Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (17)
- Singapore Management University (15)
- MBZUAI (10)
- TÜBİTAK (9)
- Zayed University (9)
-
- Edith Cowan University (7)
- China Coal Technology and Engineering Group (CCTEG) (5)
- Dartmouth College (5)
- Michigan Technological University (5)
- University of Texas at Arlington (5)
- Utah State University (5)
- Brigham Young University (3)
- China Simulation Federation (3)
- Embry-Riddle Aeronautical University (3)
- Missouri University of Science and Technology (3)
- Technological University Dublin (3)
- The Texas Medical Center Library (3)
- University of South Carolina (3)
- Western University (3)
- Air Force Institute of Technology (2)
- City University of New York (CUNY) (2)
- Purdue University (2)
- Southern Methodist University (2)
- University of Arkansas, Fayetteville (2)
- University of Tennessee, Knoxville (2)
- Virginia Commonwealth University (2)
- Wright State University (2)
- Chapman University (1)
- Kennesaw State University (1)
- LSU Health Science Center (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (15)
- All Works (9)
- Theses and Dissertations (9)
- Turkish Journal of Electrical Engineering and Computer Sciences (9)
- Electrical & Computer Engineering Faculty Publications (8)
-
- Research outputs 2022 to 2026 (7)
- Computer Science Faculty Publications (6)
- Computer Vision Faculty Publications (6)
- Coal Geology & Exploration (5)
- Computer Science and Engineering Dissertations (4)
- Computer Science Senior Theses (3)
- Doctoral Dissertations (3)
- Electronic Theses and Dissertations (3)
- Electronic Thesis and Dissertation Repository (3)
- Journal of System Simulation (3)
- Machine Learning Faculty Publications (3)
- Michigan Tech Publications (3)
- Academic Posters Collection (2)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (2)
- Browse all Theses and Dissertations (2)
- Computer Science Faculty and Staff Publications (2)
- Dartmouth College Ph.D Dissertations (2)
- Dissertations (2)
- Dissertations & Theses (Open Access) (2)
- Publications and Research (2)
- SMU Data Science Review (2)
- 2023 REYES Proceedings (1)
- All Graduate Theses and Dissertations, Fall 2023 to Present (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CCE Theses and Dissertations (1)
- Publication Type
Articles 31 - 60 of 159
Full-Text Articles in Entire DC Network
Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook
Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook
Doctoral Dissertations and Master's Theses
With recent advances in machine learning and deep learning technologies and the creation of larger aviation-specific corpora, applying natural language processing technologies, especially those based on transformer neural networks, to aviation communications is becoming increasingly feasible. Previous work has focused on machine learning applications to natural language processing, such as N-grams and word lattices. This thesis experiments with a process for pretraining transformer-based language models on aviation English corpora and compare the effectiveness and performance of language models transfer learned from pretrained checkpoints and those trained from their base weight initializations (trained from scratch). The results suggest that transformer language …
Affine Image Registration Of Arterial Spin Labeling Mri Using Deep Learning Networks, Zongpai Zhang, Huiyuan Yang, Yanchen Guo, Nicolas R. Bolo, Matcheri Keshavan, Eve Derosa, Adam K. Anderson, David C. Alsop, Lijun Yin, Weiying Dai
Affine Image Registration Of Arterial Spin Labeling Mri Using Deep Learning Networks, Zongpai Zhang, Huiyuan Yang, Yanchen Guo, Nicolas R. Bolo, Matcheri Keshavan, Eve Derosa, Adam K. Anderson, David C. Alsop, Lijun Yin, Weiying Dai
Computer Science Faculty Research & Creative Works
Convolutional neural networks (CNN) have demonstrated good accuracy and speed in spatially registering high signal-to-noise ratio (SNR) structural magnetic resonance imaging (sMRI) images. However, some functional magnetic resonance imaging (fMRI) images, e.g., those acquired from arterial spin labeling (ASL) perfusion fMRI, are of intrinsically low SNR and therefore the quality of registering ASL images using CNN is not clear. In this work, we aimed to explore the feasibility of a CNN-based affine registration network (ARN) for registration of low-SNR three-dimensional ASL perfusion image time series and compare its performance with that from the state-of-the-art statistical parametric mapping (SPM) algorithm. The …
