Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Brigham Young University (7)
- Air Force Institute of Technology (5)
- Kennesaw State University (3)
- University of Massachusetts Amherst (3)
- University of Texas at Arlington (3)
-
- University of Texas at El Paso (3)
- Boise State University (2)
- Missouri State University (2)
- Nova Southeastern University (2)
- Old Dominion University (2)
- Utah State University (2)
- Western University (2)
- City University of New York (CUNY) (1)
- Dakota State University (1)
- Georgia Southern University (1)
- James Madison University (1)
- Missouri University of Science and Technology (1)
- New Jersey Institute of Technology (1)
- Oberlin (1)
- San Jose State University (1)
- Singapore Management University (1)
- The Texas Medical Center Library (1)
- The University of Southern Mississippi (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of Missouri, St. Louis (1)
- University of Nevada, Las Vegas (1)
- University of New Mexico (1)
- University of South Florida (1)
- University of Tennessee, Knoxville (1)
- Publication
-
- Theses and Dissertations (12)
- Doctoral Dissertations (4)
- Computer Science and Engineering Dissertations (3)
- Dissertations (3)
- Master of Science in Computer Science Theses (3)
-
- Open Access Theses & Dissertations (3)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (2)
- Boise State University Theses and Dissertations (2)
- CCE Theses and Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- MSU Graduate Theses (2)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science ETDs (1)
- Dissertations & Theses (Open Access) (1)
- Dissertations and Theses Collection (Open Access) (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electronic Theses and Dissertations (1)
- Graduate Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Papers (1)
- Master's Projects (1)
- Masters Theses (1)
- Masters Theses & Doctoral Dissertations (1)
- Masters Theses, 2020-current (1)
- Theses (1)
- Theses and Dissertations--Computer Science (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- USF Tampa Graduate Theses and Dissertations (1)
Articles 1 - 30 of 56
Full-Text Articles in Entire DC Network
A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek
A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek
Dissertations
The introduction of deep learning and big data analytics may significantly elevate the performance of traffic speed prediction. Work zones become one of the most critical factors causing congestion impact, which reduces the mobility as well as traffic safety. A comprehensive literature review on existing work zone delay prediction models (i.e., parametric, simulation and non-parametric models) is conducted in this research. The research shows the limitations of each model. Moreover, most previous modeling approaches did not consider user delay for connected freeways when predicting traffic speed under work zone conditions. This research proposes Deep Artificial Neural Network (Deep ANN) and …
Leveraging The Inductive Bias Of Large Language Models For Abstract Textual Reasoning, Christopher Michael Rytting
Leveraging The Inductive Bias Of Large Language Models For Abstract Textual Reasoning, Christopher Michael Rytting
Theses and Dissertations
Large natural language models (such as GPT-2 or T5) demonstrate impressive abilities across a range of general NLP tasks. Here, we show that the knowledge embedded in such models provides a useful inductive bias, not just on traditional NLP tasks, but also in the nontraditional task of training a symbolic reasoning engine. We observe that these engines learn quickly and generalize in a natural way that reflects human intuition. For example, training such a system to model block-stacking might naturally generalize to stacking other types of objects because of structure in the real world that has been partially captured by …
Methods For Generative Adversarial Output Enhancement, Michael B. Brodie
Methods For Generative Adversarial Output Enhancement, Michael B. Brodie
Theses and Dissertations
Generative Adversarial Networks (GAN) learn to synthesize novel samples for a given data distribution. While GANs can train on diverse data of various modalities, the most successful use cases to date apply GANs to computer vision tasks. Despite significant advances in training algorithms and network architectures, GANs still struggle to consistently generate high-quality outputs after training. We present a series of papers that improve GAN output inference qualitatively and quantitatively. The first chapter, Alpha Model Domination, addresses a related subfield of Multiple Choice Learning, which -- like GANs -- aims to generate diverse sets of outputs. The next chapter, CoachGAN, …
Road Map Generation And Feature Extraction Algorithms From Gps Trajectories And Trajectories Data Warehousing, Tariq Alsahfi
Road Map Generation And Feature Extraction Algorithms From Gps Trajectories And Trajectories Data Warehousing, Tariq Alsahfi
Computer Science and Engineering Dissertations
Advanced technologies in location acquisition allow us to track the movement of moving objects (people, planes, vehicles, animals, ships, ..) in geographical space. These technologies generate a vast amount of trajectory data (TD). Several applica- tions in different fields can utilize such trajectory data, for example, traffic control management, social behavior analysis, wildlife migrations and movements, ship tra- jectories, shoppers behavior in a mall, facial nerve trajectory, location-based services (LBS) and many others. Fortunately, there are now many trajectory data sets avail- able that collected from moving objects such as cars with enabled GPS devices. Two main challenges arise when …
Acquisition, Processing, And Analysis Of Video, Audio And Meteorological Data In Multi-Sensor Electronic Beehive Monitoring, Sarbajit Mukherjee
Acquisition, Processing, And Analysis Of Video, Audio And Meteorological Data In Multi-Sensor Electronic Beehive Monitoring, Sarbajit Mukherjee
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
In recent years, a widespread decline has been seen in honey bee population and this is widely attributed to colony collapse disorder. Hence, it is of utmost importance that a system is designed to gather relevant information. This will allow for a deeper understanding of the possible reasons behind the above phenomenon to aid in the design of suitable countermeasures.
