Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (59)
- Technological University Dublin (25)
- University of Louisville (18)
- University of Nebraska - Lincoln (18)
- Old Dominion University (17)
-
- New Jersey Institute of Technology (11)
- China Simulation Federation (10)
- Wright State University (10)
- Portland State University (8)
- University of South Carolina (8)
- Western University (7)
- California Polytechnic State University, San Luis Obispo (6)
- Air Force Institute of Technology (5)
- Florida International University (5)
- Singapore Management University (5)
- University of Massachusetts Amherst (5)
- University of Nevada, Las Vegas (5)
- City University of New York (CUNY) (4)
- Georgia Southern University (4)
- Louisiana State University (4)
- Marquette University (4)
- University of Denver (4)
- University of Kentucky (4)
- University of Tennessee, Knoxville (4)
- American University in Cairo (3)
- Association of Arab Universities (3)
- California State University, San Bernardino (3)
- Chapman University (3)
- Kennesaw State University (3)
- Purdue University (3)
- Publication Year
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (59)
- Electronic Theses and Dissertations (26)
- Dissertations (19)
- Theses and Dissertations (13)
- Browse all Theses and Dissertations (10)
-
- Journal of System Simulation (10)
- Articles (9)
- Doctoral Dissertations (8)
- Library Philosophy and Practice (e-journal) (7)
- Publications (6)
- Electronic Thesis and Dissertation Repository (5)
- Master's Theses (5)
- Research Collection School Of Computing and Information Systems (5)
- Computer Science Faculty Publications and Presentations (4)
- Conference papers (4)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (4)
- Electrical & Computer Engineering Faculty Publications (4)
- Electrical & Computer Engineering Theses & Dissertations (4)
- Electrical and Computer Engineering Faculty Research and Publications (4)
- FIU Electronic Theses and Dissertations (4)
- Theses and Dissertations--Computer Science (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (3)
- Department of Electrical and Computer Engineering: Faculty Publications (3)
- Engineering Faculty Articles and Research (3)
- Honors Theses (3)
- LSU Doctoral Dissertations (3)
- Master of Science in Computer Science Theses (3)
- Masters Theses (3)
- McKelvey School of Engineering Theses & Dissertations (3)
Articles 1 - 30 of 335
Full-Text Articles in Engineering
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …
Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad
Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad
Theses and Dissertations
Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …
Detection Of Myofascial Trigger Points With Ultrasound Imaging And Machine Learning, Benjamin Formby
Detection Of Myofascial Trigger Points With Ultrasound Imaging And Machine Learning, Benjamin Formby
All Theses
Myofascial Pain Syndrome (MPS) is a common chronic muscle pain disorder that affects a large portion of the global population, seen in 85-93% of patients in specialty pain clinics [10]. MPS is characterized by hard, palpable nodules caused by a stiffened taut band of muscle fibers. These nodules are referred to as Myofascial Trigger Points (MTrPs) and can be classified by two states: active MTrPs (A-MTrPs) and latent MtrPs (L-MTrPs). Treatment for MPS involves massage therapy, acupuncture, and injections or painkillers. Given the subjectivity of patient pain quantification, MPS can often lead to mistreatment or drug misuse. A deterministic way …
Machine Learning Based Bioinformatics Analysis Of Intron Usage Alterations And Metabolic Regulation In Adipose Browning, Hamza Umut Karakurt, Pinar Pi̇r
Machine Learning Based Bioinformatics Analysis Of Intron Usage Alterations And Metabolic Regulation In Adipose Browning, Hamza Umut Karakurt, Pinar Pi̇r
Turkish Journal of Electrical Engineering and Computer Sciences