Attention-Based Human Age Estimation From Face Images To Enhance Public Security, Md. Ashiqur Rahman, Shuhena S. Aonty, Kaushik Deb, Iqbal H. Sarker
Attention-Based Human Age Estimation From Face Images To Enhance Public Security, Md. Ashiqur Rahman, Shuhena S. Aonty, Kaushik Deb, Iqbal H. Sarker
Research outputs 2022 to 2026
Age estimation from facial images has gained significant attention due to its practical applications such as public security. However, one of the major challenges faced in this field is the limited availability of comprehensive training data. Moreover, due to the gradual nature of aging, similar-aged faces tend to share similarities despite their race, gender, or location. Recent studies on age estimation utilize convolutional neural networks (CNN), treating every facial region equally and disregarding potentially informative patches that contain age-specific details. Therefore, an attention module can be used to focus extra attention on important patches in the image. In this study, …
Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii
Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii
Mechanical & Aerospace Engineering Theses & Dissertations
In recent years, the field of machine learning (ML) has made significant advances, particularly through applying deep learning (DL) algorithms and artificial intelligence (AI). The literature shows several ways that ML may enhance the power of computational fluid dynamics (CFD) to improve its solution accuracy, reduce the needed computational resources and reduce overall simulation cost. ML techniques have also expanded the understanding of underlying flow physics and improved data capture from experimental fluid dynamics.
This dissertation presents an in-depth literature review and discusses ways the field of fluid dynamics has leveraged ML modeling to date. The author selects and describes …
Perceptual Cue-Guided Adaptive Image Downscaling For Enhanced Semantic Segmentation On Large Document Images, Chulwoo Pack, Leen-Kiat Soh, Elizabeth Lorang
Perceptual Cue-Guided Adaptive Image Downscaling For Enhanced Semantic Segmentation On Large Document Images, Chulwoo Pack, Leen-Kiat Soh, Elizabeth Lorang
School of Computing: Faculty Publications
Image downscaling is an essential operation to reduce spatial complexity for various applications and is becoming increasingly important due to the growing number of solutions that rely on memory-intensive approaches, such as applying deep convolutional neural networks to semantic segmentation tasks on large images. Although conventional content-independent image downscaling can efficiently reduce complexity, it is vulnerable to losing perceptual details, which are important to preserve. Alternatively, existing content-aware downscaling severely distorts spatial structure and is not effectively applicable for segmentation tasks involving document images. In this paper, we propose a novel image downscaling approach that combines the strengths of both …
An Intelligent Prediction Method And Interpretability For Drag And Torque Of Drill String, Liu Muchen, Song Xianzhi, Li Dayu, Zhu Shuo, Fu Li, Zhu Zhaopeng, Zhang Chengkai, Pan Tao
An Intelligent Prediction Method And Interpretability For Drag And Torque Of Drill String, Liu Muchen, Song Xianzhi, Li Dayu, Zhu Shuo, Fu Li, Zhu Zhaopeng, Zhang Chengkai, Pan Tao
Coal Geology & Exploration
The accurate characterization and dynamic analysis of drilling string mechanics are essential to ensure the safe and efficient drilling. In the classical soft/rigid string model for drag & torque of drilling string, the friction coefficient of the drilling string is determined by empirical estimation or post-drilling inversion, of which the accuracy and timeliness needs to be improved. Based on the effectiveness of artificial intelligence technology applied in complex nonlinear mapping, a drag and torque prediction method of drill string with mechanism-data fusion was proposed by predicting the friction coefficient. Firstly, the friction coefficient was inversed using the drilled and logged …
Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang
Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang
Journal of System Simulation
Abstract: To address the problem of the loss of local style details in cross-domain image simulation, a ChinOperaGAN network framework suitable for opera makeup is designed from the perspective of protecting the excellent traditional culture. In order to solve the style translation of differences in two image domains, multiple overlapping local adversarial discriminators are proposed in the generative adversarial network. Since paired opera makeup data are difficult to obtain, a synthetic image is generated by combining the source image makeup mapping to effectively guide the transfer of local makeup details between images. In view of the characteristics of opera makeup …