Electronic Beehive Monitoring is one such way of gathering critical information regarding a colony’s health and behavior without invasive beehive inspections. In this dissertation, we have presented an electronic beehive monitoring system called BeePi that can be placed on top …
Unsupervised Structural Graph Node Representation Learning, Mikel Joaristi
Unsupervised Structural Graph Node Representation Learning, Mikel Joaristi
Boise State University Theses and Dissertations
Unsupervised Graph Representation Learning methods learn a numerical representation of the nodes in a graph. The generated representations encode meaningful information about the nodes' properties, making them a powerful tool for tasks in many areas of study, such as social sciences, biology or communication networks. These methods are particularly interesting because they facilitate the direct use of standard Machine Learning models on graphs. Graph representation learning methods can be divided into two main categories depending on the information they encode, methods preserving the nodes connectivity information, and methods preserving nodes' structural information. Connectivity-based methods focus on encoding relationships between nodes, …
Lightweight Deep Learning For Botnet Ddos Detection On Iot Access Networks, Eric A. Mccullough
Lightweight Deep Learning For Botnet Ddos Detection On Iot Access Networks, Eric A. Mccullough
MSU Graduate Theses
With the proliferation of the Internet of Things (IoT), computer networks have rapidly expanded in size. While Internet of Things Devices (IoTDs) benefit many aspects of life, these devices also introduce security risks in the form of vulnerabilities which give hackers billions of promising new targets. For example, botnets have exploited the security flaws common with IoTDs to gain unauthorized control of hundreds of thousands of hosts, which they then utilize to carry out massively disruptive distributed denial of service (DDoS) attacks. Traditional DDoS defense mechanisms rely on detecting attacks at their target and deploying mitigation strategies toward the attacker …
Trace: A Differentiable Approach To Line-Level Stroke Recovery For Offline Handwritten Text, Taylor Neil Archibald
Trace: A Differentiable Approach To Line-Level Stroke Recovery For Offline Handwritten Text, Taylor Neil Archibald
Theses and Dissertations
Stroke order and velocity are helpful features in the fields of signature verification, handwriting recognition, and handwriting synthesis. Recovering these features from offline handwritten text is a challenging and well-studied problem. We propose a new model called TRACE (Trajectory Recovery by an Adaptively-trained Convolutional Encoder). TRACE is a differentiable approach using a convolutional recurrent neural network (CRNN) to infer temporal stroke information from long lines of offline handwritten text with many characters. TRACE is perhaps the first system to be trained end-to-end on entire lines of text of arbitrary width and does not require the use of dynamic exemplars. Moreover, …
Deep Learning-Based, Passive Fault Tolerant Control Facilitated By A Taxonomy Of Cyber-Attack Effects, Dean C. Wardell
Deep Learning-Based, Passive Fault Tolerant Control Facilitated By A Taxonomy Of Cyber-Attack Effects, Dean C. Wardell
Theses and Dissertations
In the interest of improving the resilience of cyber-physical control systems to better operate in the presence of various cyber-attacks and/or faults, this dissertation presents a novel controller design based on deep-learning networks. This research lays out a controller design that does not rely on fault or cyber-attack detection. Being passive, the controller’s routine operating process is to take in data from the various components of the physical system, holistically assess the state of the physical system using deep-learning networks and decide the subsequent round of commands from the controller. This use of deep-learning methods in passive fault tolerant control …
New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger
New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger
Theses
Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …
Semantic-Driven Unsupervised Image-To-Image Translation For Distinct Image Domains, Wesley Ackerman
Semantic-Driven Unsupervised Image-To-Image Translation For Distinct Image Domains, Wesley Ackerman
Theses and Dissertations
We expand the scope of image-to-image translation to include more distinct image domains, where the image sets have analogous structures, but may not share object types between them. Semantic-Driven Unsupervised Image-to-Image Translation for Distinct Image Domains (SUNIT) is built to more successfully translate images in this setting, where content from one domain is not found in the other. Our method trains an image translation model by learning encodings for semantic segmentations of images. These segmentations are translated between image domains to learn meaningful mappings between the structures in the two domains. The translated segmentations are then used as the basis …
