Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Entire DC Network

Reinforcement Learning: Applying Low Discrepancy Action Selection To Deep Deterministic Policy Gradient, Aleksandr Svishchev Jan 2024

Reinforcement Learning: Applying Low Discrepancy Action Selection To Deep Deterministic Policy Gradient, Aleksandr Svishchev

Electronic Theses and Dissertations

Reinforcement learning (RL) is a subfield of machine learning concerned with agents learning to behave optimally by interacting with an environment. One of the most important topics in RL is how the agent should explore, that is, how to choose actions in order to rate their impact on long-term reward. For example, a simple baseline strategy might be uniformly random action selection. This thesis investigates the heuristic idea that agents will learn faster if they explore by factoring the environment’s state into their decision and intentionally choose actions which are as different as possible from what they have previously observed. …


Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene Jan 2024

Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene

Electronic Theses and Dissertations

This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …


Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman Jan 2024

Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman

Electronic Theses and Dissertations

Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …


Leveraging Targeted Regions Of Interest By Analyzing Code Comprehension With Ai-Enabled Eye-Tracking, Md Shakil Hossain Jan 2023

Leveraging Targeted Regions Of Interest By Analyzing Code Comprehension With Ai-Enabled Eye-Tracking, Md Shakil Hossain

Electronic Theses and Dissertations

Code comprehension studies techniques for extracting information that give insights on how code is understood. For educators teaching programming courses, this is an important but often difficult task, especially given the challenges of large class sizes, limited time, and grading resources. By analyzing where a student looks during a code comprehension task, instructors can gain insights into what information the student deems important and assess whether they are looking in the right areas of the code. The proportion of time spent viewing a part of the code is also a useful indicator of the student's decision-making process. The goal of …


Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …


Blockchain Securities Issues: Decentralized Identity System With Key Management Perspective, Olalekan O. Adaramola Jan 2023

Blockchain Securities Issues: Decentralized Identity System With Key Management Perspective, Olalekan O. Adaramola

Electronic Theses and Dissertations

Blockchain was created many years ago to solve the problems of data transfer Integrity, several years later the issues persist. Blockchain securities are one of the most important considerations to be investigated, and data integrity is about ensuring the accuracy and validity of messages such that when they are read, they are the same as when they were first written. It is of the opinion that passing information across from one person to another cannot be the same as it was first said at the onset. Our work investigated Blockchain security issues, studying Integrity emanating from transactions across the blocks …


Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran Jan 2023

Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran

Electronic Theses and Dissertations

Accessing websites with various devices has brought changes in the field of application development. The choice of cross-platform, reusable frameworks is very crucial in this era. This thesis embarks in the evaluation of front-end, back-end, and database technologies to address the status quo. Study-a explores front-end development, focusing on angular.js and react.js. Using these frameworks, comparative web applications were created and evaluated locally. Important insights were obtained through benchmark tests, lighthouse metrics, and architectural evaluations. React.js proves to be a performance leader in spite of the possible influence of a virtual machine, opening the door for additional research. Study b …


Campus Safety Data Gathering, Classification, And Ranking Based On Clery-Act Reports, Walaa F. Abo Elenin Jan 2023

Campus Safety Data Gathering, Classification, And Ranking Based On Clery-Act Reports, Walaa F. Abo Elenin

Electronic Theses and Dissertations

Most existing campus safety rankings are based on criminal incident history with minimal or no consideration of campus security conditions and standard safety measures. Campus safety information published by universities/colleges is usually conceptual/qualitative and not quantitative and are based-on criminal records of these campuses. Thus, no explicit and trusted ranking method for these campuses considers the level of compliance with the standard safety measures. A quantitative safety measure is important to compare different campuses easily and to learn about specific campus safety conditions.

