Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical & Computer Engineering Faculty Publications

Discipline
Keyword
Publication Year

Articles 1 - 30 of 34

Full-Text Articles in Theory and Algorithms

Class Activation Mapping And Uncertainty Estimation In Multi-Organ Segmentation, Md. Shibly Sadique, Walia Farzana, Ahmed Temtam, Khan Iftekharuddin, Khan Iftekharuddin (Ed.), Weijie Chen (Ed.) Jan 2023

Class Activation Mapping And Uncertainty Estimation In Multi-Organ Segmentation, Md. Shibly Sadique, Walia Farzana, Ahmed Temtam, Khan Iftekharuddin, Khan Iftekharuddin (Ed.), Weijie Chen (Ed.)

Electrical & Computer Engineering Faculty Publications

Deep learning (DL)-based medical imaging and image segmentation algorithms achieve impressive performance on many benchmarks. Yet the efficacy of deep learning methods for future clinical applications may become questionable due to the lack of ability to reason with uncertainty and interpret probable areas of failures in prediction decisions. Therefore, it is desired that such a deep learning model for segmentation classification is able to reliably predict its confidence measure and map back to the original imaging cases to interpret the prediction decisions. In this work, uncertainty estimation for multiorgan segmentation task is evaluated to interpret the predictive modeling in DL …


Adaptive Critic Network For Person Tracking Using 3d Skeleton Data, Joseph G. Zalameda, Alex Glandon, Khan M. Iftekharuddin, Mohammad S. Alam (Ed.), Vijayan K. Asari (Ed.) Jan 2023

Adaptive Critic Network For Person Tracking Using 3d Skeleton Data, Joseph G. Zalameda, Alex Glandon, Khan M. Iftekharuddin, Mohammad S. Alam (Ed.), Vijayan K. Asari (Ed.)

Electrical & Computer Engineering Faculty Publications

Analysis of human gait using 3-dimensional co-occurrence skeleton joints extracted from Lidar sensor data has been shown a viable method for predicting person identity. The co-occurrence based networks rely on the spatial changes between frames of each joint in the skeleton data sequence. Normally, this data is obtained using a Lidar skeleton extraction method to estimate these co-occurrence features from raw Lidar frames, which can be prone to incorrect joint estimations when part of the body is occluded. These datasets can also be time consuming and expensive to collect and typically offer a small number of samples for training and …


An Explainable Artificial Intelligence Framework For The Predictive Analysis Of Hypo And Hyper Thyroidism Using Machine Learning Algorithms, Md. Bipul Hossain, Anika Shama, Apurba Adhikary, Avi Deb Raha, K. M. Aslam Uddin, Mohammad Amzad Hossain, Imtia Islam, Saydul Akbar Murad, Md. Shirajum Munir, Anupam Kumur Bairagi Jan 2023

An Explainable Artificial Intelligence Framework For The Predictive Analysis Of Hypo And Hyper Thyroidism Using Machine Learning Algorithms, Md. Bipul Hossain, Anika Shama, Apurba Adhikary, Avi Deb Raha, K. M. Aslam Uddin, Mohammad Amzad Hossain, Imtia Islam, Saydul Akbar Murad, Md. Shirajum Munir, Anupam Kumur Bairagi

Electrical & Computer Engineering Faculty Publications

The thyroid gland is the crucial organ in the human body, secreting two hormones that help to regulate the human body's metabolism. Thyroid disease is a severe medical complaint that could be developed by high Thyroid Stimulating Hormone (TSH) levels or an infection in the thyroid tissues. Hypothyroidism and hyperthyroidism are two critical conditions caused by insufficient thyroid hormone production and excessive thyroid hormone production, respectively. Machine learning models can be used to precisely process the data generated from different medical sectors and to build a model to predict several diseases. In this paper, we use different machine-learning algorithms to …


The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe Jan 2023

The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe

Electrical & Computer Engineering Faculty Publications

The effect of the thickness of the dielectric boundary layer that connects a material of refractive index n1 to another of index n2is considered for the propagation of an electromagnetic pulse. A qubit lattice algorithm (QLA), which consists of a specially chosen non-commuting sequence of collision and streaming operators acting on a basis set of qubits, is theoretically determined that recovers the Maxwell equations to second-order in a small parameter ϵ. For very thin boundary layer the scattering properties of the pulse mimics that found from the Fresnel jump conditions for a plane wave - except that …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Understanding The Mechanism Of Deep Learning Frameworks In Lesion Detection For Pathological Images With Breast Cancer, Wei-Wen Hsu, Chung-Hao Chen, Chang Hao, Yu-Ling Hou, Xiang Gao, Yun Shao, Xueli Zhang, Jingjing Wang, Tao He, Yanhong Tai Apr 2022

