Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

I-Nicemo Enhanced Algorithm Based On Intersection Angel Geometry, Yifan He, Yulin He, Yongda Cai, Zhexue Huang Apr 2023

I-Nicemo Enhanced Algorithm Based On Intersection Angel Geometry, Yifan He, Yulin He, Yongda Cai, Zhexue Huang

Journal of System Simulation

Abstract: To exactly determine the number of cluster centers and correctly identify the candidate cluster centers, an I-niceMO enhanced(I-niceMOEn) algorithm based on intersection angel geometry is proposed. As many distributions of intersection angles and distances as possible between observation points and data points are utilized to recognize the candidate cluster centers to avoid the neglection of cluster centers. The spectral clustering algorithm is used to automatically merge the candidate cluster centers according to the eigenvalues of Laplacian matrices. The number of final cluster centers is determined by the number of merged candidate cluster centers. The number of clusters can be …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer Mar 2023

Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.


Neuromorphic Computing Applications In Robotics, Noah Zins Jan 2023

Neuromorphic Computing Applications In Robotics, Noah Zins

Dissertations, Master's Theses and Master's Reports

Deep learning achieves remarkable success through training using massively labeled datasets. However, the high demands on the datasets impede the feasibility of deep learning in edge computing scenarios and suffer from the data scarcity issue. Rather than relying on labeled data, animals learn by interacting with their surroundings and memorizing the relationships between events and objects. This learning paradigm is referred to as associative learning. The successful implementation of associative learning imitates self-learning schemes analogous to animals which resolve the challenges of deep learning. Current state-of-the-art implementations of associative memory are limited to simulations with small-scale and offline paradigms. Thus, …


Face Anti-Spoofing And Deep Learning Based Unsupervised Image Recognition Systems, Enoch Solomon Jan 2023

Face Anti-Spoofing And Deep Learning Based Unsupervised Image Recognition Systems, Enoch Solomon

Theses and Dissertations

One of the main problems of a supervised deep learning approach is that it requires large amounts of labeled training data, which are not always easily available. This PhD dissertation addresses the above-mentioned problem by using a novel unsupervised deep learning face verification system called UFace, that does not require labeled training data as it automatically, in an unsupervised way, generates training data from even a relatively small size of data. The method starts by selecting, in unsupervised way, k-most similar and k-most dissimilar images for a given face image. Moreover, this PhD dissertation proposes a new loss function to …


Unsupervised Contrastive Representation Learning For Knowledge Distillation And Clustering, Fei Ding Aug 2022

Unsupervised Contrastive Representation Learning For Knowledge Distillation And Clustering, Fei Ding

All Dissertations

Unsupervised contrastive learning has emerged as an important training strategy to learn representation by pulling positive samples closer and pushing negative samples apart in low-dimensional latent space. Usually, positive samples are the augmented versions of the same input and negative samples are from different inputs. Once the low-dimensional representations are learned, further analysis, such as clustering, and classification can be performed using the representations. Currently, there are two challenges in this framework. First, the empirical studies reveal that even though contrastive learning methods show great progress in representation learning on large model training, they do not work well for small …


One-Stage Blind Source Separation Via A Sparse Autoencoder Framework, Jason Anthony Dabin May 2022

One-Stage Blind Source Separation Via A Sparse Autoencoder Framework, Jason Anthony Dabin

Dissertations

Blind source separation (BSS) is the process of recovering individual source transmissions from a received mixture of co-channel signals without a priori knowledge of the channel mixing matrix or transmitted source signals. The received co-channel composite signal is considered to be captured across an antenna array or sensor network and is assumed to contain sparse transmissions, as users are active and inactive aperiodically over time. An unsupervised machine learning approach using an artificial feedforward neural network sparse autoencoder with one hidden layer is formulated for blindly recovering the channel matrix and source activity of co-channel transmissions. The BSS sparse autoencoder …


