Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2020

Machine learning

Institution
Publication
File Type

Articles 1 - 30 of 102

Full-Text Articles in Entire DC Network

Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni Dec 2020

Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni

Dissertations

Internet traffic classification or packet classification is the act of classifying packets using the extracted statistical data from the transmitted packets on a computer network. Internet traffic classification is an essential tool for Internet service providers to manage network traffic, provide users with the intended quality of service (QoS), and perform surveillance. QoS measures prioritize a network's traffic type over other traffic based on preset criteria; for instance, it gives higher priority or bandwidth to video traffic over website browsing traffic. Internet packet classification methods are also used for automated intrusion detection. They analyze incoming traffic patterns and identify malicious …


Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio Dec 2020

Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio

Masters Theses, 2020-current

The recent advancements made in Internet of Things (IoT) devices have brought forth new opportunities for technologies and systems to be integrated into our everyday life. In this work, we investigate how edge nodes can effectively utilize 802.11 wireless beacon frames being broadcast from pre-existing access points in a building to achieve room-level localization. We explain the needed hardware and software for this system and demonstrate a proof of concept with experimental data analysis. Improvements to localization accuracy are shown via machine learning by implementing the random forest algorithm. Using this algorithm, historical data can train the model and make …


Reasoning About User Feedback Under Identity Uncertainty In Knowledge Base Construction, Ariel Kobren Dec 2020

Reasoning About User Feedback Under Identity Uncertainty In Knowledge Base Construction, Ariel Kobren

Doctoral Dissertations

Intelligent, automated systems that are intertwined with everyday life---such as Google Search and virtual assistants like Amazon’s Alexa or Apple’s Siri---are often powered in part by knowledge bases (KBs), i.e., structured data repositories of entities, their attributes, and the relationships among them. Despite a wealth of research focused on automated KB construction methods, KBs are inevitably imperfect, with errors stemming from various points in the construction pipeline. Making matters more challenging, new data is created daily and must be integrated with existing KBs so that they remain up-to-date. As the primary consumers of KBs, human users have tremendous potential to …


Semi-Automatic Hand Pose Estimation Using A Single Depth Camera, Giffy Jerald Chris Dec 2020

Semi-Automatic Hand Pose Estimation Using A Single Depth Camera, Giffy Jerald Chris

Computer Science and Engineering Theses

This paper addresses the problem of 3D hand pose annotations using a single depth camera. Although hand pose estimation methods rely critically on accurate 3D training data, creating such reliable training data is challenging and labor intensive. We propose a semi-automatic method for efficiently and accurately labeling the 3D hand key-points in a hand depth video. The process starts by selecting a subset of frames that are representative of all the frames in the dataset and the annotator only provides an estimate of the 2D hand key-points in these selected frames. We use this information to infer the 3D location …


Generating Adversarial Examples For Recruitment Ranking Algorithms, Anahita Samadi Dec 2020

Generating Adversarial Examples For Recruitment Ranking Algorithms, Anahita Samadi

Computer Science and Engineering Theses

There is no doubt that recruitment process plays an important role for both employers and applicants. Based on huge number of job candidates and open vacancies, recruitment process is expensive, time consuming and stressful for both applicants and companies. In today’s world so many recruitment processes are based on machine learning techniques. Therefore, it is very important to ensure security of these algorithms. Adversarial examples are proposed to examine vulnerability of machine leaning algorithms. Many research studies have been done on evaluating the resistance of artificial intelligence-based systems, in computer vision and text classification, against adversarial examples. However, to the …


Acquisition, Processing, And Analysis Of Video, Audio And Meteorological Data In Multi-Sensor Electronic Beehive Monitoring, Sarbajit Mukherjee Dec 2020

Acquisition, Processing, And Analysis Of Video, Audio And Meteorological Data In Multi-Sensor Electronic Beehive Monitoring, Sarbajit Mukherjee

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

In recent years, a widespread decline has been seen in honey bee population and this is widely attributed to colony collapse disorder. Hence, it is of utmost importance that a system is designed to gather relevant information. This will allow for a deeper understanding of the possible reasons behind the above phenomenon to aid in the design of suitable countermeasures.