Understanding The Mechanism Of Deep Learning Frameworks In Lesion Detection For Pathological Images With Breast Cancer, Wei-Wen Hsu, Chung-Hao Chen, Chang Hao, Yu-Ling Hou, Xiang Gao, Yun Shao, Xueli Zhang, Jingjing Wang, Tao He, Yanhong Tai

Electrical & Computer Engineering Faculty Publications

With the advances of scanning sensors and deep learning algorithms, computational pathology has drawn much attention in recent years and started to play an important role in the clinical workflow. Computer-aided detection (CADe) systems have been developed to assist pathologists in slide assessment, increasing diagnosis efficiency and reducing misdetections. In this study, we conducted four experiments to demonstrate that the features learned by deep learning models are interpretable from a pathological perspective. In addition, classifiers such as the support vector machine (SVM) and random forests (RF) were used in experiments to replace the fully connected layers and decompose the end-to-end …


"Mystify": A Proactive Moving-Target Defense For A Resilient Sdn Controller In Software Defined Cps, Mohamed Azab, Mohamed Samir, Effat Samir Jan 2022

"Mystify": A Proactive Moving-Target Defense For A Resilient Sdn Controller In Software Defined Cps, Mohamed Azab, Mohamed Samir, Effat Samir

Electrical & Computer Engineering Faculty Publications

The recent devastating mission Cyber–Physical System (CPS) attacks, failures, and the desperate need to scale and to dynamically adapt to changes, revolutionized traditional CPS to what we name as Software Defined CPS (SD-CPS). SD-CPS embraces the concept of Software Defined (SD) everything where CPS infrastructure is more elastic, dynamically adaptable and online-programmable. However, in SD-CPS, the threat became more immanent, as the long-been physically-protected assets are now programmatically accessible to cyber attackers. In SD-CPSs, a network failure hinders the entire functionality of the system. In this paper, we present MystifY, a spatiotemporal runtime diversification for Moving-Target Defense (MTD) to secure …


Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu Jan 2022

Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu

Electrical & Computer Engineering Faculty Publications

Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …


Distributed Strategy For Power Re-Allocation In High Performance Applications, Vaibhav Sundriyal, Masha Sosonkina Jan 2020

Distributed Strategy For Power Re-Allocation In High Performance Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to distribute a given power allocation among the cluster nodes assigned to the application while balancing their performance change. The strategy operates in a timeslice-based manner to estimate the current application performance and power usage per node followed by power redistribution across the nodes. Experiments, performed on four nodes (112 cores) of a modern computing platform interconnected with Infiniband showed that even a significant power budget reduction of 20% may result in …


Fast Identification Of High Utility Itemsets From Candidates, Jun-Feng Qu, Mengchi Liu, Chunsheng Xin, Zhongbo Wu Jan 2018

Fast Identification Of High Utility Itemsets From Candidates, Jun-Feng Qu, Mengchi Liu, Chunsheng Xin, Zhongbo Wu

Electrical & Computer Engineering Faculty Publications

High utility itemsets (HUIs) are sets of items with high utility, like profit, in a database. Efficient mining of high utility itemsets is an important problem in the data mining area. Many mining algorithms adopt a two-phase framework. They first generate a set of candidate itemsets by roughly overestimating the utilities of all itemsets in a database, and subsequently compute the exact utility of each candidate to identify HUIs. Therefore, the major costs in these algorithms come from candidate generation and utility computation. Previous works mainly focus on how to reduce the number of candidates, without dedicating much attention to …


Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu Jun 2017

Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu

Electrical & Computer Engineering Faculty Publications

This work proposes a novel connectivity-based localization algorithm, well suitable for large-scale sensor networks with complex shapes and a non-uniform nodal distribution. In contrast to current state-of-the-art connectivity-based localization methods, the proposed algorithm is highly scalable with linear computation and communication costs with respect to the size of the network; and fully distributed where each node only needs the information of its neighbors without cumbersome partitioning and merging process. The algorithm is theoretically guaranteed and numerically stable. Moreover, the algorithm can be readily extended to the localization of networks with a one-hop transmission range distance measurement, and the propagation of …


Adaptive Graph Construction For Isomap Manifold Learning, Loc Tran, Zezhong Zheng, Guoquing Zhou, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.) Jan 2015

Adaptive Graph Construction For Isomap Manifold Learning, Loc Tran, Zezhong Zheng, Guoquing Zhou, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.)

