threatening sensegiving actually...
During early development, neural circuits fire spontaneously, generating activity episodes with complex spatiotemporal patterns. Recordings of spontaneous have been made in many parts the nervous system over last 25 years, reporting developmental changes patterns and effects various genetic perturbations.We present a curated repository multielectrode array recordings developing mouse ferret retina. The data annotated minimal metadata converted into HDF5. This paper describes structure data,...
Abstract The history of the decline Ivory‐billed Woodpecker is long and complex, but status species since 1944, when last widely accepted sighting in continental North America occurred, particularly controversial. Reports Woodpeckers have continued, none has reached threshold quality for general acceptance by ornithologists or birdwatching public. In 2021, U.S. Fish Wildlife Service opened public comment a proposal to declare extinct. Here, we present evidence suggesting presence at our...
The three-dimensional (3-D) discrete wavelet transform (DWT) suits compression applications well, allowing for better on 3-D data as compared with two-dimensional (2-D) methods. This paper describes two architectures the DWT, called 3DW-I and 3DW-II. first architecture (3DW-I) is based folding, whereas 3DW-II block-based. Potential these include high definition television (HDTV) medical compression, such magnetic resonance imaging (MRI). an implementation of DWT similar to folded 1-D 2-D...
Institutional upheaval spurred by the COVID-19 crisis suddenly and dramatically transformed rules of game for higher education organizations. The global pandemic thrust colleges universities into ambiguous institutional environments. Disruption established routines supply networks resulted in near collapse chains providing personal protective equipment (PPE), particularly N95 masks, needed healthcare workers on medical frontlines. This study describes analyzes industry (HEI) partnership...
Compression is a significant operation in many 3D data applications, such as magnetic resonance imaging (MRI), medical diagnosis, television, and seismic data. Employing standard 2D compression techniques do not offer efficient solutions these applications. In this paper, discrete wavelet transform (DWT) approach proposed for performing compression. Two architectures are presented. The first architecture, called 3D-I, straight-forward implementation of the DWT. It allows even distribution...
With ubiquitous computing comes the access of copyrighted work across platforms. One may have same image (or video) on an iPod, as well a laptop and desktop computer. Safeguarding creative content intellectual property in digital form has become increasingly difficult technologies, such Internet, broadband availability mobile access, advance. It grown to be progressively easier copy, modify redistribute media, resulting great declines business profits. Digital watermarking is steganographic...
This paper studies the edge-detecting characteristics of 2-D discrete wavelet transform. Our problem is to automatically detect edges. Since a common claim about transform that it splits images into an approximation and details, which contain edges, we use in our experiments. First, determine its efficacy, compared other edge-detection methods. Also, number combinatorial methods for octaves are examined comparison. Due this work, novel boundary-tracing algorithm developed, follow edges...
This paper explores the relationship between innovation outcomes, absorptive capacity and human resource management practices in information technology outsourcing relationships. Previous research has highlighted need for to achieve organizations. Since this is likely be embodied within teams of both supplier client dyads, participating firms should have a direct bearing on levels outcomes examined four large IT relationships as case studies presents model inter-organizational that shows...
For any dance form, either classical or folk, visual expressions - facial and hand gestures play a key role in conveying the storyline of accompanied music to audience. Bharatanatyam form which has origins from southern states India, is on verge being completely automated partly due an acute dearth qualified dedicated teachers/gurus. In honest effort speed up this automation process at same time preserve cultural heritage, we have chosen identify classify single gestures/mudras/hastas...
The CARMEN platform allows neuroscientists to share data, metadata, services and workflows, execute these workflows remotely via a Web portal. This paper describes how we implemented service-based infrastructure into the Virtual Laboratory. A Software as Service framework was developed allow generic new legacy code be deployed on heterogeneous execution framework. Users can submit analysis typically written in Matlab, Python, C/C++ R non-interactive standalone command-line applications wrap...
Bacterial 16S ribosomal gene was used to classify bacteria because it consists of both highly conservative region, as well a hypervariable in its sequence. This region serves discriminative factor differentiate at taxonomic levels. In the past, many efforts have been made correctly identify bacterial species from environmental samples or human gut microbiome samples, yet this identification and subsequent classification task is challenging. For such classification, several studies past...
in histories of the american west, construction Glen Canyon Dam is framed as a tradeoff between environmentalists and federal government. In that story, Sierra Club its leader, David Brower, agreed to withdraw opposition massive dam holds back San Juan, Green, Colorado Rivers exchange for an agreement not pursue dams within boundaries Dinosaur National Monument. Conservationist regret expressed 1963 pictorial history called The Place No One Knew. also inspired group antidevelopment...
With the advance of technologies such as Internet, Wi-Fi Internet availability and mobile access, it is becoming harder than ever to safeguard intellectual property in a digital form.Digital watermarking steganographic technique that used protect creative content.Copyrighted work can be accessed from many different computing platforms; same image exist on handheld personal assistant, well laptop desktop server computer.For those who want pirate, simple copy, modify redistribute media.Because...
The CARMEN (Code, Analysis, Repository and Modelling for e-Neuroscience) system [1] provides a web based portal platform through which users can share collaboratively exploit data, analysis code expertise in neuroscience. has been beendeveloped the UK currently supports 200 hundred neuroscientists working Virtual Environment with an initial focus on electrophysiology data. proposal here is that excellent base from to develop 'executable paper' system. built by York Newcastle Universities...
A low-power system that can be used to compress MRI data and for other medical applications is described. The uses a low power 3-D DWT processor based on centralized control unit architecture. simulation results show the efficiency of wavelet processor. prototype consumes 0.5 W with total delay 91.65 ns. operates at maximum frequency 272 MHz. 16-bit adder, Booth multiplier, 1 kB cache 64-bit bandwidth. Lower has been achieved by using building blocks minimal number computational units high...