Electronic Beehive Monitoring is one such way of gathering critical information regarding a colony’s health and behavior without invasive beehive inspections. In this dissertation, we have presented an electronic beehive monitoring system called BeePi that can be placed on top …


Deep Q Learning Applied To Stock Trading, Agnibh Dasgupta Dec 2020

Deep Q Learning Applied To Stock Trading, Agnibh Dasgupta

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Developing a strategy for stock trading is a vital task for investors. However, it is challenging to obtain an optimal strategy, given the complex and dynamic nature of the stock market. This thesis aims to explore the applications of Reinforcement Learning with the goal of maximizing returns from market investment, keeping in mind the human aspect of trading by utilizing stock prices represented as candlestick graphs. Furthermore, the algorithm studies public interest patterns in form of graphs extracted from Google Trends to make predictions. Deep Q learning has been used to train an agent based on fused images of stock …


Unsupervised Structural Graph Node Representation Learning, Mikel Joaristi Dec 2020

Unsupervised Structural Graph Node Representation Learning, Mikel Joaristi

Boise State University Theses and Dissertations

Unsupervised Graph Representation Learning methods learn a numerical representation of the nodes in a graph. The generated representations encode meaningful information about the nodes' properties, making them a powerful tool for tasks in many areas of study, such as social sciences, biology or communication networks. These methods are particularly interesting because they facilitate the direct use of standard Machine Learning models on graphs. Graph representation learning methods can be divided into two main categories depending on the information they encode, methods preserving the nodes connectivity information, and methods preserving nodes' structural information. Connectivity-based methods focus on encoding relationships between nodes, …


A Targeted Adversarial Attack On Support Vector Machine Using The Boundary Line, Yessenia Rodriguez Dec 2020

A Targeted Adversarial Attack On Support Vector Machine Using The Boundary Line, Yessenia Rodriguez

Theses and Dissertations

In this thesis, a targeted adversarial attack is explored on a Support Vector Machine (SVM). SVM is defined by creating a separating boundary between two classes. Using a target class, any input can be modified to cross the “boundary line,” making the model predict the target class. To limit the modification, a percentage of an image of the target class is used to get several random sections. Using these sections, the input will be moved in small steps closer to the boundary point. The section that took the least number of steps to cause the model to predict the target …


Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang Dec 2020

Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang

Computational Modeling & Simulation Engineering Theses & Dissertations

Traffic incident analysis is a crucial task in traffic management centers (TMCs) that typically manage many highways with limited staff and resources. An effective automatic incident analysis approach that can report abnormal events timely and accurately will benefit TMCs in optimizing the use of limited incident response and management resources. During the past decades, significant efforts have been made by researchers towards the development of data-driven approaches for incident analysis. Nevertheless, many developed approaches have shown limited success in the field. This is largely attributed to the long detection time (i.e., waiting for overwhelmed upstream detection stations; meanwhile, downstream stations …


Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi Dec 2020

Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi

Dissertations

Big data analysis is essential for many smart applications in areas such as connected healthcare, intelligent transportation, human activity recognition, environment, and climate change monitoring. Traditional data mining algorithms do not scale well to big data due to the enormous number of data points and the velocity of their generation. Mining and learning from big data need time and memory efficiency techniques, albeit the cost of possible loss in accuracy. This research focuses on the mining of big data using aggregated data as input. We developed a data structure that is to be used to aggregate data at multiple resolutions. …


New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger Nov 2020

New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger

Theses

Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …


Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak Nov 2020

Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak

USF Tampa Graduate Theses and Dissertations

The commercial platforms that use recommender systems can collect relevant information to produce useful recommendations to the platform users. However, these sources usually contain missing values, imbalanced and heterogeneous data, and noisy observations. Such characteristics render the process of exploiting the information nontrivial, as one should carefully address them during the data fusion process. In addition to the degenerative characteristics, some entries can be fake, i.e., they can be the outcomes of malicious intents to manipulate the system. These entries should be eliminated before incorporation to any recommendation task. Detecting such malicious attacks quickly and accurately and then mitigating them …


Exploring The Potential Of Sparse Coding For Machine Learning, Sheng Yang Lundquist Oct 2020

Exploring The Potential Of Sparse Coding For Machine Learning, Sheng Yang Lundquist

Dissertations and Theses

While deep learning has proven to be successful for various tasks in the field of computer vision, there are several limitations of deep-learning models when compared to human performance. Specifically, human vision is largely robust to noise and distortions, whereas deep learning performance tends to be brittle to modifications of test images, including being susceptible to adversarial examples. Additionally, deep-learning methods typically require very large collections of training examples for good performance on a task, whereas humans can learn to perform the same task with a much smaller number of training examples.

In this dissertation, I investigate whether the use …


Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel Sep 2020

Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel

Theses and Dissertations

The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …


Hybrid Deep Neural Networks For Mining Heterogeneous Data, Xiurui Hou Aug 2020

Hybrid Deep Neural Networks For Mining Heterogeneous Data, Xiurui Hou

Dissertations

In the era of big data, the rapidly growing flood of data represents an immense opportunity. New computational methods are desired to fully leverage the potential that exists within massive structured and unstructured data. However, decision-makers are often confronted with multiple diverse heterogeneous data sources. The heterogeneity includes different data types, different granularities, and different dimensions, posing a fundamental challenge in many applications. This dissertation focuses on designing hybrid deep neural networks for modeling various kinds of data heterogeneity.

The first part of this dissertation concerns modeling diverse data types, the first kind of data heterogeneity. Specifically, image data and …


Enrichment Of Ontologies Using Machine Learning And Summarization, Hao Liu Aug 2020

Enrichment Of Ontologies Using Machine Learning And Summarization, Hao Liu

Dissertations

Biomedical ontologies are structured knowledge systems in biomedicine. They play a major role in enabling precise communications in support of healthcare applications, e.g., Electronic Healthcare Records (EHR) systems. Biomedical ontologies are used in many different contexts to facilitate information and knowledge management. The most widely used clinical ontology is the SNOMED CT. Placing a new concept into its proper position in an ontology is a fundamental task in its lifecycle of curation and enrichment.

A large biomedical ontology, which typically consists of many tens of thousands of concepts and relationships, can be viewed as a complex network with concepts as …


Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari Aug 2020

Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari

Dissertations

A myriad of emerging applications from simple to complex ones involve human cognizance in the computation loop. Using the wisdom of human workers, researchers have solved a variety of problems, termed as “micro-tasks” such as, captcha recognition, sentiment analysis, image categorization, query processing, as well as “complex tasks” that are often collaborative, such as, classifying craters on planetary surfaces, discovering new galaxies (Galaxyzoo), performing text translation. The current view of “humans-in-the-loop” tends to see humans as machines, robots, or low-level agents used or exploited in the service of broader computation goals. This dissertation is developed to shift the focus back …


Mind Maps And Machine Learning: An Automation Framework For Qualitative Research In Entrepreneurship Education, Yasser Farha Aug 2020

Mind Maps And Machine Learning: An Automation Framework For Qualitative Research In Entrepreneurship Education, Yasser Farha

Dissertations

Entrepreneurship Education researchers often measure entrepreneurial motivation of college students. It is important for stakeholders, such as policymakers and educators, to assert if entrepreneurship education can encourage students to become entrepreneurs, as well as to understand factors that influence entrepreneurial motivation. For that purpose, researchers have used different methods and instruments to measure students' entrepreneurial motivation. Most of these methods are quantitative, e.g., closed-ended surveys, whereas qualitative methods, e.g., open-ended surveys, are rarely used.