Electrical & Computer Engineering Faculty Publications

Isomap is a classical manifold learning approach that preserves geodesic distance of nonlinear data sets. One of the main drawbacks of this method is that it is susceptible to leaking, where a shortcut appears between normally separated portions of a manifold. We propose an adaptive graph construction approach that is based upon the sparsity property of the ℓ1 norm. The ℓ1 enhanced graph construction method replaces k-nearest neighbors in the classical approach. The proposed algorithm is first tested on the data sets from the UCI data base repository which showed that the proposed approach performs better than …


Hyperspectral Image Classification Using A Spectral-Spatial Sparse Coding Model, Ender Oguslu, Guoqing Zhou, Jiang Li, Lorenzo Bruzzone (Ed.) Jan 2013

Hyperspectral Image Classification Using A Spectral-Spatial Sparse Coding Model, Ender Oguslu, Guoqing Zhou, Jiang Li, Lorenzo Bruzzone (Ed.)

Electrical & Computer Engineering Faculty Publications

We present a sparse coding based spectral-spatial classification model for hyperspectral image (HSI) datasets. The proposed method consists of an efficient sparse coding method in which the l1/lq regularized multi-class logistic regression technique was utilized to achieve a compact representation of hyperspectral image pixels for land cover classification. We applied the proposed algorithm to a HSI dataset collected at the Kennedy Space Center and compared our algorithm to a recently proposed method, Gaussian process maximum likelihood (GP-ML) classifier. Experimental results show that the proposed method can achieve significantly better performances than the GP-ML classifier when training data …


Real-Time Anomaly Detection In Full Motion Video, Glenn Konowicz,, Jiang Li, Donnie Self (Ed.) Jan 2012

Real-Time Anomaly Detection In Full Motion Video, Glenn Konowicz,, Jiang Li, Donnie Self (Ed.)

Electrical & Computer Engineering Faculty Publications

Improvement in sensor technology such as charge-coupled devices (CCD) as well as constant incremental improvements in storage space has enabled the recording and storage of video more prevalent and lower cost than ever before. However, the improvements in the ability to capture and store a wide array of video have required additional manpower to translate these raw data sources into useful information. We propose an algorithm for automatically detecting anomalous movement patterns within full motion video thus reducing the amount of human intervention required to make use of these new data sources. The proposed algorithm tracks all of the objects …


Fast Stochastic Wiener Filter For Super-Resolution Image Restoration With Information Theoretic Visual Quality Assessment, Amr Hussein Yousef, Jiang Li, Mohammad Karim, Mark Allen Neifeld (Ed.), Amit Ashok (Ed.) Jan 2012

Fast Stochastic Wiener Filter For Super-Resolution Image Restoration With Information Theoretic Visual Quality Assessment, Amr Hussein Yousef, Jiang Li, Mohammad Karim, Mark Allen Neifeld (Ed.), Amit Ashok (Ed.)

Electrical & Computer Engineering Faculty Publications

Super-resolution (SR) refers to reconstructing a single high resolution (HR) image from a set of subsampled, blurred and noisy low resolution (LR) images. The reconstructed image suffers from degradations such as blur, aliasing, photo-detector noise and registration and fusion error. Wiener filter can be used to remove artifacts and enhance the visual quality of the reconstructed images. In this paper, we introduce a new fast stochastic Wiener filter for SR reconstruction and restoration that can be implemented efficiently in the frequency domain. Our derivation depends on the continuous-discrete-continuous (CDC) model that represents most of the degradations encountered during the image-gathering …


Fusion Of Visual And Thermal Images Using Genetic Algorithms, Sertan Erkanli, Jiang Li, Ender Oguslu, Shangce Gao (Ed.) Jan 2012

Fusion Of Visual And Thermal Images Using Genetic Algorithms, Sertan Erkanli, Jiang Li, Ender Oguslu, Shangce Gao (Ed.)

Electrical & Computer Engineering Faculty Publications

No abstract provided.