Physics-Constrained Hyperspectral Data Exploitation Across Diverse Atmospheric Scenarios, Nicholas M. Westing
Physics-Constrained Hyperspectral Data Exploitation Across Diverse Atmospheric Scenarios, Nicholas M. Westing
Theses and Dissertations
Hyperspectral target detection promises new operational advantages, with increasing instrument spectral resolution and robust material discrimination. Resolving surface materials requires a fast and accurate accounting of atmospheric effects to increase detection accuracy while minimizing false alarms. This dissertation investigates deep learning methods constrained by the processes governing radiative transfer to efficiently perform atmospheric compensation on data collected by long-wave infrared (LWIR) hyperspectral sensors. These compensation methods depend on generative modeling techniques and permutation invariant neural network architectures to predict LWIR spectral radiometric quantities. The compensation algorithms developed in this work were examined from the perspective of target detection performance using …
Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel
Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel
Theses and Dissertations
The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …
A Semi-Automated Approach To Medical Image Segmentation Using Conditional Random Field Inference, Yu-Chi Hu
A Semi-Automated Approach To Medical Image Segmentation Using Conditional Random Field Inference, Yu-Chi Hu
Dissertations, Theses, and Capstone Projects
Medical image segmentation plays a crucial role in delivering effective patient care in various diagnostic and treatment modalities. Manual delineation of target volumes and all critical structures is a very tedious and highly time-consuming process and introduce uncertainties of treatment outcomes of patients. Fully automatic methods holds great promise for reducing cost and time, while at the same time improving accuracy and eliminating expert variability, yet there are still great challenges. Legally and ethically, human oversight must be integrated with ”smart tools” favoring a semi-automatic technique which can leverage the best aspects of both human and computer.
In this work …
Computational Methods For Predicting Protein-Protein Interactions And Binding Sites, Yiwei Li
Computational Methods For Predicting Protein-Protein Interactions And Binding Sites, Yiwei Li
Electronic Thesis and Dissertation Repository
Proteins are essential to organisms and participate in virtually every process within cells. Quite often, they keep the cells functioning by interacting with other proteins. This process is called protein-protein interaction (PPI). The bonding amino acid residues during the process of protein-protein interactions are called PPI binding sites. Identifying PPIs and PPI binding sites are fundamental problems in system biology.
Experimental methods for solving these two problems are slow and expensive. Therefore, great efforts are being made towards increasing the performance of computational methods.
We present DELPHI, a deep learning based program for PPI site prediction and SPRINT, an algorithmic …
Discrimination Of Leucine And Isoleucine In De Novo Peptide Sequencing Using Deep Neural Networks, Bingran Shen
Discrimination Of Leucine And Isoleucine In De Novo Peptide Sequencing Using Deep Neural Networks, Bingran Shen
Electronic Thesis and Dissertation Repository
De novo peptide sequencing from tandem MS data is a key technology in proteomics for understanding the structure of proteins, especially for first seen sequences. Although this technique has advanced rapidly in recent years and become more effective, one crucial problem remained unsolved. Due to the isomerism of leucine and isoleucine, they are practically indistinguishable in de novo sequencing using traditional tandem MS data. Some experimental attempts have been made to resolve this ambiguity such as EThCD fragmentation process. In this study, we took a data focused approach rather than only looking for characteristic satellite ions produced by the EThCD …
Deep Learning To Predict Ocean Seabed Type And Source Parameters, David Franklin Van Komen
Deep Learning To Predict Ocean Seabed Type And Source Parameters, David Franklin Van Komen
Theses and Dissertations
In the ocean, light from the surface dissipates quickly leaving sound the only way to see at a distance. Different sediment types on the ocean floor and water properties like salinity, temperature, and ocean depth all change how sound travels across long distances. Hard sediment types, such as sand and bedrock, are highly reflective while softer sediment types, such as mud, are more absorptive and change the received sound upon arrival. Unfortunately, the vast majority of the ocean floor is not mapped and the expenses involved in creating such a map are far too great. Traditional signal processing methods in …
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Electrical & Computer Engineering Theses & Dissertations
Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.