Mind maps are an attractive qualitative survey tool because they capture the individual's reflections, thoughts, and experiences. For Entrepreneurship Education, mind maps can be utilized to …


Learning Health Information From Floor Sensor Data Within A Pervasive Smart Home Environment, Nicholas Brent Burns Aug 2020

Learning Health Information From Floor Sensor Data Within A Pervasive Smart Home Environment, Nicholas Brent Burns

Computer Science and Engineering Dissertations

Spatial and temporal gait analysis can provide useful measures for determining a person’s state of health while also identifying deviations in day-to-day activity. The SmartCare project is a multi-discipline health technologies project that aims to provide an unobtrusive and pervasive system that provides in-home health monitoring for the elderly. This research work focuses on the pressure-sensitive smart floor of the SmartCare project by using an experimental floor to develop methods for future use on a floor deployed within a home. This work presents a procedure to automatically calibrate a smart floor’s pressure sensors without specialized physical effort. The calibration algorithm …


Efficient Construction And Explanation Of Machine Learning Models Through Database Techniques, Sona Hasani Aug 2020

Efficient Construction And Explanation Of Machine Learning Models Through Database Techniques, Sona Hasani

Computer Science and Engineering Dissertations

Machine learning (ML) has been widely adopted in the last few years and it has had an undeniable impact on the ways many organizations make decisions. While great advances have been made in developing new ML algorithms and applications, there is a major need for scalable ML solutions in order to meet the demands of the Big data era. In this dissertation, we focus on improving the efficiency of two main machine learning solutions through database techniques: i) efficient construction of machine learning models, and ii) efficient explanation of machine learning models for multiple predictions. First, we introduce application of …


Person Identification And Tinetti Score Assessment Using Balance Parameters To Determine Fall Risk, Varsha Rani Chawan Aug 2020

Person Identification And Tinetti Score Assessment Using Balance Parameters To Determine Fall Risk, Varsha Rani Chawan

Computer Science and Engineering Theses

This thesis is aimed at a substantial health problem among the elderly population that is “Fall”, a major cause of accidental home deaths. Studies show approximately one-third of community-dwelling people over 65 years of age will experience one or more falls each year. The balance and walking pattern are useful to determine the risk of fall in an individual and is highly influenced by several parameters and conditions. The deterioration in the balance and walking stability of an individual can occur because of the natural processes related to aging or as a result of various underlying health conditions, fatigue, muscle …


Computer Vision Methods For Sign Language And Cognitive Evaluation Through Physical Tasks, Alex J. Dillhoff Aug 2020

Computer Vision Methods For Sign Language And Cognitive Evaluation Through Physical Tasks, Alex J. Dillhoff

Computer Science and Engineering Dissertations

Analyzing human motion is vital for a multitude of tasks including human-computer interaction, sign language recognition, and the assessment of cognitive disorders. Providing automatic assessments for cognitive disorders increases the accessibility and affordability of life-changing tests and treatments. For sign language recognition, automated translation systems bridge the gap between native and non-native signers. Additionally, dictionary look-up systems are helpful for native signers learning a new language. Common to both of these tasks is the reliance of fine motor function in the hands. Hand Pose Estimation methods are used to drive applications that rely on hand shape. These tasks present unique …


Classification Of Factual And Non-Factual Statements Using Adversarially Trained Lstm Networks, Daniel Obembe Aug 2020

Classification Of Factual And Non-Factual Statements Using Adversarially Trained Lstm Networks, Daniel Obembe

Computer Science and Engineering Theses

Being able to determine which statements are factual and therefore likely candidates for further verification is a key value-add in any automated fact-checking system. For this task, it has been shown that LSTMs outperform regular machine learning models, such as SVMs. However, the complexity of LSTMs can also result in over fitting (Gal and Ghahramani,1997), leading to poorer performance as models fail to generalize. To resolve this issue, we set out to utilize adversarial training as away to improve the performance of LSTMs for the task of classifying statements as factual or non-factual. In our experiment, we implement the adversarial …