Unsupervised Learning With Word Embeddings Captures Quiescent Knowledge From Covid-19 And Materials Science Literature, Tasnim H. Gharaibeh Apr 2022

Unsupervised Learning With Word Embeddings Captures Quiescent Knowledge From Covid-19 And Materials Science Literature, Tasnim H. Gharaibeh

Dissertations

Millions of scientific papers are produced each year and the scientific literature is continuing to grow at a head-spinning speed. Thus, massive scientific knowledge exists in solid text, but all these publications make it difficult, if not impossible, for researchers to keep in up to date with discoveries, even within a narrow scientific area. This massive amount of information also makes it difficult to find implicit and hidden connections, relationships, and dependencies within the information that may guide the direction of future research or lead to valuable new insights. So, there is a need for algorithms or models that can …


Constrained Contrastive Distribution Learning For Unsupervised Anomaly Detection And Localisation In Medical Images, Yu Tian, Guansong Pang, Fengbei Liu, Yuanhong Chen, Seon Ho Shin, Johan W. Verjans, Rajvinder Singh Oct 2021

Constrained Contrastive Distribution Learning For Unsupervised Anomaly Detection And Localisation In Medical Images, Yu Tian, Guansong Pang, Fengbei Liu, Yuanhong Chen, Seon Ho Shin, Johan W. Verjans, Rajvinder Singh

Research Collection School Of Computing and Information Systems

Unsupervised anomaly detection (UAD) learns one-class classifiers exclusively with normal (i.e., healthy) images to detect any abnormal (i.e., unhealthy) samples that do not conform to the expected normal patterns. UAD has two main advantages over its fully supervised counterpart. Firstly, it is able to directly leverage large datasets available from health screening programs that contain mostly normal image samples, avoiding the costly manual labelling of abnormal samples and the subsequent issues involved in training with extremely class-imbalanced data. Further, UAD approaches can potentially detect and localise any type of lesions that deviate from the normal patterns. One significant challenge faced …


Probabilistic Spiking Neural Networks : Supervised, Unsupervised And Adversarial Trainings, Alireza Bagheri May 2019

Probabilistic Spiking Neural Networks : Supervised, Unsupervised And Adversarial Trainings, Alireza Bagheri

Dissertations

Spiking Neural Networks (SNNs), or third-generation neural networks, are networks of computation units, called neurons, in which each neuron with internal analogue dynamics receives as input and produces as output spiking, that is, binary sparse, signals. In contrast, second-generation neural networks, termed as Artificial Neural Networks (ANNs), rely on simple static non-linear neurons that are known to be energy-intensive, hindering their implementations on energy-limited processors such as mobile devices. The sparse event-based characteristics of SNNs for information transmission and encoding have made them more feasible for highly energy-efficient neuromorphic computing architectures. The most existing training algorithms for SNNs are based …


Using Computer Vision To Quantify Coral Reef Biodiversity, Niket Bhodia May 2019

Using Computer Vision To Quantify Coral Reef Biodiversity, Niket Bhodia

Master's Projects

The preservation of the world’s oceans is crucial to human survival on this planet, yet we know too little to begin to understand anthropogenic impacts on marine life. This is especially true for coral reefs, which are the most diverse marine habitat per unit area (if not overall) as well as the most sensitive. To address this gap in knowledge, simple field devices called autonomous reef monitoring structures (ARMS) have been developed, which provide standardized samples of life from these complex ecosystems. ARMS have now become successful to the point that the amount of data collected through them has outstripped …


Ai Education: Machine Learning Resources, Todd W. Neller Jan 2017

Ai Education: Machine Learning Resources, Todd W. Neller

Computer Science Faculty Publications

In this column, we focus on resources for learning and teaching three broad categories of machine learning (ML): supervised, unsupervised, and reinforcement learning. In ournext column, we will focus specifically on deep neural network learning resources, so if you have any resource recommendations, please email them to the address above. [excerpt]