First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …
Facial Expression Recognition In The Wild Using Convolutional Neural Networks, Amir Hossein Farzaneh
Facial Expression Recognition In The Wild Using Convolutional Neural Networks, Amir Hossein Farzaneh
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Facial Expression Recognition (FER) is the task of predicting a specific facial expression given a facial image. FER has demonstrated remarkable progress due to the advancement of deep learning. Generally, a FER system as a prediction model is built using two sub-modules: 1. Facial image representation model that learns a mapping from the input 2D facial image to a compact feature representation in the embedding space, and 2. A classifier module that maps the learned features to the label space comprising seven labels of neutral, happy, sad, surprise, anger, fear, or disgust. Ultimately, …
Applications Of Artificial Intelligence And Graphy Theory To Cyberbullying, Jesse D. Simpson
Applications Of Artificial Intelligence And Graphy Theory To Cyberbullying, Jesse D. Simpson
MSU Graduate Theses
Cyberbullying is an ongoing and devastating issue in today's online social media. Abusive users engage in cyber-harassment by utilizing social media to send posts, private messages, tweets, or pictures to innocent social media users. Detecting and preventing cases of cyberbullying is crucial. In this work, I analyze multiple machine learning, deep learning, and graph analysis algorithms and explore their applicability and performance in pursuit of a robust system for detecting cyberbullying. First, I evaluate the performance of the machine learning algorithms Support Vector Machine, Naïve Bayes, Random Forest, Decision Tree, and Logistic Regression. This yielded positive results and obtained upwards …
Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui
Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui
Dissertations and Theses Collection (Open Access)
It is desirable to combine machine learning and program analysis so that one can leverage the best of both to increase the performance of software analytics. On one side, machine learning can analyze the source code of thousands of well-written software projects that can uncover patterns that partially characterize software that is reliable, easy to read, and easy to maintain. On the other side, the program analysis can be used to define rigorous and unique rules that are only available in programming languages, which enrich the representation of source code and help the machine learning to capture the patterns better. …
Empirical Studies Of Deep Learning On Information Diffusion On Social Networks And Collective Task Learning For Swarm Robotics, Trung T. Nguyen
Empirical Studies Of Deep Learning On Information Diffusion On Social Networks And Collective Task Learning For Swarm Robotics, Trung T. Nguyen
Dissertations
Researchers in multiple disciplines have recently adopted deep learning because of its ability of high accuracy representation learning from big and complex data. My research goal in this thesis is developing deep learning models for information diffusion analysis on social networks and collective tasks learning in swarm robotics. Firstly, the information diffusion on social networks is modeled as a multivariate time series in three dimensions with ten features. Then, we applied time-series clustering algorithms with Dynamic Time Warping to discover different patterns of our models. Then, we build a prediction model based on LSTM, which outperforms traditional time-series prediction methods. …
Deep Learning For Remote Sensing Image Processing, Yan Lu
Deep Learning For Remote Sensing Image Processing, Yan Lu
Computational Modeling & Simulation Engineering Theses & Dissertations
Remote sensing images have many applications such as ground object detection, environmental change monitoring, urban growth monitoring and natural disaster damage assessment. As of 2019, there were roughly 700 satellites listing “earth observation” as their primary application. Both spatial and temporal resolutions of satellite images have improved consistently in recent years and provided opportunities in resolving fine details on the Earth's surface. In the past decade, deep learning techniques have revolutionized many applications in the field of computer vision but have not fully been explored in remote sensing image processing. In this dissertation, several state-of-the-art deep learning models have been …
Improving Convolutional Neural Network Robustness To Adversarial Images Through Image Filtering, Natalie E. Bogda
Improving Convolutional Neural Network Robustness To Adversarial Images Through Image Filtering, Natalie E. Bogda
Masters Theses
The field of computer vision and deep learning is known for its ability to recognize images with extremely high accuracy. Convolutional neural networks exist that can correctly classify 96\% of 1.2 million images of complex scenes. However, with just a few carefully positioned imperceptible changes to the pixels of an input image, an otherwise accurate network will misclassify this almost identical image with high confidence. These perturbed images are known as \textit{adversarial examples} and expose that convolutional neural networks do not necessarily "see" the world in the way that humans do. This work focuses on increasing the robustness of classifiers …
Facing The Hard Problems In Fgvc, Connor Stanley Anderson
Facing The Hard Problems In Fgvc, Connor Stanley Anderson
Theses and Dissertations
In fine-grained visual categorization (FGVC), there is a near-singular focus in pursuit of attaining state-of-the-art (SOTA) accuracy. This work carefully analyzes the performance of recent SOTA methods, quantitatively, but more importantly, qualitatively. We show that these models universally struggle with certain "hard" images, while also making complementary mistakes. We underscore the importance of such analysis, and demonstrate that combining complementary models can improve accuracy on the popular CUB-200 dataset by over 5%. In addition to detailed analysis and characterization of the errors made by these SOTA methods, we provide a clear set of recommended directions for future FGVC researchers.
