- Advanced Malware Detection Techniques
- Information and Cyber Security
- Visual perception and processing mechanisms
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Teaching and Learning Programming
- Video Surveillance and Tracking Methods
- Spam and Phishing Detection
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Advanced Image and Video Retrieval Techniques
- Neural dynamics and brain function
- Advanced Vision and Imaging
- Robotics and Sensor-Based Localization
- Biomedical and Engineering Education
- Energy Efficient Wireless Sensor Networks
- Misinformation and Its Impacts
- Target Tracking and Data Fusion in Sensor Networks
- Advanced Wireless Network Optimization
- Neurobiology and Insect Physiology Research
- Adversarial Robustness in Machine Learning
- Advanced Authentication Protocols Security
- Distributed and Parallel Computing Systems
- Cybercrime and Law Enforcement Studies
- Generative Adversarial Networks and Image Synthesis
University of North Georgia
2015-2024
Kennesaw State University
2023
Creative Commons
2023
Systems Technology (United States)
2023
Georgia College & State University
2004-2011
Georgia State University
2005
Louisiana State University Health Sciences Center New Orleans
2004
University Medical Center New Orleans
2004
Louisiana State University
2004
Boston University
1989-2000
Extrastriate visual areas on the banks of middle suprasylvian sulcus were inactivated by cooling to assess behavioral contribution this cortical region extraction a stationary figure from moving mask. Cooling blocked figure-ground separation when mask was but had no influence static. This difference provides strong evidence that bounding contribute neural stimuli.
Cybersecurity awareness and education initiatives are being designed expanded for the workforce K-20 institutions. Predominately, K-12 cybersecurity programs research have focused on student learning experiences; however, there is a need to also concentrate resources teacher professional development. Teacher development supporting self-confidence in knowledge building modeling of instructional practices may positively influence teachers' integration concepts within classroom instruction....
Research indicates that deceitful videos tend to spread rapidly online and influence people’s opinions ideas. Because of this, video misinformation via deepfake manipulation poses a significant threat. This study aims discover what factors can viewers’ capability distinguish from genuine footage. work focuses on exploring videos’ potential use for deception by ability determine whether are deepfakes in survey consisting original unedited videos. The participants viewed set four were asked...
In area 17 of Macaco mulatto large Meynert cells have their cell bodies located in the vicinity border between layers V and VI. When distribution these is plotted tangential plane they are found not to be randomly distributed, but arranged a sheet such that outline holes or gaps. sections reacted for cytochrome oxidase, which indicates relative level metabolic activity neurons neuropil, clearly visible as highly reactive against background much lower reactivity. reconstructions it apparent...
With the rapid adoption of internet-connected and driver-assist technologies, spread semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart is a timely concern one worth exploring both in classroom real world. Highly publicized hacks against production cars, relatively small number crashes involving autonomous vehicles, have brought issue securing forefront as matter public individual safety, these "data centers wheels" greater than ever.
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and Science Foundation (NSF) to help faculty cybersecurity experts provide summer camp experiences for K-12 students teachers. main objective of attract, educate, motivate a new generation young men women address nationwide shortage trained professionals. curriculum flexible centers on ten first principles. Currently, provides cyber options three types audiences: students, teachers, combination both teachers...
The study of vehicular networks has attracted considerable interest in academia and the industry. In broad area, connected vehicles autonomous driving are technologies based on wireless data communication between or infrastructures. A Vehicle-to-Infrastructure (V2I) system consists communications computing over related such a system, sensors installed some selected points along roads areas. driving, it is crucial for vehicle to figure out ideal routes by its equipped infrastructures then...
Abstract This paper presents a comprehensive survey and methodology for deep learning-based solutions in articulated human pose estimation (HPE). Recent advances learning have revolutionized the HPE field, with capturing system transitioning from multi-modal to regular color camera multi-views monocular view, opening up numerous applications. However, increasing variety of network architectures has resulted vast literature on topic, making it challenging identify commonalities differences...
<p class="MsoNormal" style="text-align: justify; text-indent: 0in; margin: 0in 0.5in 0pt; mso-pagination: none;"><span style="color: black; font-size: 10pt;"><span style="font-family: Times New Roman;">Surveys, particularly electronic surveys, are becoming popular methods of eliciting consumer responses. For example, many businesses now have survey sites printed on the bottom receipts with some future discount as an enticement to participate. Clearly, intent such incentives...
No abstract available.
The US Bureau of Labor Statistics predicts over 8 million job openings in IT and computing, including 1 cybersecurity postings, the current five-year period. This paper presents lessons learned preparing middle-school students rural Georgia for future careers computer science/ by teaching programming free, open-source language Python using Turtle graphics, discusses exercises activities with low-cost drones, bots, 3D printers to get interested keep them engaged coding. Described herein is...
Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area network coverage and connectivity at low costs. The capacity of a is improved by equipping nodes with multi-radios tuned non-overlapping channels. By letting these utilize available channels opportunistically, we increase utilization bandwidths in channel space. essential problem how allocate multi-radio nodes, especially when they are heterogeneous diverse transmission types bandwidths. Most...
With the explosive growth of web-based cameras and mobile devices, billions photographs are uploaded to internet. We can trivially collect a huge number photo streams for various goals, such as image clustering, 3D scene reconstruction, other big data applications. However, tasks not easy due fact retrieved photos have large variations in their view perspectives, resolutions, lighting, noises , distortions. Furthermore, with occlusion unexpected objects like people, vehicles, it is even more...
The most exciting recent advance in computer graphics has been the development of programmable Graphics Processing Units (GPUs). We discuss different approaches to and some issues involved teaching use GPUs.
In this paper, we describe a fully automatic, unsupervised system for recognizing and reconstructing various classes of 3D objects in single-object, light-background 2D images, using three-layer back-propagation neural network object classification. Our takes single image as input provides correctly textured VRML, X3D, or WebGL file two objects: boxes spheres. approach applies edge detection to the image, finds center gravity foreground object, gathers set perimeter distances around gravity....