Mehrube Mehrubeoglu - Academia.edu (original) (raw)
Uploads
Papers by Mehrube Mehrubeoglu
Transactions on Computational Science and Computational Intelligence
Implementing Augmented Reality Into Immersive Virtual Learning Environments
The potential of augmented reality (AR) as a transformational tool has long been touted in academ... more The potential of augmented reality (AR) as a transformational tool has long been touted in academic circles. However, in order for AR to attain this goal, we must seriously examine previous research to determine if we are on the right path. This study examined 87 AR research studies situated in K-12 environments to determine what grade levels were involved, where the research being done was what content areas were involved, what kinds of triggers were used, and what learning environments were created through the use of AR. This research found that the majority of studies were situated in elementary contexts in science and math. Diverse learning environments were found including inquiry, problem-based learning, visualization, and gamification. Based on these findings, suggestions were made for future research including more research on students creating AR experiences, broadening the grade levels and content areas that are involved, and aiming future AR projects at the transformation...
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
2007 Annual Conference & Exposition Proceedings
2011 ASEE Annual Conference & Exposition Proceedings
2011 ASEE Annual Conference & Exposition Proceedings
2020 ASEE Virtual Annual Conference Content Access Proceedings
2014 Ieee International Conference on Imaging Systems and Techniques Proceedings, Oct 1, 2014
Proceedings of Spie the International Society For Optical Engineering, 2006
The goal of this project was to detect the intensity of traffic on a road at different times of t... more The goal of this project was to detect the intensity of traffic on a road at different times of the day during daytime. Although the work presented utilized images from a section of a highway, the results of this project are intended for making decisions on the type of intervention necessary on any given road at different times for traffic
ABSTRACT © 2002 Optical Society of America
Proceedings of Spie the International Society For Optical Engineering, Aug 1, 2010
In this research, a new combination discrete cosine transform (DCT) and discrete wavelet transfor... more In this research, a new combination discrete cosine transform (DCT) and discrete wavelet transform (DWT) based watermarking system is studied. The first embedded watermark is encrypted using a chaos function, specifically the Lorenz function, based key to further conceal the data. A chaos based embedded watermark method in the DCT domain with blind watermark identification is developed and tested. Next
2016 IEEE/ACES International Conference on Wireless Information Technology and Systems (ICWITS) and Applied Computational Electromagnetics (ACES), 2016
Proceedings of Spie the International Society For Optical Engineering, Feb 1, 2009
In this paper, we present a semi real-time vehicle tracking algorithm to determine the speed of t... more In this paper, we present a semi real-time vehicle tracking algorithm to determine the speed of the vehicles in traffic from traffic cam video. The results of this work can be used for traffic control, security and safety both by government agencies and commercial organizations. The method described in this paper involves object feature identification, detection, and tracking in multiple video frames. The distance between vertical broken lane markers has been used to estimate absolute distances within each frame and convert pixel location coordinates to world coordinates. Speed calculations are made based on the calibrated pixel distances. Optical flow images have been computed and used for blob analysis to extract features representing moving objects. Some challenges exist in distinguishing among vehicles in uniform flow of traffic when the object are too close, are in low contrast with one another, and travel with the same or close to the same speed. In the absence of a ground truth for the actual speed of the tracked vehicles accuracy cannot be determined. However, the vehicle speeds in steady flow of traffic have been computed to within 5% of the speed limit on the analyzed highways in the video clips.
Instructors are constantly seeking innovative methods to teach students the engineering concepts ... more Instructors are constantly seeking innovative methods to teach students the engineering concepts in freshmen classes. Freshmen classes are particularly important for student retention, since these classes are the students’ “first impression” of the engineering department or program. Additionally, the freshman classes are where the students are expected to begin learning soft skills besides the fundamental concepts. In this paper,
Journal of Real-Time Image Processing, 2010
2012 IEEE International Conference on Imaging Systems and Techniques Proceedings, 2012
4th IEEE Southwest Symposium on Image Analysis and Interpretation, 2000
This paper examines various texture features extracted from skin lesion images obtained by using ... more This paper examines various texture features extracted from skin lesion images obtained by using diffuse reflectance spectroscopic imaging. Different image texture features have been applied to such images to separate precancerous from benign cases. These features are extracted based on co-occurrence matrix, wavelet decomposition, fractal signature, and granulometric approaches. The results so far indicate that fractal and wavelet-based features are effective in distinguishing precancerous from benign cases.