Intelligent Lithology Prediction Method Based On Vibration Signal While Drilling And Deep Learning, Wang Sheng, Lai Kun, Zhang Zheng, Bai Jun, Luo Zhongbin, Li Bingle, Zhang Jie
Intelligent Lithology Prediction Method Based On Vibration Signal While Drilling And Deep Learning, Wang Sheng, Lai Kun, Zhang Zheng, Bai Jun, Luo Zhongbin, Li Bingle, Zhang Jie
Coal Geology & Exploration
Intelligent lithology prediction is of great importance in geological drilling, capable of improving exploration and mining efficiency, as well as the quality of results. In this study, a method of intelligent lithology prediction while drilling was proposed based on the vibration signals produced by the drill bit breaking rocks during drilling. Specifically, seven types of rocks with the same size and different lithologies were selected, and a micro-drilling experiment was designed to apply different drilling rates and rotary speeds to the rocks, in order to collect the triaxial vibration signals while drilling under multiple drilling conditions. The signals were preprocessed …
Drilling Core Identification Based On Natural Image, Gao Hui, Wu Zhenkun, Ke Yu, Tan Songcheng, He Siqi, Duan Longchen
Drilling Core Identification Based On Natural Image, Gao Hui, Wu Zhenkun, Ke Yu, Tan Songcheng, He Siqi, Duan Longchen
Coal Geology & Exploration
The traditional on-site core identification and recording mainly rely on the experience of technicians, and there are many uncertain factors. Limited by the site conditions, using mobile phones or cameras to capture the natural images is the most convenient way to collect the core information. Therefore, it is necessary to study the feature information extraction technology of core image and apply it to the identification and prediction of core type and other information. Specifically, a large number of core samples were collected, the thin-section identification method was employed to determine the core types and names, and then the core images …
Towards Safe Automated Refactoring Of Imperative Deep Learning Programs To Graph Execution, Raffi Takvor Khatchadourian Ph.D., Tatiana Castro Vélez, Mehdi Bagherzadeh, Nan Jia, Anita Raja
Towards Safe Automated Refactoring Of Imperative Deep Learning Programs To Graph Execution, Raffi Takvor Khatchadourian Ph.D., Tatiana Castro Vélez, Mehdi Bagherzadeh, Nan Jia, Anita Raja
Publications and Research
Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code—supporting symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, imperative DL frameworks encouraging eager execution have emerged at the expense of run-time performance. Though hybrid approaches aim for the “best of both worlds,” using them effectively requires subtle considerations to make code amenable to safe, accurate, and efficient graph execution. We present our ongoing work on automated refactoring that assists developers in specifying whether …
Towards Safe Automated Refactoring Of Imperative Deep Learning Programs To Graph Execution, Raffi T. Khatchadourian Ph,D,, Tatiana Castro Vélez, Mehdi Bagherzadeh, Nan Jia, Anita Raja
Towards Safe Automated Refactoring Of Imperative Deep Learning Programs To Graph Execution, Raffi T. Khatchadourian Ph,D,, Tatiana Castro Vélez, Mehdi Bagherzadeh, Nan Jia, Anita Raja
Publications and Research
Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code—supporting symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, imperative DL frameworks encouraging eager execution have emerged at the expense of run-time performance. Though hybrid approaches aim for the "best of both worlds," using them effectively requires subtle considerations to make code amenable to safe, accurate, and efficient graph execution. We present our ongoing work on automated refactoring that assists developers in specifying whether …
Experimental Comparison Of Features, Analyses, And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Naing Tun Yan, David Lo, Lingxiao Jiang, Christoph Bienert
Experimental Comparison Of Features, Analyses, And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Naing Tun Yan, David Lo, Lingxiao Jiang, Christoph Bienert
Research Collection School Of Computing and Information Systems