Improving Visual Recognition With Unlabeled Data, Aruni Roy Chowdhury
Improving Visual Recognition With Unlabeled Data, Aruni Roy Chowdhury
Doctoral Dissertations
The success of deep neural networks has resulted in computer vision systems that obtain high accuracy on a wide variety of tasks such as image classification, object detection, semantic segmentation, etc. However, most state-of-the-art vision systems are dependent upon large amounts of labeled training data, which is not a scalable solution in the long run. This work focuses on improving existing models for visual object recognition and detection without being dependent on such large-scale human-annotated data. We first show how large numbers of hard examples (cases where an existing model makes a mistake) can be obtained automatically from unlabeled video …
Deep Learning For Identifying Lung Diseases, Lin Wang
Deep Learning For Identifying Lung Diseases, Lin Wang
Master of Science in Computer Science Theses
Growing health problems, such as lung diseases, especially for children and the elderly, require better diagnostic methods, such as computer-based solutions, and it is crucial to detect and treat these problems early. The purpose of this article is to design and implement a new computer vision-based algorithm based on lung disease diagnosis, which has better performance in lung disease recognition than previous models to reduce lung-related health problems and costs . In addition, we have improved the accuracy of the five lung diseases detection, which helps doctors and doctors use computers to solve this problem at an early stage.
Deep Learning For Identifying Breast Cancer, Yihong Li
Deep Learning For Identifying Breast Cancer, Yihong Li
Master of Science in Computer Science Theses
Medical images are playing an increasingly important role in the prevention and diagnosis of diseases. Medical images often contain massive amounts of data. Professional interpretation usually requires a long time of professional study and experience accumulation by doctors. Therefore, the use of super storage and computing power in deep learning as a basis can effectively process a large amount of medical data. Breast cancer brings great harm to female patients, and early diagnosis is the most effective prevention and treatment method, so this project will create a new optimized breast cancer auxiliary diagnosis model based on ResNet. Analyze and process, …
Action Recognition Using The Motion Taxonomy, Maxat Alibayev
Action Recognition Using The Motion Taxonomy, Maxat Alibayev
USF Tampa Graduate Theses and Dissertations
In the last years, modern action recognition frameworks with deep architectures have achieved impressive results on the large-scale activity datasets. All state-of-the-art models share one common attribute: two-stream architectures. One deep model takes RGB frames, while the other model is fed with pre-computed optical flow vectors. The outputs of both models are combined to be used as a final probability distribution for the action classes. When comparing the results of individual models with the fused model, it is common to see that that latter method is more superior. Researchers explain that phenomena with the fact that optical flow vectors serve …
Neural Network Models For Nuclear Treaty Monitoring: Enhancing The Seismic Signal Pipeline With Deep Temporal Convolution, Joshua T. Dickey
Neural Network Models For Nuclear Treaty Monitoring: Enhancing The Seismic Signal Pipeline With Deep Temporal Convolution, Joshua T. Dickey
Theses and Dissertations
Seismic signal processing at the IDC is critical to global security, facilitating the detection and identification of covert nuclear tests in near-real time. This dissertation details three research studies providing substantial enhancements to this pipeline. Study 1 focuses on signal detection, employing a TCN architecture directly against raw real-time data streams and effecting a 4 dB increase in detector sensitivity over the latest operational methods. Study 2 focuses on both event association and source discrimination, utilizing a TCN-based triplet network to extract source-specific features from three-component seismograms, and providing both a complimentary validation measure for event association and a one-shot …