In this thesis, we utilize Clery-Act reports of campuses to automatically analyze their safety conditions and generate …


Design And Implementation Of An Automatic Word Generator For Word Matching Interactives, Evan Miles Gertis Jan 2022

Design And Implementation Of An Automatic Word Generator For Word Matching Interactives, Evan Miles Gertis

Electronic Theses and Dissertations

An Automatic Word Match Generator is a software tool that can be used to generate word-matching interactives automatically. The purpose of a word-matching interactive is to provide students with the mechanism to learn new vocabulary and improve their reading comprehension skills. This thesis will present the design and implementation of an Automatic Word Match Generator, as well as the research and algorithms used in the program.


Eeg Signals Classification Using Lstm-Based Models And Majority Logic, James A. Orgeron Jan 2022

Eeg Signals Classification Using Lstm-Based Models And Majority Logic, James A. Orgeron

Electronic Theses and Dissertations

The study of elecroencephalograms (EEGs) has gained enormous interest in the last decade with the increase of computational power and availability of EEG signals collected from various human activities or produced during medical tests. The applicability of analyzing EEG signals ranges from helping impaired people communicate or move (using appropriate medical equipment) to understanding people's feelings and detecting diseases.

We proposed new methodology and models for analyzing and classifying EEG signals collected from individuals observing visual stimuli. Our models rely on powerful Long-Short Term Memory (LSTM) Neural Network models, which are currently the state of the art models for performing …


License Plate Image Quality Enhancement Utilizing Super Resolution Generative Adversarial Networks, Mark Moelter Jan 2022

License Plate Image Quality Enhancement Utilizing Super Resolution Generative Adversarial Networks, Mark Moelter

Electronic Theses and Dissertations

This thesis focuses primarily on enhancing the image quality of blurred license plates through the use of Super-Resolution Generative Adversarial Networks (SRGANs) [1]. We propose a synthetic dataset with SRGAN model to promote blurred image quality enhancement, and allow for model evaluation on a multitude of image input and output size combinations. SRGAN is mainly used for low-resolution image enhancement, but by heavily blurring the input images, the model is tested on its ability to blindly deblur and upsample images to the desired super-resolution (SR) size. The model enhances the image quality to nearly that of the reference images. The …


The Application Of Deep Learning And Cloud Technologies To Data Science, Ian A. Trawinski Jan 2022

The Application Of Deep Learning And Cloud Technologies To Data Science, Ian A. Trawinski

Electronic Theses and Dissertations

Machine Learning and Cloud Computing have become a staple to businesses and educational institutions over the recent years. The two forefronts of big data solutions have garnered technology giants to race for the superior implementation of both Machine Learning and Cloud Computing. The objective of this thesis is to test and utilize AWS SageMaker in three different applications: time-series forecasting with sentiment analysis, automated Machine Learning (AutoML), and finally anomaly detection. The first study covered is a sentiment-based LSTM for stock price prediction. The LSTM was created with two methods, the first being SQL Server Data Tools, and the second …


Developing And Validating A Machine Learning-Based Student Attentiveness Tracking System, Andrew L. Sanders Jan 2022

Developing And Validating A Machine Learning-Based Student Attentiveness Tracking System, Andrew L. Sanders

Electronic Theses and Dissertations

Academic instructors and institutions desire the ability to accurately and autonomously measure the attentiveness of students in the classroom. Generally, college departments use unreliable direct communication from students (i.e. emails, phone calls), distracting and Hawthorne effect-inducing observational sit-ins, and end-of-semester surveys to collect feedback regarding their courses. Each of these methods of collecting feedback is useful but does not provide automatic feedback regarding the pace and direction of lectures. Young et al. discuss that attention levels during passive classroom lectures generally drop after about ten to thirty minutes and can be restored to normal levels with regular breaks, novel activities, …


Reinforcement Learning: Low Discrepancy Action Selection For Continuous States And Actions, Jedidiah Lindborg Jan 2022

Reinforcement Learning: Low Discrepancy Action Selection For Continuous States And Actions, Jedidiah Lindborg

Electronic Theses and Dissertations

In reinforcement learning the process of selecting an action during the exploration or exploitation stage is difficult to optimize. The purpose of this thesis is to create an action selection process for an agent by employing a low discrepancy action selection (LDAS) method. This should allow the agent to quickly determine the utility of its actions by prioritizing actions that are dissimilar to ones that it has already picked. In this way the learning process should be faster for the agent and result in more optimal policies.