Android malware detection has been an active area of research. In the past decade, several machine learning-based approaches based on different types of features that may characterize Android malware behaviors have been proposed. The usually-analyzed features include API usages and sequences at various abstraction levels (e.g., class and package), extracted using static or dynamic analysis. Additionally, features that characterize permission uses, native API calls and reflection have also been analyzed. Initial works used conventional classifiers such as Random Forest to learn on those features. In recent years, deep learning-based classifiers such as Recurrent Neural Network have been explored. Considering various …
Arduinoprog: Towards Automating Arduino Programming, Imam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang
Arduinoprog: Towards Automating Arduino Programming, Imam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Writing code for Arduino poses unique challenges. A developer 1) needs hardware-specific knowledge about the interface configuration between the Arduino controller and the I/Ohardware, 2) identifies a suitable driver library for the I/O hardware, and 3) follows certain usage patterns of the driver library in order to use them properly. In this work, based on a study of real-world user queries posted in the Arduino forum, we propose ArduinoProg to address such challenges. ArduinoProg consists of three components, i.e., Library Retriever, Configuration Classifier, and Pattern Generator. Given a query, Library Retriever retrieves library names relevant to the I/O hardware identified …
Sentence Embedding Approach Using Lstm Auto-Encoder For Discussion Threads Summarization, Abdul Wali Khan, Feras Al-Obeidat, Afsheen Khalid, Adnan Amin, Fernando Moreira
Sentence Embedding Approach Using Lstm Auto-Encoder For Discussion Threads Summarization, Abdul Wali Khan, Feras Al-Obeidat, Afsheen Khalid, Adnan Amin, Fernando Moreira
All Works
Online discussion forums are repositories of valuable information where users interact and articulate their ideas and opinions, and share experiences about numerous topics. These online discussion forums are internet-based online communities where users can ask for help and find the solution to a problem. A new user of online discussion forums becomes exhausted from reading the significant number of irrelevant replies in a discussion. An automated discussion thread summarizing system (DTS) is necessary to create a candid view of the entire discussion of a query. Most of the previous approaches for automated DTS use the continuous bag of words (CBOW) …
Rosas: Deep Semi-Supervised Anomaly Detection With Contamination-Resilient Continuous Supervision, Hongzuo Xu, Yijie Wang, Guansong Pang, Songlei Jian, Ning Liu, Yongjun Wang
Rosas: Deep Semi-Supervised Anomaly Detection With Contamination-Resilient Continuous Supervision, Hongzuo Xu, Yijie Wang, Guansong Pang, Songlei Jian, Ning Liu, Yongjun Wang
Research Collection School Of Computing and Information Systems
Semi-supervised anomaly detection methods leverage a few anomaly examples to yield drastically improved performance compared to unsupervised models. However, they still suffer from two limitations: 1) unlabeled anomalies (i.e., anomaly contamination) may mislead the learning process when all the unlabeled data are employed as inliers for model training; 2) only discrete supervision information (such as binary or ordinal data labels) is exploited, which leads to suboptimal learning of anomaly scores that essentially take on a continuous distribution. Therefore, this paper proposes a novel semi-supervised anomaly detection method, which devises contamination-resilient continuous supervisory signals. Specifically, we propose a mass interpolation method …
A Proposed Artificial Intelligence Model For Android-Malware Detection, Fatma Taher, Omar Al Fandi, Mousa Al Kfairy, Hussam Al Hamadi, Saed Alrabaee
A Proposed Artificial Intelligence Model For Android-Malware Detection, Fatma Taher, Omar Al Fandi, Mousa Al Kfairy, Hussam Al Hamadi, Saed Alrabaee
All Works
There are a variety of reasons why smartphones have grown so pervasive in our daily lives. While their benefits are undeniable, Android users must be vigilant against malicious apps. The goal of this study was to develop a broad framework for detecting Android malware using multiple deep learning classifiers; this framework was given the name DroidMDetection. To provide precise, dynamic, Android malware detection and clustering of different families of malware, the framework makes use of unique methodologies built based on deep learning and natural language processing (NLP) techniques. When compared to other similar works, DroidMDetection (1) uses API calls and …