Adipose tissue is the major energy depot of the body and is considered an endocrine organ. Adipose tissue involves many different cell types, first and foremost, the adipocytes. White adipose cells that store fat and brown adipocytes that take part in lipid oxidation and heat generation are the most common cell types in adipose tissue. Even though brown adipocytes which have a high number of mitochondria and high fat-burning capacity are rare in adults, they are abundant in newborns and rodents. White adipocytes can gain a temporal brown-like character with a process called browning, which can be induced with cold …
Learning-Based Ant Colony Optimization Algorithm For Solving A Kind Of Complex 2-Echelon Vehicle Routing Problem, Xue Chen, Rong Hu, Hui Wang, Zuocheng Li, Bin Qian, Yixu Li
Learning-Based Ant Colony Optimization Algorithm For Solving A Kind Of Complex 2-Echelon Vehicle Routing Problem, Xue Chen, Rong Hu, Hui Wang, Zuocheng Li, Bin Qian, Yixu Li
Journal of System Simulation
Abstract: Aiming at green 2-echelon vehicle routing problem with simultaneous pick-up and delivery, a learning-based ant colony optimization algorithm combined with clustering decomposition is proposed. The objective function to be minimized is total transportation cost wherein carbon emission cost is specially considered. Associated with the mutual coupling features of the 2-echelon vehicle routing problem, we propose a distance-based clustering method to decompose the original problem into a set of sub-problems. Then, a learning-based ant colony optimization algorithm is presented to find the solutions of the sub-problems based on which the solution of the original problem can be obtained. In the …
Fuzzycsampling: A Hybrid Fuzzy C-Means Clustering Sampling Strategy For Imbalanced Datasets, Abdullah Maraş, Çi̇ğdem Erol
Fuzzycsampling: A Hybrid Fuzzy C-Means Clustering Sampling Strategy For Imbalanced Datasets, Abdullah Maraş, Çi̇ğdem Erol
Turkish Journal of Electrical Engineering and Computer Sciences
Classification model with imbalanced datasets is recently one of the most researched areas in machine learning applications since they induce to the emergence of low-performing machine learning models. The imbalanced datasets occur if target variables have an uneven number of examples in a dataset. The most prevalent solutions to imbalanced datasets can be categorized as data preprocessing, ensemble techniques, and cost-sensitive learning. In this article, we propose a new hybrid approach for binary classification, named FuzzyCSampling, which aims to increase model performance by ensembling fuzzy c-means clustering and data sampling solutions. This article compares the proposed approaches' results not only …
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu
Research Collection School Of Computing and Information Systems
With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …
Classification Of Chronic Pain Using Fmri Data: Unveiling Brain Activity Patterns For Diagnosis, Rejula V, Anitha J, Belfin Robinson
Classification Of Chronic Pain Using Fmri Data: Unveiling Brain Activity Patterns For Diagnosis, Rejula V, Anitha J, Belfin Robinson
Turkish Journal of Electrical Engineering and Computer Sciences
Millions of people throughout the world suffer from the complicated and crippling condition of chronic pain. It can be brought on by several underlying disorders or injuries and is defined by chronic pain that lasts for a period exceeding three months. To better understand the brain processes behind pain and create prediction models for pain-related outcomes, machine learning is a potent technology that may be applied in Functional magnetic resonance imaging (fMRI) chronic pain research. Data (fMRI and T1-weighted images) from 76 participants has been included (30 chronic pain and 46 healthy controls). The raw data were preprocessed using fMRIprep …
Stepwise Dynamic Nearest Neighbor (Sdnn): A New Algorithm For Classification, Deni̇z Karabaş, Derya Bi̇rant, Peli̇n Yildirim Taşer
Stepwise Dynamic Nearest Neighbor (Sdnn): A New Algorithm For Classification, Deni̇z Karabaş, Derya Bi̇rant, Peli̇n Yildirim Taşer
Turkish Journal of Electrical Engineering and Computer Sciences