Using Ai-Enabled Gaze Tracking System To Understand Comprehension Patterns Of Computer Science Students, Bradley Boswell Jan 2022

Using Ai-Enabled Gaze Tracking System To Understand Comprehension Patterns Of Computer Science Students, Bradley Boswell

Electronic Theses and Dissertations

Academic institutions and instructors lack the ability to accurately assess the moment-to-moment attentiveness of students in classrooms where students’ faces are obscured by computer monitors. This can cause the lectures of Computer Science, Information Technology, or other lab-based courses to be incorrectly-paced, which can lead to students having an overall poorer grasp of the subject material. We propose a system for real-time accurate detection of classroom attentiveness using monitor-mounted webcams and eye trackers, along with a Convolutional Neural Network machine learning model (NiCATS). Through the use of a neural network, we produce an initial attentiveness score based on student webcam …


Arnold Transformations As Applied To Data Encryption, Haley N. Anderson Jan 2021

Arnold Transformations As Applied To Data Encryption, Haley N. Anderson

Electronic Theses and Dissertations

As our world becomes increasingly digital, data security becomes key. Data must be encrypted such that it can be easily encrypted only by the intended recipient. Arnold Transformations are a useful tool in this because of its unpredictable periodicity. Our goal is to outline a method for choosing an Arnold Transformation that is both secure and easy to implement. We find the necessary and sufficient condition that a key matrix has periodicity. The chosen key matrix has a random structure, and it has a periodicity that is sufficiently high. We apply this method to several image and data string examples …


Lstm-Based Model For Human Brain Decisions Using Eeg Signals Analysis, Lorela Bano Jan 2021

Lstm-Based Model For Human Brain Decisions Using Eeg Signals Analysis, Lorela Bano

Electronic Theses and Dissertations

As machine learning models become more sophisticated, and biometric data becomes more readily available through new non-invasive technologies, it becomes increasingly possible to gain access to interesting biometric data that could revolutionize Human Computer Interaction. In this research, we propose a framework to assess and quantify human preference (like or dislike) on presenting various external visual stimuli. Our framework relies on an Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN) based model and on electroencephalogram (EEG) signals analysis to predict Like or Dislike preference of human subjects when presented with various marketing images.


Artificial Neural Network Models For Pattern Discovery From Ecg Time Series, Mehakpreet Kaur Jan 2020

Artificial Neural Network Models For Pattern Discovery From Ecg Time Series, Mehakpreet Kaur

Electronic Theses and Dissertations

Artificial Neural Network (ANN) models have recently become de facto models for deep learning with a wide range of applications spanning from scientific fields such as computer vision, physics, biology, medicine to social life (suggesting preferred movies, shopping lists, etc.). Due to advancements in computer technology and the increased practice of Artificial Intelligence (AI) in medicine and biological research, ANNs have been extensively applied not only to provide quick information about diseases, but also to make diagnostics accurate and cost-effective. We propose an ANN-based model to analyze a patient's electrocardiogram (ECG) data and produce accurate diagnostics regarding possible heart diseases …


Data Patterns Discovery Using Unsupervised Learning, Rachel A. Lewis Jan 2019

Data Patterns Discovery Using Unsupervised Learning, Rachel A. Lewis

Electronic Theses and Dissertations

Self-care activities classification poses significant challenges in identifying children’s unique functional abilities and needs within the exceptional children healthcare system. The accuracy of diagnosing a child's self-care problem, such as toileting or dressing, is highly influenced by an occupational therapists’ experience and time constraints. Thus, there is a need for objective means to detect and predict in advance the self-care problems of children with physical and motor disabilities. We use clustering to discover interesting information from self-care problems, perform automatic classification of binary data, and discover outliers. The advantages are twofold: the advancement of knowledge on identifying self-care problems in …


