Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Entire DC Network
I-Nicemo Enhanced Algorithm Based On Intersection Angel Geometry, Yifan He, Yulin He, Yongda Cai, Zhexue Huang
I-Nicemo Enhanced Algorithm Based On Intersection Angel Geometry, Yifan He, Yulin He, Yongda Cai, Zhexue Huang
Journal of System Simulation
Abstract: To exactly determine the number of cluster centers and correctly identify the candidate cluster centers, an I-niceMO enhanced(I-niceMOEn) algorithm based on intersection angel geometry is proposed. As many distributions of intersection angles and distances as possible between observation points and data points are utilized to recognize the candidate cluster centers to avoid the neglection of cluster centers. The spectral clustering algorithm is used to automatically merge the candidate cluster centers according to the eigenvalues of Laplacian matrices. The number of final cluster centers is determined by the number of merged candidate cluster centers. The number of clusters can be …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer
Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.
Neuromorphic Computing Applications In Robotics, Noah Zins
Neuromorphic Computing Applications In Robotics, Noah Zins
Dissertations, Master's Theses and Master's Reports
Deep learning achieves remarkable success through training using massively labeled datasets. However, the high demands on the datasets impede the feasibility of deep learning in edge computing scenarios and suffer from the data scarcity issue. Rather than relying on labeled data, animals learn by interacting with their surroundings and memorizing the relationships between events and objects. This learning paradigm is referred to as associative learning. The successful implementation of associative learning imitates self-learning schemes analogous to animals which resolve the challenges of deep learning. Current state-of-the-art implementations of associative memory are limited to simulations with small-scale and offline paradigms. Thus, …
Face Anti-Spoofing And Deep Learning Based Unsupervised Image Recognition Systems, Enoch Solomon
Face Anti-Spoofing And Deep Learning Based Unsupervised Image Recognition Systems, Enoch Solomon
Theses and Dissertations
One of the main problems of a supervised deep learning approach is that it requires large amounts of labeled training data, which are not always easily available. This PhD dissertation addresses the above-mentioned problem by using a novel unsupervised deep learning face verification system called UFace, that does not require labeled training data as it automatically, in an unsupervised way, generates training data from even a relatively small size of data. The method starts by selecting, in unsupervised way, k-most similar and k-most dissimilar images for a given face image. Moreover, this PhD dissertation proposes a new loss function to …
Unsupervised Contrastive Representation Learning For Knowledge Distillation And Clustering, Fei Ding
Unsupervised Contrastive Representation Learning For Knowledge Distillation And Clustering, Fei Ding
All Dissertations
Unsupervised contrastive learning has emerged as an important training strategy to learn representation by pulling positive samples closer and pushing negative samples apart in low-dimensional latent space. Usually, positive samples are the augmented versions of the same input and negative samples are from different inputs. Once the low-dimensional representations are learned, further analysis, such as clustering, and classification can be performed using the representations. Currently, there are two challenges in this framework. First, the empirical studies reveal that even though contrastive learning methods show great progress in representation learning on large model training, they do not work well for small …
One-Stage Blind Source Separation Via A Sparse Autoencoder Framework, Jason Anthony Dabin
One-Stage Blind Source Separation Via A Sparse Autoencoder Framework, Jason Anthony Dabin
Dissertations
Blind source separation (BSS) is the process of recovering individual source transmissions from a received mixture of co-channel signals without a priori knowledge of the channel mixing matrix or transmitted source signals. The received co-channel composite signal is considered to be captured across an antenna array or sensor network and is assumed to contain sparse transmissions, as users are active and inactive aperiodically over time. An unsupervised machine learning approach using an artificial feedforward neural network sparse autoencoder with one hidden layer is formulated for blindly recovering the channel matrix and source activity of co-channel transmissions. The BSS sparse autoencoder …
Unsupervised Learning With Word Embeddings Captures Quiescent Knowledge From Covid-19 And Materials Science Literature, Tasnim H. Gharaibeh
Unsupervised Learning With Word Embeddings Captures Quiescent Knowledge From Covid-19 And Materials Science Literature, Tasnim H. Gharaibeh
Dissertations
Millions of scientific papers are produced each year and the scientific literature is continuing to grow at a head-spinning speed. Thus, massive scientific knowledge exists in solid text, but all these publications make it difficult, if not impossible, for researchers to keep in up to date with discoveries, even within a narrow scientific area. This massive amount of information also makes it difficult to find implicit and hidden connections, relationships, and dependencies within the information that may guide the direction of future research or lead to valuable new insights. So, there is a need for algorithms or models that can …
Constrained Contrastive Distribution Learning For Unsupervised Anomaly Detection And Localisation In Medical Images, Yu Tian, Guansong Pang, Fengbei Liu, Yuanhong Chen, Seon Ho Shin, Johan W. Verjans, Rajvinder Singh
Constrained Contrastive Distribution Learning For Unsupervised Anomaly Detection And Localisation In Medical Images, Yu Tian, Guansong Pang, Fengbei Liu, Yuanhong Chen, Seon Ho Shin, Johan W. Verjans, Rajvinder Singh
Research Collection School Of Computing and Information Systems
Unsupervised anomaly detection (UAD) learns one-class classifiers exclusively with normal (i.e., healthy) images to detect any abnormal (i.e., unhealthy) samples that do not conform to the expected normal patterns. UAD has two main advantages over its fully supervised counterpart. Firstly, it is able to directly leverage large datasets available from health screening programs that contain mostly normal image samples, avoiding the costly manual labelling of abnormal samples and the subsequent issues involved in training with extremely class-imbalanced data. Further, UAD approaches can potentially detect and localise any type of lesions that deviate from the normal patterns. One significant challenge faced …
Probabilistic Spiking Neural Networks : Supervised, Unsupervised And Adversarial Trainings, Alireza Bagheri
Probabilistic Spiking Neural Networks : Supervised, Unsupervised And Adversarial Trainings, Alireza Bagheri
Dissertations
Spiking Neural Networks (SNNs), or third-generation neural networks, are networks of computation units, called neurons, in which each neuron with internal analogue dynamics receives as input and produces as output spiking, that is, binary sparse, signals. In contrast, second-generation neural networks, termed as Artificial Neural Networks (ANNs), rely on simple static non-linear neurons that are known to be energy-intensive, hindering their implementations on energy-limited processors such as mobile devices. The sparse event-based characteristics of SNNs for information transmission and encoding have made them more feasible for highly energy-efficient neuromorphic computing architectures. The most existing training algorithms for SNNs are based …
Using Computer Vision To Quantify Coral Reef Biodiversity, Niket Bhodia
Using Computer Vision To Quantify Coral Reef Biodiversity, Niket Bhodia
Master's Projects
The preservation of the world’s oceans is crucial to human survival on this planet, yet we know too little to begin to understand anthropogenic impacts on marine life. This is especially true for coral reefs, which are the most diverse marine habitat per unit area (if not overall) as well as the most sensitive. To address this gap in knowledge, simple field devices called autonomous reef monitoring structures (ARMS) have been developed, which provide standardized samples of life from these complex ecosystems. ARMS have now become successful to the point that the amount of data collected through them has outstripped …
Ai Education: Machine Learning Resources, Todd W. Neller
Ai Education: Machine Learning Resources, Todd W. Neller
Computer Science Faculty Publications
In this column, we focus on resources for learning and teaching three broad categories of machine learning (ML): supervised, unsupervised, and reinforcement learning. In ournext column, we will focus specifically on deep neural network learning resources, so if you have any resource recommendations, please email them to the address above. [excerpt]