Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

New Jersey Institute of Technology

2018

Deep learning

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao Dec 2018

Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao

Dissertations

Nowadays, with the growing availability of large-scale genomic datasets and advanced computational techniques, more and more data-driven computational methods have been developed to analyze genomic data and help to solve incompletely understood biological problems. Among them, deep learning methods, have been proposed to automatically learn and recognize the functional activity of DNA sequences from genomics data. Techniques for efficient mining genomic sequence pattern will help to improve our understanding of gene regulation, and thus accelerate our progress toward using personal genomes in medicine.

This dissertation focuses on the development of deep learning methods for mining genomic sequences. First, we compare …


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …