- Image and Signal Denoising Methods
- Experimental Learning in Engineering
- Advanced Data Compression Techniques
- Engineering Education and Pedagogy
- Teaching and Learning Programming
- Advanced Vision and Imaging
- Advanced Image Processing Techniques
- Engineering Education and Curriculum Development
- Smart Agriculture and AI
- Network Security and Intrusion Detection
- Mechatronics Education and Applications
- Cloud Computing and Resource Management
- Sparse and Compressive Sensing Techniques
- Image Enhancement Techniques
- Advanced Steganography and Watermarking Techniques
- Advanced Optical Network Technologies
- IoT and Edge/Fog Computing
- Advanced Image Fusion Techniques
- Medical Image Segmentation Techniques
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Open Education and E-Learning
- Smart Grid Security and Resilience
- Face recognition and analysis
- Digital Media Forensic Detection
Prairie View A&M University
2015-2024
University of California, San Diego
2024
Washington University in St. Louis
2024
Texas A&M University
2024
University of Houston
2022
Mississippi State University
2003-2020
Beijing Polytechnic
2020
Beijing University of Technology
2020
Institute of Electrical Engineering
2020
Xidian University
2020
Recently, human being’s curiosity has been expanded from the land to sky and sea. Besides sending people explore ocean outer space, robots are designed for some tasks dangerous living creatures. Take exploration an example. There many projects or competitions on design of Autonomous Underwater Vehicle (AUV) which attracted interests. Authors this article have learned necessity platform upgrade a previous AUV project, would like share experience one task extension in area fish detection....
The industrial Internet of things (IIoT) can be regarded as machines, computers, and people enabling intelligent operations using advanced data analytics. It is a network systems, objects, platforms, applications that communicate share intelligence. the biggest most important part overall picture. This paper provides brief introduction to IIoT.
Shockwave detection is critical in analyzing shockwave structure and location. High speed video imaging systems are commonly used to obtain image frames during control experiments. Image edge algorithms become natural choices detecting shockwaves. In this paper, a computer software system designed for introduced. Different algorithms, including Roberts, Prewitt, Sobel, Canny, Laplacian of Gaussian, implemented can be chosen by the users easily accurately detect Experimental results show that...
Unsupervised Machine Learning (ML) is more desirable than supervised ML-based network intrusion detection techniques. Convolutional Neural Network (CNN) performs excellently in tasks related to image processing and computer vision applications as a learning (SL) model, but SL not suitable for zero-day attack (IDS) system. In this work, the power of CNN conjunction with autoencoder (AE) used develop unsupervised machine techniques detect anomalies traffic. Two models are developed: CNN-based...
Multihypothesis motion compensation is extended into the transform domain by using a redundant wavelet to produce multiple predictions that are diverse in phase. The corresponding inverse implicitly combines multihypothesis single spatial-domain prediction for such no side information needed describe combination weights. Additionally, we use hierarchical search tailor motion-vector field individual phases. Substantial gains rate-distortion performance obtained comparison an equivalent system...
Hyperspectral Images are a set of narrow spectrum band images used in the recognition and mapping surface materials such as minerals vegetation. Usually these Image datasets high dimensional which makes its classification process complex task low accuracy by using conventional approaches. dimensionality reduction feature have become necessary steps multi-dimensional hyperspectral image processing. This study investigates an effective algorithm for extracting spatial features stationary...
A technique is presented that incorporates an irregular triangle mesh into wavelet-domain motion-estimation and motion-compensation using a shift-invariant redundant wavelet transform. Triangle vertices are identified by simple correlation operator locating image edges in the subbands, while motion compensation takes place through affine transformation mapping triangles from one frame to next. The motion-compensated residual downsampled non-redundant form which then coded any wavelet-based...
A video coder is presented that combines mesh-based motion-compensated temporal filtering, phase-diversity multihypothesis motion compensation, and an embedded 3D wavelet-coefficient coder. The key contribution of this work the introduction paradigm into which achieved by deploying filtering in domain a spatially redundant wavelet transform. regular triangle mesh used to track between frames, affine transform triangles implements compensation within lifting-based Experimental results reveal...
Fake faces generated with Generative Adversarial Networks (GANs) are becoming more and realistic getting harder to be identified directly by human beings. However, CNN (Convolutional Neural network) based deep learning architecture can achieve almost perfect detection accuracy on such fake faces. In this paper we present a study of face the exploration global texture features empirical knowledge that textures quite different from those real A new architecture, LBP (Local Binary Pattern)-Net,...
An anomaly-based intrusion detection system (IDS) is considered an effective mechanism for detecting distributed denial of service (DDoS) attack, but the performance depends on good datasets used training. There are synthetic or simulation-based available with various limitations. To overcome limitations existing datasets, a realistic DDoS dataset developed in this work using Spirent's CyberFlood-CF20 emulator. Attack traffic generated by CF20 and captured feature extraction labeling....
Engineering programs suffer a high attrition rate, which causes the nation to graduate much less engineers. A survey of literature reveals that rate is due mainly fact first year an engineering program all fundamental theory and students don't see connection their future careers. To address this problem, educators in Roy G. Perry College at Prairie View A&M University launched five-week summer camp entitled “College Enhancement Institute (CE2I)” aimed improving performance incoming...
Cybersecurity is a critical issue in today's internet world. Classical security systems, such as firewalls based on signature detection, cannot detect sophisticated zero-day attacks. Machine learning (ML) solutions are more attractive for their capabilities of detecting anomaly traffic from benign traffic, but to develop an ML-based detection system, we need meaningful or realistic network datasets train the engine. There many public ML applications. Still, they have limitations, data...
Multihypothesis with phase diversity is introduced into motion-compensated temporal filtering by deploying the latter in domain of a spatially redundant wavelet transform. The centerpiece this redundant-wavelet approach to multihypothesis multiple-phase inverse transform that involves an implicit projection significantly reducing noise not captured motion model filtering. primary contribution work derivation establishes analytically advantage as compared equivalent taking place spatial...
This paper introduces a laser scanner based measurement system for measuring crop/tree geometric characteristics. The system, which is mounted on Unmanned Ground Vehicle (UGV), contains SICK LMS511 PRO scanner, GPS, and computer. scans objects within distance up to 80 meters with scanning frequency of 25 100Hz an angular resolution 0.1667° 1°. With Ethernet connection, this can output the measured values in real time. UGV WIFI remotely controlled agricultural robotics system. During field...
Computation is an integral part of a larger revolution that will affect how science conducted. Computational biology important emerging field which uniquely enabled by computation. It involves using computers to model biological problems and interpret data, especially in evolutionary molecular biology. The application computational tools all areas producing excitements insights into too complex for conventional approaches. This paper provides brief introduction on
Multihypothesis motion compensation has been widely used in video coding with previous attention focused on techniques employing predictions that are diverse spatially or temporally. In this paper, the multihypothesis concept is extended into transform domain by using a redundant wavelet to produce multiple phase. The corresponding multiple-phase inverse implicitly combines phase-diverse single spatial-domain prediction for compensation. performance advantage of...