Although the standard k-nearest neighbor (KNN) algorithm has been used widely for classification in many different fields, it suffers from various limitations that abate its classification ability, such as being influenced by the distribution of instances, ignoring distances between the test instance and its neighbors during classification, and building a single/weak learner. This paper proposes a novel algorithm, called stepwise dynamic nearest neighbor (SDNN), which can effectively handle these problems. Instead of using a fixed parameter k like KNN, it uses a dynamic neighborhood strategy according to the data distribution and implements a new voting mechanism, called stepwise voting. Experimental …
A Machine Learning Approach For Dyslexia Detection Using Turkish Audio Records, Tuğberk Taş, Muhammed Abdullah Bülbül, Abas Haşi̇moğlu, Yavuz Meral, Yasi̇n Çalişkan, Gunay Budagova, Mücahi̇d Kutlu
A Machine Learning Approach For Dyslexia Detection Using Turkish Audio Records, Tuğberk Taş, Muhammed Abdullah Bülbül, Abas Haşi̇moğlu, Yavuz Meral, Yasi̇n Çalişkan, Gunay Budagova, Mücahi̇d Kutlu
Turkish Journal of Electrical Engineering and Computer Sciences
Dyslexia is a learning disorder, characterized by impairment in the ability to read, spell, and decode letters. It is vital to detect dyslexia in earlier stages to reduce its effects. However, diagnosing dyslexia is a time-consuming and costly process. In this paper, we propose a machine-learning model that predicts whether a Turkish-speaking child has dyslexia using his/her audio records. Therefore, our model can be easily used by smart phones and work as a warning system such that children who are likely to be dyslexic according to our model can seek an examination by experts. In order to train and evaluate, …
Cognitive Load Detection Using Ci-Ssa For Eeg Signal Decomposition And Nature-Inspired Feature Selection, Jammisetty Yedukondalu, Lakhan Dev Sharma
Cognitive Load Detection Using Ci-Ssa For Eeg Signal Decomposition And Nature-Inspired Feature Selection, Jammisetty Yedukondalu, Lakhan Dev Sharma
Turkish Journal of Electrical Engineering and Computer Sciences
Cognitive load detection is eminent during the mental assignment of neural activity because it indicates how the brain reacts to stimuli. The level of cognitive load experienced during mental arithmetic tasks can be determined using an electroencephalogram (EEG). The EEG data were collected from publicly available datasets, namely, mental arithmetic task (MAT) and simultaneous task workload (STEW). The first phase comprises decomposing the electroencephalogram (EEG) signal into intrinsic mode functions (IMFs) using circulant singular spectrum analysis (Ci-SSA). In the second phase, entropy-based features were evaluated using IMFs. After that, the extracted features were fed to nature-inspired feature selection algorithms: genetic …
Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever
Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever
Articles
Abstract: Child sexual abuse material (CSAM) activities are prevalent on the Dark Web to evade detection, posing a global challenge for law enforcement. Our objective is to analyze CSAM discussions in this concealed space using a Support Vector Machine model, achieving an accuracy of 87.6%. Across eight forums, approximately 28.4% of posts contained CSAM, with victim ages most commonly reported as 12, 14, 13, and 11 years old for YouTube, Skype, Instagram, and Facebook, respectively. Additionally, in forums discussing boys, the most frequently mentioned nationalities in CSAM posts were English, German, and American, accounting for 12%, 7.8%, and 6% of …
Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali
Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali
Brain and Mind Institute
Objective:This study proposes to identify and validate weighted sensor stream signatures that predict near-term risk of a major depressive episode and future mood among healthcare workers in Kenya.
Approach: The study will deploy a mobile application (app) platform and use novel data science analytic approaches (Artificial Intelligence and Machine Learning) to identifying predictors of mental health disorders among 500 randomly sampled healthcare workers from five healthcare facilities in Nairobi, Kenya.