Hand-Over-Face Segmentation, Sakher Ghanem Aug 2020

Hand-Over-Face Segmentation, Sakher Ghanem

Computer Science and Engineering Dissertations

Accurate hand segmentation is vital in many applications in which the hands play a central role, such as sign language recognition, action recognition, and gesture recognition. A relatively unexplored obstacle to correct hand segmentation is when the hand overlaps the face. The shortage of a dataset for this research area has been one motivation for this work. However, this dissertation investigates and proposes improvements for the hand-over-face segmentation task. Toward an in-depth study of the hand segmentation problem, the work presented in this dissertation will yield several contributions. First, it introduces a survey on sign language recognition systems using mobile …


In Situ Sensor Calibration Using Noise Consistency, Shriiesh Var Sharma Aug 2020

In Situ Sensor Calibration Using Noise Consistency, Shriiesh Var Sharma

Computer Science and Engineering Theses

Robots rely on sensors to map their surroundings. As a result, the accuracy of the map depends heavily on the sensor noise and in particular on accurate knowledge of it. The common way to minimize the impact of sensor noise is to use filtering algorithms. Accuracy of these filtering algorithms (like the Kalman filter) relies on the accuracy of the user supplied measurement noise model. Inaccurate noise models lead to higher residual noise in state estimates and errors in the estimate of the precision of the state estimate. It is therefore important to have precise noise models and thus accurately …


Development And Identification Of Metrics To Predict The Impact Of Dimension Reduction Techniques On Classical Machine Learning Algorithms For Still Highway Images, Wasim Akram Khan Aug 2020

Development And Identification Of Metrics To Predict The Impact Of Dimension Reduction Techniques On Classical Machine Learning Algorithms For Still Highway Images, Wasim Akram Khan

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

We are witnessing an influx of data - images, texts, video, etc. Their high dimensionality and large volume make it challenging to apply machine learning to obtain actionable insight. This thesis explores several aspects pertaining to dimensional reduction: dimension reduction methods, metrics to measure distortion, image preprocessing, etc. Faster training and inference time on reduced data and smaller models which can be deployed on commodity hardware are a critical advantage of dimension reduction. For this study, classical machine learning methods were explored owing to their solid mathematical foundation and interpretability.

The dataset used is a time series of images from …


Bayesian Topological Machine Learning, Christopher A. Oballe Aug 2020

Bayesian Topological Machine Learning, Christopher A. Oballe

Doctoral Dissertations

Topological data analysis encompasses a broad set of ideas and techniques that address 1) how to rigorously define and summarize the shape of data, and 2) use these constructs for inference. This dissertation addresses the second problem by developing new inferential tools for topological data analysis and applying them to solve real-world data problems. First, a Bayesian framework to approximate probability distributions of persistence diagrams is established. The key insight underpinning this framework is that persistence diagrams may be viewed as Poisson point processes with prior intensities. With this assumption in hand, one may compute posterior intensities by adopting techniques …


Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge Aug 2020

Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge

Theses and Dissertations

Since communication technologies are being integrated into smart grid, its vulnerability to false data injection is increasing. State estimation is a critical component which is used for monitoring the operation of power grid. However, a tailored attack could circumvent bad data detection of the state estimation, thus disturb the stability of the grid. Such attacks are called stealthy false data injection attacks (FDIAs). This thesis proposed a prediction-based detector using deep learning techniques to detect injected measurements. The proposed detector adopts both Convolutional Neural Networks and Recurrent Neural Networks, making full use of the spatial-temporal correlations in the measurement data. …


Cloud Resource Prediction Using Explainable And Cooperative Artificial Neural Networks, Nathan R. Nelson Aug 2020

Cloud Resource Prediction Using Explainable And Cooperative Artificial Neural Networks, Nathan R. Nelson

MSU Graduate Theses

This work proposes a system for predicting cloud resource utilization by using runtime assembled cooperative artificial neural networks (RACANN). RACANN breaks up the problem into smaller contexts, each represented by a small-scale artificial neural network (ANN). The relevant ANNs are joined together at runtime when the context is present in the data for training and predictions. By analyzing the structure of a complete ANN, the influence of inputs is calculated and used to create linguistic descriptions (LD) of model behavior, so RACANN becomes explainable (eRACANN). The predictive results of eRACANN are compared against its prototype and a single deep ANN …