Sparse Coding For Hyperspectral Images Using Random Dictionary And Soft Thresholding, Ender Oguslu, Khan Iftekharuddin, Jiang Li, Mark Allen Neifeld (Ed.), Amit Ashok (Ed.) Jan 2012

Sparse Coding For Hyperspectral Images Using Random Dictionary And Soft Thresholding, Ender Oguslu, Khan Iftekharuddin, Jiang Li, Mark Allen Neifeld (Ed.), Amit Ashok (Ed.)

Electrical & Computer Engineering Faculty Publications

Many techniques have been recently developed for classification of hyperspectral images (HSI) including support vector machines (SVMs), neural networks and graph-based methods. To achieve good performances for the classification, a good feature representation of the HSI is essential. A great deal of feature extraction algorithms have been developed such as principal component analysis (PCA) and independent component analysis (ICA). Sparse coding has recently shown state-of-the-art performances in many applications including image classification. In this paper, we present a feature extraction method for HSI data motivated by a recently developed sparse coding based image representation technique. Sparse coding consists of a …


Mathematical Model Development Of Super-Resolution Image Wiener Restoration, Amr H. Yousef, Jiang Li, Mohammad A. Karim Jan 2012

Mathematical Model Development Of Super-Resolution Image Wiener Restoration, Amr H. Yousef, Jiang Li, Mohammad A. Karim

Electrical & Computer Engineering Faculty Publications

In super-resolution (SR), a set of degraded low-resolution (LR) images are used to reconstruct a higher-resolution image that suffers from acquisition degradations. One way to boost SR images visual quality is to use restoration filters to remove reconstructed images artifacts. We propose an efficient method to optimally allocate the LR pixels on the high-resolution grid and introduce a mathematical derivation of a stochastic Wiener filter. It relies on the continuous-discrete-continuous model and is constrained by the periodic and nonperiodic interrelationships between the different frequency components of the proposed SR system. We analyze an end-to-end model and formulate the Wiener filter …


Toward Automatic Subpixel Registration Of Unmanned Airborne Vehicle Images, Amr Hussein Yousef, Jiang Li, Mohammad Karim, Mark Allen Neifeld (Ed.), Amit Ashok (Ed.) Jan 2012

Toward Automatic Subpixel Registration Of Unmanned Airborne Vehicle Images, Amr Hussein Yousef, Jiang Li, Mohammad Karim, Mark Allen Neifeld (Ed.), Amit Ashok (Ed.)

Electrical & Computer Engineering Faculty Publications

Many applications require to register images within subpixel accuracy like computer vision especially super-resolution (SR) where the estimated subpixel shifts are very crucial in the reconstruction and restoration of SR images. In our work we have an optical sensor that is mounted on an unmanned airborne vehicle (UAV) and captures a set of images that contain sufficient overlapped area required to reconstruct a SR image. Due to the wind, The UAV may encounter rotational effects such as yaw, pitch and roll which can distort the acquired as well as processed images with shear, tilt or perspective distortions. In this paper …


3d Face Reconstruction From Limited Images Based On Differential Evolution, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Andrew G. Tescher (Ed.) Jan 2011

3d Face Reconstruction From Limited Images Based On Differential Evolution, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Andrew G. Tescher (Ed.)

Electrical & Computer Engineering Faculty Publications

3D face modeling has been one of the greatest challenges for researchers in computer graphics for many years. Various methods have been used to model the shape and texture of faces under varying illumination and pose conditions from a single given image. In this paper, we propose a novel method for the 3D face synthesis and reconstruction by using a simple and efficient global optimizer. A 3D-2D matching algorithm which employs the integration of the 3D morphable model (3DMM) and the differential evolution (DE) algorithm is addressed. In 3DMM, the estimation process of fitting shape and texture information into 2D …


Histogram Analysis Of Adc In Brain Tumor Patients, Debrup Banerjee, Jihong Wang, Jiang Li, Norbert J. Pelc (Ed.), Ehsan Samei (Ed.), Robert M. Nishikawa (Ed.) Jan 2011

Histogram Analysis Of Adc In Brain Tumor Patients, Debrup Banerjee, Jihong Wang, Jiang Li, Norbert J. Pelc (Ed.), Ehsan Samei (Ed.), Robert M. Nishikawa (Ed.)