Expectation: This study will lay the basis for creating agile and scalable systems for rapid diagnostics that could inform precise interventions for mitigating depression and ensure a healthy, resilient …
Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu
Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu
Applied Mathematics & Information Sciences
In our previous work, we introduced a clustering algorithm based on clique formation. Cliques, the obtained clusters, are constructed by choosing the most dense complete subgraphs by using similarity values between instances. The clique algorithm successfully reduces the number of instances in a data set without substantially changing the accuracy rate. In this current work, we focused on reducing the number of features. For this purpose, the effect of the clique clustering algorithm on dimensionality reduction has been analyzed. We propose a novel algorithm for support vector machine classification by combining these two techniques and applying different strategies by differentiating …
Autonomous Shipwreck Detection & Mapping, William Ard
Autonomous Shipwreck Detection & Mapping, William Ard
LSU Master's Theses
This thesis presents the development and testing of Bruce, a low-cost hybrid Remote Operated Vehicle (ROV) / Autonomous Underwater Vehicle (AUV) system for the optical survey of marine archaeological sites, as well as a novel sonar image augmentation strategy for semantic segmentation of shipwrecks. This approach takes side-scan sonar and bathymetry data collected using an EdgeTech 2205 AUV sensor integrated with an Harris Iver3, and generates augmented image data to be used for the semantic segmentation of shipwrecks. It is shown that, due to the feature enhancement capabilities of the proposed shipwreck detection strategy, correctly identified areas have a 15% …
Using Machine Learning To Assist Auditory Processing Evaluation, Hasitha Wimalarathna, Sangamanatha Veeranna, Minh Vu Duong, Chris Allan Prof, Sumit K. Agrawal, Prudence Allen, Jagath Samarabandu, Hanif M. Ladak
Using Machine Learning To Assist Auditory Processing Evaluation, Hasitha Wimalarathna, Sangamanatha Veeranna, Minh Vu Duong, Chris Allan Prof, Sumit K. Agrawal, Prudence Allen, Jagath Samarabandu, Hanif M. Ladak
Electrical and Computer Engineering Publications
Introduction: Approximately 0.2–5% of school-age children complain of listening difficulties in the absence of hearing loss. These children are often referred to an audiologist for an auditory processing disorder (APD) assessment. Adequate experience and training is necessary to arrive at an accurate diagnosis due to the heterogeneity of the disorder.
Objectives: The main goal of the study was to determine if machine learning (ML) can be used to analyze data from the APD clinical test battery to accurately categorize children with suspected APD into clinical sub-groups, similar to expert labels.
Methods: The study retrospectively collected data from 134 children referred …
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani
Journal of Digital Forensics, Security and Law
Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …
A Practical Framework For Early Detection Of Diabetes Using Ensemble Machine Learning Models, Qusay Saihood, Emrullah Sonuç
A Practical Framework For Early Detection Of Diabetes Using Ensemble Machine Learning Models, Qusay Saihood, Emrullah Sonuç
Turkish Journal of Electrical Engineering and Computer Sciences
The diagnosis of diabetes, a prevalent global health condition, is crucial for preventing severe complications. In recent years, there has been a growing effort to develop intelligent diagnostic systems for diabetes utilizing machine learning (ML) algorithms. Despite these efforts, achieving high accuracy rates using such systems remains a significant challenge. Recent advancements in ensemble ML methods offer promising opportunities for early detection of diabetes, as they are known to be faster and more cost-effective than traditional approaches. Therefore, this study proposes a practical framework for diagnosing diabetes that involves three stages. The data preprocessing stage encompasses several crucial tasks, including …
Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz
Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz
CCE Faculty Articles
This paper describes different E-Senses systems, such as Electronic Nose, Electronic Tongue, and Electronic Eyes, which were used to build several machine learning models and assess their performance in classifying a variety of Colombian herbal tea brands such as Albahaca, Frutos Verdes, Jaibel, Toronjil, and Toute. To do this, a set of Colombian herbal tea samples were previously acquired from the instruments and processed through multivariate data analysis techniques (principal component analysis and linear discriminant analysis) to feed the support vector machine, K-nearest neighbors, decision trees, naive Bayes, and random forests algorithms. The results of the E-Senses were validated using …
User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny
User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny
Theses and Dissertations
With the rise of mobile and pervasive computing, users are often ingesting content on the go. Services are constantly competing for attention in a very crowded field. It is only logical that users would allot their attention to the services that are most likely to adapt to their needs and interests. This matter becomes trivial when users create accounts and explicitly inform the services of their demographics and interests. Unfortunately, due to privacy and security concerns, and due to the fast nature of computing today, users see the registration process as an unnecessary hurdle to bypass, effectively refusing to provide …