Self-Supervised Pretraining And Transfer Learning On Fmri Data With Transformers, Sean Paulsen
Self-Supervised Pretraining And Transfer Learning On Fmri Data With Transformers, Sean Paulsen
Dartmouth College Ph.D Dissertations
Transfer learning is a machine learning technique founded on the idea that knowledge acquired by a model during “pretraining” on a source task can be transferred to the learning of a target task. Successful transfer learning can result in improved performance, faster convergence, and reduced demand for data. This technique is particularly desirable for the task of brain decoding in the domain of functional magnetic resonance imaging (fMRI), wherein even the most modern machine learning methods can struggle to decode labelled features of brain images. This challenge is due to the highly complex underlying signal, physical and neurological differences between …
A Hybrid Ensemble Of Learning Models, Bivin Sadler, Dhruba Dey, Duy Nguyen, Tavin Weeda
A Hybrid Ensemble Of Learning Models, Bivin Sadler, Dhruba Dey, Duy Nguyen, Tavin Weeda
SMU Data Science Review
Statistical models in time series forecasting have long been challenged to be superseded by the advent of deep learning models. This research proposes a new hybrid ensemble of forecasting models that combines the strengths of several strong candidates from these two model types. The proposed ensemble aims to improve the accuracy of forecasts and reduce computational complexity by leveraging the strengths of each candidate model.
More Is Better Than One: The Effect Of Ensembling On Deep Learning Performance In Biochemical Prediction Problems, Jacob A. Stern
More Is Better Than One: The Effect Of Ensembling On Deep Learning Performance In Biochemical Prediction Problems, Jacob A. Stern
Theses and Dissertations
This thesis presents two papers addressing important biochemical prediction challenges. The first paper focuses on accurate protein distance predictions and introduces updates to the ProSPr network. We evaluate its performance in the Critical Assessment of techniques for Protein Structure Prediction (CASP14) competition, investigating its accuracy dependence on sequence length and multiple sequence alignment depth. The ProSPr network, an ensemble of three convolutional neural networks (CNNs), demonstrates superior performance compared to individual networks. The second paper addresses the issue of accurate ligand ranking in virtual screening for drug discovery. We propose MILCDock, a machine learning consensus docking tool that leverages predictions …
Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li
Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li
Doctoral Dissertations
In the realm of distributed computing, collective operations involve coordinated communication and synchronization among multiple processing units, enabling efficient data exchange and collaboration. Scientific applications, such as simulations, computational fluid dynamics, and scalable deep learning, require complex computations that can be parallelized across multiple nodes in a distributed system. These applications often involve data-dependent communication patterns, where collective operations are critical for achieving high performance in data exchange. Optimizing collective operations for scientific applications and deep learning involves improving the algorithms, communication patterns, and data distribution strategies to minimize communication overhead and maximize computational efficiency.
Within the context of this …
Increasing The Efficiency And Accuracy Of Collective Intelligence Methods For Image Classification, Md Mahmudulla Hassan
Increasing The Efficiency And Accuracy Of Collective Intelligence Methods For Image Classification, Md Mahmudulla Hassan
Open Access Theses & Dissertations
Collective intelligence has emerged as a powerful methodology for annotating and classifying challenging data that pose difficulties for automated classifiers. It works by leveraging the concept of "wisdom of the crowds" which approximates a ground truth after aggregating experts' feedback and filtering out noise. However, challenges arise when certain applications, such as medical image classification, security threat detection, and financial fraud detection, demand accurate and reliable data annotation. The unreliability of experts due to inconsistent expertise and competencies, coupled with the associated cost and time-consuming judgment extraction, presents additional challenges.