Imaging Spectrometry XX, 2015
Mathematics of Data/Image Coding, Compression, and Encryption VIII, with Applications, 2005
In digital security and authentication, watermarking has emerged as a solution to unauthorized di... more In digital security and authentication, watermarking has emerged as a solution to unauthorized digital copies, monitoring of broadcasts, information embedding, as well as end-user and transaction authentication. In the field of watermarking, the discrete cosine transform (DCT) domain, as well as other transform domains, have been shown to be advantageous over most spatial domain techniques by its increased robustness to
Transactions on Computational Science and Computational Intelligence
Implementing Augmented Reality Into Immersive Virtual Learning Environments
The potential of augmented reality (AR) as a transformational tool has long been touted in academ... more The potential of augmented reality (AR) as a transformational tool has long been touted in academic circles. However, in order for AR to attain this goal, we must seriously examine previous research to determine if we are on the right path. This study examined 87 AR research studies situated in K-12 environments to determine what grade levels were involved, where the research being done was what content areas were involved, what kinds of triggers were used, and what learning environments were created through the use of AR. This research found that the majority of studies were situated in elementary contexts in science and math. Diverse learning environments were found including inquiry, problem-based learning, visualization, and gamification. Based on these findings, suggestions were made for future research including more research on students creating AR experiences, broadening the grade levels and content areas that are involved, and aiming future AR projects at the transformation...
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
2007 Annual Conference & Exposition Proceedings
2011 ASEE Annual Conference & Exposition Proceedings
2011 ASEE Annual Conference & Exposition Proceedings
2020 ASEE Virtual Annual Conference Content Access Proceedings
2014 Ieee International Conference on Imaging Systems and Techniques Proceedings, Oct 1, 2014
Proceedings of Spie the International Society For Optical Engineering, 2006
The goal of this project was to detect the intensity of traffic on a road at different times of t... more The goal of this project was to detect the intensity of traffic on a road at different times of the day during daytime. Although the work presented utilized images from a section of a highway, the results of this project are intended for making decisions on the type of intervention necessary on any given road at different times for traffic
ABSTRACT © 2002 Optical Society of America
Proceedings of Spie the International Society For Optical Engineering, Aug 1, 2010
In this research, a new combination discrete cosine transform (DCT) and discrete wavelet transfor... more In this research, a new combination discrete cosine transform (DCT) and discrete wavelet transform (DWT) based watermarking system is studied. The first embedded watermark is encrypted using a chaos function, specifically the Lorenz function, based key to further conceal the data. A chaos based embedded watermark method in the DCT domain with blind watermark identification is developed and tested. Next
2016 IEEE/ACES International Conference on Wireless Information Technology and Systems (ICWITS) and Applied Computational Electromagnetics (ACES), 2016
Proceedings of Spie the International Society For Optical Engineering, Feb 1, 2009
In this paper, we present a semi real-time vehicle tracking algorithm to determine the speed of t... more In this paper, we present a semi real-time vehicle tracking algorithm to determine the speed of the vehicles in traffic from traffic cam video. The results of this work can be used for traffic control, security and safety both by government agencies and commercial organizations. The method described in this paper involves object feature identification, detection, and tracking in multiple video frames. The distance between vertical broken lane markers has been used to estimate absolute distances within each frame and convert pixel location coordinates to world coordinates. Speed calculations are made based on the calibrated pixel distances. Optical flow images have been computed and used for blob analysis to extract features representing moving objects. Some challenges exist in distinguishing among vehicles in uniform flow of traffic when the object are too close, are in low contrast with one another, and travel with the same or close to the same speed. In the absence of a ground truth for the actual speed of the tracked vehicles accuracy cannot be determined. However, the vehicle speeds in steady flow of traffic have been computed to within 5% of the speed limit on the analyzed highways in the video clips.
Instructors are constantly seeking innovative methods to teach students the engineering concepts ... more Instructors are constantly seeking innovative methods to teach students the engineering concepts in freshmen classes. Freshmen classes are particularly important for student retention, since these classes are the students’ “first impression” of the engineering department or program. Additionally, the freshman classes are where the students are expected to begin learning soft skills besides the fundamental concepts. In this paper,
Journal of Real-Time Image Processing, 2010
2012 IEEE International Conference on Imaging Systems and Techniques Proceedings, 2012
4th IEEE Southwest Symposium on Image Analysis and Interpretation, 2000
This paper examines various texture features extracted from skin lesion images obtained by using ... more This paper examines various texture features extracted from skin lesion images obtained by using diffuse reflectance spectroscopic imaging. Different image texture features have been applied to such images to separate precancerous from benign cases. These features are extracted based on co-occurrence matrix, wavelet decomposition, fractal signature, and granulometric approaches. The results so far indicate that fractal and wavelet-based features are effective in distinguishing precancerous from benign cases.
Imaging Spectrometry XX, 2015
Mathematics of Data/Image Coding, Compression, and Encryption VIII, with Applications, 2005
In digital security and authentication, watermarking has emerged as a solution to unauthorized di... more In digital security and authentication, watermarking has emerged as a solution to unauthorized digital copies, monitoring of broadcasts, information embedding, as well as end-user and transaction authentication. In the field of watermarking, the discrete cosine transform (DCT) domain, as well as other transform domains, have been shown to be advantageous over most spatial domain techniques by its increased robustness to