Regression Tree Construction For Reinforcement Learning Problems With A General Action Space, Anthony S. Bush Jr Jan 2019

Regression Tree Construction For Reinforcement Learning Problems With A General Action Space, Anthony S. Bush Jr

Electronic Theses and Dissertations

Part of the implementation of Reinforcement Learning is constructing a regression of values against states and actions and using that regression model to optimize over actions for a given state. One such common regression technique is that of a decision tree; or in the case of continuous input, a regression tree. In such a case, we fix the states and optimize over actions; however, standard regression trees do not easily optimize over a subset of the input variables\cite{Card1993}. The technique we propose in this thesis is a hybrid of regression trees and kernel regression. First, a regression tree splits over …


Ifocus: A Framework For Non-Intrusive Assessment Of Student Attention Level In Classrooms, Narayanan Veliyath Jan 2019

Ifocus: A Framework For Non-Intrusive Assessment Of Student Attention Level In Classrooms, Narayanan Veliyath

Electronic Theses and Dissertations

The process of learning is not merely determined by what the instructor teaches, but also by how the student receives that information. An attentive student will naturally be more open to obtaining knowledge than a bored or frustrated student. In recent years, tools such as skin temperature measurements and body posture calculations have been developed for the purpose of determining a student's affect, or emotional state of mind. However, measuring eye-gaze data is particularly noteworthy in that it can collect measurements non-intrusively, while also being relatively simple to set up and use. This paper details how data obtained from such …


The Relationship Between Housing Affordability And Demographic Factors: Case Study For The Atlanta Beltline, Chapman T. Lindstrom Jan 2019

The Relationship Between Housing Affordability And Demographic Factors: Case Study For The Atlanta Beltline, Chapman T. Lindstrom

Electronic Theses and Dissertations

Housing affordability has been a widely examined subject for populations residing in major metropolitan regions around the world. The relationship between housing affordability and the city’s demographics and its volume of urban development are important to take into consideration. In the past two decades there has been an increasing volume of literature detailing Atlanta Georgia’s large-scale redevelopment project, the Atlanta BeltLine (ABL), and its relationship with Atlanta’s Metropolitan population and housing affordability. The first objective of this paper is to study the relationship between housing affordability at two scales within the Atlanta Metropolitan Area (AMA) for both renters and homeowners. …


Determining Political Inclination In Tweets Using Transfer Learning, Mehtab Iqbal Jan 2019

Determining Political Inclination In Tweets Using Transfer Learning, Mehtab Iqbal

Electronic Theses and Dissertations

Last few years have seen tremendous development in neural language modeling for transfer learning and downstream applications. In this research, I used Howard and Ruder’s Universal Language Model Fine Tuning (ULMFiT) pipeline to develop a classifier that can determine whether a tweet is politically left leaning or right leaning by likening the content to tweets posted by @TheDemocrats or @GOP accounts on Twitter. We achieved 87.7% accuracy in predicting political ideological inclination.


Security Analysis Of The Internet Of Things Using Digital Forensic And Penetration Testing Tools, Olajide Ojagbule Jan 2019

Security Analysis Of The Internet Of Things Using Digital Forensic And Penetration Testing Tools, Olajide Ojagbule

Electronic Theses and Dissertations

We exist in a universe where everything is related to the internet or each other like smart TVs, smart telephones, smart thermostat, cars and more. Internet of Things has become one of the most talked about technologies across the world and its applications range from the control of home appliances in a smart home to the control of machines on the production floor of an industry that requires less human intervention in performing basic daily tasks. Internet of Things has rapidly developed without adequate attention given to the security and privacy goals involved in its design and implementation. This document …


Computer Vision-Based Traffic Sign Detection And Extraction: A Hybrid Approach Using Gis And Machine Learning, Zihao Wu Jan 2019

Computer Vision-Based Traffic Sign Detection And Extraction: A Hybrid Approach Using Gis And Machine Learning, Zihao Wu