Electrical & Computer Engineering Faculty Publications

At various stage of progression, most brain tumors are not homogenous. In this presentation, we retrospectively studied the distribution of ADC values inside tumor volume during the course of tumor treatment and progression for a selective group of patients who underwent an anti-VEGF trial. Complete MRI studies were obtained for this selected group of patients including pre- and multiple follow-up, post-treatment imaging studies. In each MRI imaging study, multiple scan series were obtained as a standard protocol which includes T1, T2, T1-post contrast, FLAIR and DTI derived images (ADC, FA etc.) for each visit. All scan series (T1, T2, FLAIR, …


Marine Buoy Detection Using Circular Hough Transform, Loc Tran, Justin Selfridge, Gene Hou, Jiang Li Jan 2011

Marine Buoy Detection Using Circular Hough Transform, Loc Tran, Justin Selfridge, Gene Hou, Jiang Li

Electrical & Computer Engineering Faculty Publications

A low cost method for buoy detection in maritime settings is presented using inexpensive digital cameras. In this method, the circular Hough transform is applied to an edge image to circular objects in the image. The center of these circles will signify the locations of each buoy. The known color information of the buoys is also used to enhance the performance by removing false detections. The algorithm is compared to an approach that locates buoys purely on color information. In order to validate the method, we test the approach synthetically and also with real images captured from a small surface …


2d Face Database Diversification Based On 3d Face Modeling, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Manuel Filipe Costa (Ed.) Jan 2011

2d Face Database Diversification Based On 3d Face Modeling, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Manuel Filipe Costa (Ed.)

Electrical & Computer Engineering Faculty Publications

Pose and illumination are identified as major problems in 2D face recognition (FR). It has been theoretically proven that the more diversified instances in the training phase, the more accurate and adaptable the FR system appears to be. Based on this common awareness, researchers have developed a large number of photographic face databases to meet the demand for data training purposes. In this paper, we propose a novel scheme for 2D face database diversification based on 3D face modeling and computer graphics techniques, which supplies augmented variances of pose and illumination. Based on the existing samples from identical individuals of …


Prediction Of Brain Tumor Progression Using Multiple Histogram Matched Mri Scans, Debrup Banerjee, Loc Tran, Jiang Li, Yuzhong Shen, Frederic Mckenzie, Jihong Wang, Ronald M. Summers (Ed.), Bram Van Ginneken (Ed.) Jan 2011

Prediction Of Brain Tumor Progression Using Multiple Histogram Matched Mri Scans, Debrup Banerjee, Loc Tran, Jiang Li, Yuzhong Shen, Frederic Mckenzie, Jihong Wang, Ronald M. Summers (Ed.), Bram Van Ginneken (Ed.)

Electrical & Computer Engineering Faculty Publications

In a recent study [1], we investigated the feasibility of predicting brain tumor progression based on multiple MRI series and we tested our methods on seven patients' MRI images scanned at three consecutive visits A, B and C. Experimental results showed that it is feasible to predict tumor progression from visit A to visit C using a model trained by the information from visit A to visit B. However, the trained model failed when we tried to predict tumor progression from visit B to visit C, though it is clinically more important. Upon a closer look at the MRI scans …


Bcc Skin Cancer Diagnosis Based On Texture Analysis Techniques, Shao-Hui Chuang, Xiaoyan Sun, Wen-Yu Chang, Gwo-Shing Chen, Adam Huang, Jiang Li, Frederic D. Mckenzie Jan 2011

Bcc Skin Cancer Diagnosis Based On Texture Analysis Techniques, Shao-Hui Chuang, Xiaoyan Sun, Wen-Yu Chang, Gwo-Shing Chen, Adam Huang, Jiang Li, Frederic D. Mckenzie

Electrical & Computer Engineering Faculty Publications

In this paper, we present a texture analysis based method for diagnosing the Basal Cell Carcinoma (BCC) skin cancer using optical images taken from the suspicious skin regions. We first extracted the Run Length Matrix and Haralick texture features from the images and used a feature selection algorithm to identify the most effective feature set for the diagnosis. We then utilized a Multi-Layer Perceptron (MLP) classifier to classify the images to BCC or normal cases. Experiments showed that detecting BCC cancer based on optical images is feasible. The best sensitivity and specificity we achieved on our data set were 94% …


Enhancement Technique For Aerial Images, Sertan Erkanli, Ahmet Gungor Pakfiliz, Jiang Li Jan 2011

Enhancement Technique For Aerial Images, Sertan Erkanli, Ahmet Gungor Pakfiliz, Jiang Li

Electrical & Computer Engineering Faculty Publications

Recently, we proposed an enhancement technique for uniformly and non-uniformly illuminated dark images that provides high color accuracy and better balance between the luminance and the contrast in images to improve the visual representations of digital images. In this paper we define an improved version of the proposed algorithm to enhance aerial images in order to reduce the gap between direct observation of a scene and its recorded image.