Cometrics: A New Software Tool For Behavior‑Analytic Clinicians And Machine Learning Researchers, Walker S. Arce, Seth G. Walker, Morgan L. Hurtz
Cometrics: A New Software Tool For Behavior‑Analytic Clinicians And Machine Learning Researchers, Walker S. Arce, Seth G. Walker, Morgan L. Hurtz
Department of Electrical and Computer Engineering: Faculty Publications
Cometrics is a Microsoft Windows compatible clinical tool for the collection and recording of frequency- and duration-based target behaviors, physiological signals, and video data. This software package is designed to record in-vivo observational and physiological data. In addition, we have included features that allow observers to capture video from real-time camera feeds and import saved video for retroactive data collection. By using Microsoft Excel-based spreadsheets, also called keystroke files, assessment and treatment sessions are exported into a single document using the click of a button. Integrated interobserver agreement metrics allow comparisons across primary and reliability observers, with the output exported …
Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey
Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey
Al-Bahir Journal for Engineering and Pure Sciences
Twitter is a social media platform where users can post, read, and interact with 'tweets'. Third party like corporate organization can take advantage of this huge information by collecting data about their customers' opinions. The use of emoticons on social media and the emotions expressed through them are the subjects of this research paper. The purpose of this paper is to present a model for analyzing emotional responses to real-life Twitter data. The proposed model is based on supervised machine learning algorithms and data on has been collected through crawler “TWEEPY” for empirical analysis. Collected data is pre-processed, pruned and …
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Master of Science in Computer Science Theses
The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …
Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce
Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
When applying machine learning to clinical practice, a major hurdle that will be encountered is the lack of available data. While the data collected in clinical therapies is suitable for the types of analysis that are needed to measure and track clinical outcomes, it may not be suitable for other types of analysis. For instance, video data may have poor alignment with behavioral data, making it impossible to extract the videos frames that directly correlate with the observed behavior. Alternatively, clinicians may be exploring new data modalities, such as physiological signal collection, to research methods of improving clinical outcomes that …
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Electronic Theses, Projects, and Dissertations
Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …
Acat 2.0: An Ai Transformer-Based Approach To Predictive Speech Generation, Kairan Quazi
Acat 2.0: An Ai Transformer-Based Approach To Predictive Speech Generation, Kairan Quazi
Computer Science and Engineering Senior Theses
While constituting a rare family of diseases that afflicts 268,000 people worldwide, motor neuron diseases carry a high fatality rate with one-third of people dying within a year of diagnosis and 50% of people dying within two years (MND Association, 2022). MNDs rapidly and progressively impair muscle movement, making everyday activities like walking, chewing, and speaking almost impossible. In collaboration with famed physicist Dr. Stephen Hawking, Intel Labs developed an assistive communications platform known as ACAT to simulate speech and facilitate electronic tasks. However, the original ACAT can be slow to use, leading to awkward pauses in conversations. This paper …
Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego
Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego
Electrical & Computer Engineering Theses & Dissertations
World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …
An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇
An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Banknote counterfeiting is a common practice worldwide. Due to the recent developments in technology, banknote imitation has become easier than before. There are different kinds of algorithms developed for the detection of counterfeit banknotes for different countries in the literature. The earlier algorithms utilized classical image processing techniques where the implementations of machine learning and deep learning algorithms appeared with the developments in the artificial intelligence field as well as the computer hardware. In this study, a novel convolutional neural networks-based deep learning algorithm has been developed that detects counterfeit Turkish Lira banknotes and their denominations using the banknote images …
Information-Theoretic Model Diagnostics (Infomod), Armin Esmaeilzadeh
Information-Theoretic Model Diagnostics (Infomod), Armin Esmaeilzadeh
UNLV Theses, Dissertations, Professional Papers, and Capstones
Model validation is a critical step in the development, deployment, and governance of machine learning models. During the validation process, the predictive power of a model is measured on unseen datasets with a variety of metrics such as Accuracy and F1-Scores for classification tasks. Although the most used metrics are easy to implement and understand, they are aggregate measures over all the segments of heterogeneous datasets, and therefore, they do not identify the performance variation of a model among different data segments. The lack of insight into how the model performs over segments of unseen datasets has raised significant challenges …