Electronic Theses and Dissertations

Traffic sign detection and positioning have drawn considerable attention because of the recent development of autonomous driving and intelligent transportation systems. In order to detect and pinpoint traffic signs accurately, this research proposes two methods. In the first method, geo-tagged Google Street View images and road networks were utilized to locate traffic signs. In the second method, both traffic signs categories and locations were identified and extracted from the location-based GoPro video. TensorFlow is the machine learning framework used to implement these two methods. To that end, 363 stop signs were detected and mapped accurately using the first method (Google …


Multiclass Classification Using Support Vector Machines, Duleep Prasanna W. Rathgamage Don Jan 2018

Multiclass Classification Using Support Vector Machines, Duleep Prasanna W. Rathgamage Don

Electronic Theses and Dissertations

In this thesis, we discuss different SVM methods for multiclass classification and introduce the Divide and Conquer Support Vector Machine (DCSVM) algorithm which relies on data sparsity in high dimensional space and performs a smart partitioning of the whole training data set into disjoint subsets that are easily separable. A single prediction performed between two partitions eliminates one or more classes in a single partition, leaving only a reduced number of candidate classes for subsequent steps. The algorithm continues recursively, reducing the number of classes at each step until a final binary decision is made between the last two classes …


Isolated Mobile Malware Observation, Augustine Paul Jan 2018

Isolated Mobile Malware Observation, Augustine Paul

Electronic Theses and Dissertations

The idea behind Bring Your Own Device (BYOD) it that personal mobile devices can be used in the workplace to enhance convenience and flexibility. This development encourages organizations to allow access of personal mobile devices to business information and systems for businesses operation. However, BYOD opens a firm to various security risks such as data contamination and the exposure of user interest to criminal activities. Mobile devices were not designed to handle intense data security and advanced security features are frequently turned off. Using personal mobile devices can also expose a system to various forms of security threats like malware. …


Old English Character Recognition Using Neural Networks, Sattajit Sutradhar Jan 2018

Old English Character Recognition Using Neural Networks, Sattajit Sutradhar

Electronic Theses and Dissertations

Character recognition has been capturing the interest of researchers since the beginning of the twentieth century. While the Optical Character Recognition for printed material is very robust and widespread nowadays, the recognition of handwritten materials lags behind. In our digital era more and more historical, handwritten documents are digitized and made available to the general public. However, these digital copies of handwritten materials lack the automatic content recognition feature of their printed materials counterparts. We are proposing a practical, accurate, and computationally efficient method for Old English character recognition from manuscript images. Our method relies on a modern machine learning …


Multiclass Classification Of Risk Factors For Cervical Cancer Using Artificial Neural Networks, Abdullah Al Mamun Jan 2018

Multiclass Classification Of Risk Factors For Cervical Cancer Using Artificial Neural Networks, Abdullah Al Mamun

Electronic Theses and Dissertations

World Health Organization statistics show that cervical cancer is the fourth most frequent cancer in women with an estimated 530,000 new cases in 2012. Cervical cancer diagnosis typically involves liquid-based cytology (LBC) followed by a pathologist review. The accuracy of decision is therefore highly influenced by the expert’s skills and experience, resulting in relatively high false positive and/or false negative rates. Moreover, given the fact that the data being analyzed is highly dimensional, same reviewer’s decision is inherently affected by inconsistencies in interpreting the data. In this study, we use an Artificial Neural Network based model that aims to considerably …


Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. Mcpherson Jan 2017

Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. Mcpherson

Electronic Theses and Dissertations

Since their introduction in the 1970s, relational database management systems have served as the dominate data storage technology. However, the demands of big data and Web 2.0 necessitated a change in the market, sparking the beginning of the NoSQL movement in the late 2000s. NoSQL databases exchanged the relational model and the guaranteed consistency of ACID transactions for improved performance and massive scalability [1]. While the benefits NoSQL provided proved useful, the lack of sufficient SQL functionality presented a major hurdle for organizations which require it to properly operate. It was clear that new RDBMS solutions which did not compromise …