Input aggregation is the process of consolidating and combining multiple …
Multi-Granularity Detector For Vulnerability Fixes, Truong Giang Nguyen, Cong, Thanh Le, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, David Lo, David Lo
Multi-Granularity Detector For Vulnerability Fixes, Truong Giang Nguyen, Cong, Thanh Le, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, David Lo, David Lo
Research Collection School Of Computing and Information Systems
With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vulnerability-fixing commits. Prior works have proposed methods that can automatically identify such vulnerability-fixing commits. However, identifying such commits is highly challenging, as only a very small minority of commits are vulnerability fixing. Moreover, code changes can be noisy and difficult to analyze. We observe that noise can occur at different levels of detail, making it challenging to detect vulnerability fixes accurately. To address these challenges and …
The Development Of Artificial Intelligence-Based Tools For Expert Peer Review Of Radiotherapy Treatment Plans, Mary Gronberg
The Development Of Artificial Intelligence-Based Tools For Expert Peer Review Of Radiotherapy Treatment Plans, Mary Gronberg
Dissertations & Theses (Open Access)
Creating a patient-specific radiation treatment plan is a time-consuming and operator-dependent manual process. The treatment planner adjusts the planning parameters in a trial-and-error fashion in an effort to balance the competing clinical objectives of tumor coverage and normal tissue sparing. Often, a plan is selected because it meets basic organ at risk dose thresholds for severe toxicity; however, it is evident that a plan with a decreased risk of normal tissue complication probability could be achieved. This discrepancy between “acceptable” and “best possible” plan is magnified if either the physician or treatment planner lacks focal expertise in the disease site. …
Evaluating Chatgpt For Recommendation: How Does The Ability To Converse Impact Recommendation?, Kyle Spurlock
Evaluating Chatgpt For Recommendation: How Does The Ability To Converse Impact Recommendation?, Kyle Spurlock
Electronic Theses and Dissertations
Recommendation algorithms have become an absolute necessity in the modern world to avoid information overload. However, the interaction between the human and the system is largely superficial and without any real contact. If you are given poor recommendations, you have no choice but to sift through mountains of content on your own until the model learns to accommodate your tastes more. This is bad for business as well as the consumer. Recently, large language models like ChatGPT have seen a significant rise in popularity due to their ease of use and wide range of knowledge. It has now become nearly …
Insights Into The Application Of Deep Reinforcement Learning In Healthcare And Materials Science, Benjamin R. Smith
Insights Into The Application Of Deep Reinforcement Learning In Healthcare And Materials Science, Benjamin R. Smith
Doctoral Dissertations
Reinforcement learning (RL) is a type of machine learning designed to optimize sequential decision-making. While controlled environments have served as a foundation for RL research, due to the growth in data volumes and deep learning methods, it is now increasingly being applied to real-world problems. In our work, we explore and attempt to overcome challenges that occur when applying RL to solve problems in healthcare and materials science.
