Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

Phenotyping Cotton Compactness Using Machine Learning And Uas Multispectral Imagery, Joshua Carl Waldbieser Dec 2023

Phenotyping Cotton Compactness Using Machine Learning And Uas Multispectral Imagery, Joshua Carl Waldbieser

Theses and Dissertations

Breeding compact cotton plants is desirable for many reasons, but current research for this is restricted by manual data collection. Using unmanned aircraft system imagery shows potential for high-throughput automation of this process. Using multispectral orthomosaics and ground truth measurements, I developed supervised models with a wide range of hyperparameters to predict three compactness traits. Extreme gradient boosting using a feature matrix as input was able to predict the height-related metric with R2=0.829 and RMSE=0.331. The breadth metrics require higher-detailed data and more complex models to predict accurately.


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Improving Xrd Analysis With Machine Learning, Rachel E. Drapeau Aug 2023

Improving Xrd Analysis With Machine Learning, Rachel E. Drapeau

Theses and Dissertations

X-ray diffraction analysis (XRD) is an inexpensive method to quantify the relative proportions of mineral phases in a rock or soil sample. However, the analytical software available for XRD requires extensive user input to choose phases to include in the analysis. Consequently, analysis accuracy depends greatly on the experience of the analyst, especially as the number of phases in a sample increases (Raven & Self, 2017; Omotoso, 2006). The purpose of this project is to test whether incorporating machine learning methods into XRD software can improve the accuracy of analyses by assisting in the phase-picking process. In order to provide …


Tornado Outbreak False Alarm Probabilistic Forecasts With Machine Learning, Kirsten Reed Snodgrass May 2023

Tornado Outbreak False Alarm Probabilistic Forecasts With Machine Learning, Kirsten Reed Snodgrass

Theses and Dissertations

Tornadic outbreaks occur annually, causing fatalities and millions of dollars in damage. By improving forecasts, the public can be better equipped to act prior to an event. False alarms (FAs) can hinder the public’s ability (or willingness) to act. As such, a probabilistic FA forecasting scheme would be beneficial to improving public response to outbreaks.

Here, a machine learning approach is employed to predict FA likelihood from Storm Prediction Center (SPC) tornado outbreak forecasts. A database of hit and FA outbreak forecasts spanning 2010 – 2020 was developed using historical SPC convective outlooks and the SPC Storm Reports database. Weather …


Self-Supervised Representation Learning For Motion Time Series: A Case Study In Activity Recognition, Luis Carlos Garza Perez May 2023

Self-Supervised Representation Learning For Motion Time Series: A Case Study In Activity Recognition, Luis Carlos Garza Perez

Theses and Dissertations

In this thesis we will learn about what contrastive learning and time series are and understand the differences between supervised and self-supervised frameworks in machine learning. In addition, we will describe how the newest and most efficient self-supervised learning framework for visual representations to this date works, called SimCLR, which was originally developed to obtain useful vector representations from static images. We will also explain what TS2Vec is, and how a combination of both approaches can be applied to the concept of a time series, and still be able to extract a vector representation of the subject described by the …


A Survey Of Graph Neural Networks On Synthetic Data, Brigham Stone Carson Apr 2023

A Survey Of Graph Neural Networks On Synthetic Data, Brigham Stone Carson

Theses and Dissertations

We relate properties of attributed random graph models to the performance of GNN architectures. We identify regimes where GNNs outperform feedforward neural networks and non-attributed graph clustering methods. We compare GNN performance on our synthetic benchmark to performance on popular real-world datasets. We analyze the theoretical foundations for weak recovery in GNNs for popular one- and two-layer architectures. We obtain an explicit formula for the performance of a 1-layer GNN, and we obtain useful insights on how to proceed in the 2-layer case. Finally, we improve the bound for a notable result on the GNN size generalization problem by 1.


Language Modeling Using Image Representations Of Natural Language, Seong Eun Cho Apr 2023

Language Modeling Using Image Representations Of Natural Language, Seong Eun Cho

Theses and Dissertations

This thesis presents training of an end-to-end autoencoder model using the transformer, with an encoder that can encode sentences into fixed-length latent vectors and a decoder that can reconstruct the sentences using image representations. Encoding and decoding sentences to and from these image representations are central to the model design. This method allows new sentences to be generated by traversing the Euclidean space, which makes vector arithmetic possible using sentences. Machines excel in dealing with concrete numbers and calculations, but do not possess an innate infrastructure designed to help them understand abstract concepts like natural language. In order for a …


Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron Mar 2023

Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron

Theses and Dissertations

SCA attacks aim to recover some sort of secret information, often in the form of a cipher key, from a target device. Some of these attacks focus on either power-based leakage, or EM-based leakage. Neural networks have recently gained in popularity as tools in SCA attacks. Near-field EM probes with high-spatial resolution enable attackers to isolate physical locations above a processor. This enables attackers to exploit the spatial dependencies of algorithms running on said processor. These spatial dependencies result in different physical locations above a chip emanating different signal strengths. The strengths of different locations can be mapped using the …


Machine Learning Models Interpretability For Malware Detection Using Model Agnostic Language For Exploration And Explanation, Ikuromor Mabel Ogiriki Jan 2023

Machine Learning Models Interpretability For Malware Detection Using Model Agnostic Language For Exploration And Explanation, Ikuromor Mabel Ogiriki

Theses and Dissertations

The adoption of the internet as a global platform has birthed a significant rise in cyber-attacks of various forms ranging from Trojans, worms, spyware, ransomware, botnet malware, rootkit, etc. In order to tackle the issue of all these forms of malware, there is a need to understand and detect them. There are various methods of detecting malware which include signature, behavioral, and machine learning. Machine learning methods have proven to be the most efficient of all for malware detection. In this thesis, a system that utilizes both the signature and dynamic behavior-based detection techniques, with the added layer of the …