Eeg Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen, John Musson, Jiang Li, Frederick Mckenzie, Guangfan Zhang, Roger Xu, Carl Richey, Tom Schnell, Thomas E. Pinelli (Ed.) Jan 2011

Eeg Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen, John Musson, Jiang Li, Frederick Mckenzie, Guangfan Zhang, Roger Xu, Carl Richey, Tom Schnell, Thomas E. Pinelli (Ed.)

Electrical & Computer Engineering Faculty Publications

In this paper we developed a wavelet neural network. (WNN) algorithm for Electroencephalogram (EEG) artifact removal without electrooculographic (EOG) recordings. The algorithm combines the universal approximation characteristics of neural network and the time/frequency property of wavelet. We compared the WNN algorithm with the ICA technique and a wavelet thresholding method, which was realized by using the Stein's unbiased risk estimate (SURE) with an adaptive gradient-based optimal threshold. Experimental results on a driving test data set show that WNN can remove EEG artifacts effectively without diminishing useful EEG information even for very noisy data.


Automatic Detection Of Aircraft Emergency Landing Sites, Yu-Fei Shen, Zia-Ur Rahman, Dean Krusienski, Jiang Li, Zia-Ur Rahman (Ed.), Stephen E. Reichenbach (Ed.), Mark Allen Neifeld (Ed.) Jan 2011

Automatic Detection Of Aircraft Emergency Landing Sites, Yu-Fei Shen, Zia-Ur Rahman, Dean Krusienski, Jiang Li, Zia-Ur Rahman (Ed.), Stephen E. Reichenbach (Ed.), Mark Allen Neifeld (Ed.)

Electrical & Computer Engineering Faculty Publications

An automatic landing site detection algorithm is proposed for aircraft emergency landing. Emergency landing is an unplanned event in response to emergency situations. If, as is unfortunately usually the case, there is no airstrip or airfield that can be reached by the un-powered aircraft, a crash landing or ditching has to be carried out. Identifying a safe landing site is critical to the survival of passengers and crew. Conventionally, the pilot chooses the landing site visually by looking at the terrain through the cockpit. The success of this vital decision greatly depends on the external environmental factors that can impair …


Parameter Optimization For Image Denoising Based On Block Matching And 3d Collaborative Filtering, Ramu Pedada, Emin Kugu, Jiang Li, Zhanfeng Yue, Yuzhong Shen, Josien P.W. Pluim (Ed.), Benoit M. Dawant (Ed.) Jan 2009

Parameter Optimization For Image Denoising Based On Block Matching And 3d Collaborative Filtering, Ramu Pedada, Emin Kugu, Jiang Li, Zhanfeng Yue, Yuzhong Shen, Josien P.W. Pluim (Ed.), Benoit M. Dawant (Ed.)

Electrical & Computer Engineering Faculty Publications

Clinical MRI images are generally corrupted by random noise during acquisition with blurred subtle structure features. Many denoising methods have been proposed to remove noise from corrupted images at the expense of distorted structure features. Therefore, there is always compromise between removing noise and preserving structure information for denoising methods. For a specific denoising method, it is crucial to tune it so that the best tradeoff can be obtained. In this paper, we define several cost functions to assess the quality of noise removal and that of structure information preserved in the denoised image. Strength Pareto Evolutionary Algorithm 2 (SPEA2) …


Vegetation Identification Based On Satellite Imagery, Vamsi K.R. Mantena, Ramu Pedada, Srinivas Jakkula, Yuzhong Shen, Jiang Li, Hamid R. Arabnia (Ed.) Jan 2008

Vegetation Identification Based On Satellite Imagery, Vamsi K.R. Mantena, Ramu Pedada, Srinivas Jakkula, Yuzhong Shen, Jiang Li, Hamid R. Arabnia (Ed.)

Electrical & Computer Engineering Faculty Publications

Automatic vegetation identification plays an important role in many applications including remote sensing and high performance flight simulations. This paper presents a method to automatically identify vegetation based upon satellite imagery. First, we utilize the ISODATA algorithm to cluster pixels in the images where the number of clusters is determined by the algorithm. We then apply morphological operations to the clustered images to smooth the boundaries between clusters and to fill holes inside clusters. After that, we compute six features for each cluster. These six features then go through a feature selection algorithm and three of them are determined to …