First, we explore how issues in bias and data completeness affect healthcare applications of RL. To understand how bias has already been considered in this area, we survey the literature for existing …
Accuracy Vs. Energy: An Assessment Of Bee Object Inference In Videos From On-Hive Video Loggers With Yolov3, Yolov4-Tiny, And Yolov7-Tiny, Vladimir A. Kulyukin, Aleksey V. Kulyukin
Accuracy Vs. Energy: An Assessment Of Bee Object Inference In Videos From On-Hive Video Loggers With Yolov3, Yolov4-Tiny, And Yolov7-Tiny, Vladimir A. Kulyukin, Aleksey V. Kulyukin
Computer Science Faculty and Staff Publications
A continuing trend in precision apiculture is to use computer vision methods to quantify characteristics of bee traffic in managed colonies at the hive's entrance. Since traffic at the hive's entrance is a contributing factor to the hive's productivity and health, we assessed the potential of three open-source convolutional network models, YOLOv3, YOLOv4-tiny, and YOLOv7-tiny, to quantify omnidirectional traffic in videos from on-hive video loggers on regular, unmodified one- and two-super Langstroth hives and compared their accuracies, energy efficacies, and operational energy footprints. We trained and tested the models with a 70/30 split on a dataset of 23,173 flying bees …
Empowering Patient Similarity Networks Through Innovative Data-Quality-Aware Federated Profiling, Alramzana Nujum Navaz, Mohamed Adel Serhani, Hadeel T. El Kassabi, Ikbal Taleb
Empowering Patient Similarity Networks Through Innovative Data-Quality-Aware Federated Profiling, Alramzana Nujum Navaz, Mohamed Adel Serhani, Hadeel T. El Kassabi, Ikbal Taleb
All Works
Continuous monitoring of patients involves collecting and analyzing sensory data from a multitude of sources. To overcome communication overhead, ensure data privacy and security, reduce data loss, and maintain efficient resource usage, the processing and analytics are moved close to where the data are located (e.g., the edge). However, data quality (DQ) can be degraded because of imprecise or malfunctioning sensors, dynamic changes in the environment, transmission failures, or delays. Therefore, it is crucial to keep an eye on data quality and spot problems as quickly as possible, so that they do not mislead clinical judgments and lead to the …
Learning Deep Time-Index Models For Time Series Forecasting, Jiale Gerald Woo, Chenghao Liu, Doyen Sahoo, Akshat Kumar, Steven Hoi
Learning Deep Time-Index Models For Time Series Forecasting, Jiale Gerald Woo, Chenghao Liu, Doyen Sahoo, Akshat Kumar, Steven Hoi
Research Collection School Of Computing and Information Systems
Deep learning has been actively applied to time series forecasting, leading to a deluge of new methods, belonging to the class of historicalvalue models. Yet, despite the attractive properties of time-index models, such as being able to model the continuous nature of underlying time series dynamics, little attention has been given to them. Indeed, while naive deep timeindex models are far more expressive than the manually predefined function representations of classical time-index models, they are inadequate for forecasting, being unable to generalize to unseen time steps due to the lack of inductive bias. In this paper, we propose DeepTime, a …
Deep Learning Methods For Some Problems In Scientific Computing, Yuankai Teng
Deep Learning Methods For Some Problems In Scientific Computing, Yuankai Teng
Theses and Dissertations
Deep learning has emerged as a powerful approach for solving complex problems in scientific computing due to the increasing availability of large-scale data and computational resources. This thesis explores the potential of deep learning methods for three specific problems in scientific computing: (i) reducing the dimensions of variables in function approximation, (ii) solving linear reaction-diffusion equations, and (iii) finding the parametric representations of parameters in the numerical schemes for solving time-dependent partial differential equations.
For the first problem, a novel deep learning architecture is developed for reducing the dimensions of variables in function approximation. The proposed method achieves state-of-the-art performance …
Lightweight Deep Neural Network Models For Electromyography Signal Recognition For Prosthetic Control, Ahmet Mert
Lightweight Deep Neural Network Models For Electromyography Signal Recognition For Prosthetic Control, Ahmet Mert
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, lightweight deep learning methods are proposed to recognize multichannel electromyography (EMG) signals against varying contraction levels. The classical machine learning, and signal processing methods namely, linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), root mean square (RMS), and waveform length (WL) are adopted to convolutional neural network (CNN), and long short-term memory neural network (LSTM). Eight-channel recordings of nine amputees from a publicly available dataset are used for training and testing the proposed models considering prosthetic control strategies. Six class hand movements with three contraction levels are applied to WL and RMS-based feature extraction. After that, they …