Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine Learning (4)
- Deep learning (2)
- Accessibility (1)
- Accessible game design (1)
- Audio navigation (1)
-
- Bi-LSTM (1)
- Big Data (1)
- Blockchain (1)
- Blockchain Technology (1)
- CNN (1)
- Computer Vision (1)
- Convolutional Neural Network (1)
- Convolutional Neural Networks (1)
- Cyber Security (1)
- Cybersecurity (1)
- DBN (1)
- Decentralized Federated Learning (1)
- Deep learning. (1)
- Diegetic sonification (1)
- Dilated Layers (1)
- Dimension reduction (1)
- Document Layout Analysis (1)
- Ecosystem (1)
- Electronic Health Records (HER) (1)
- Entropy (1)
- Ethereum (1)
- Feature selection (1)
- Gaming (1)
- Human computer interaction (1)
- Hyperledger Fabric (1)
Articles 1 - 12 of 12
Full-Text Articles in Engineering
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Master's Theses
The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.
In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …
Diegetic Sonification For Low Vision Gamers, Jhané Dawes
Diegetic Sonification For Low Vision Gamers, Jhané Dawes
Master's Theses
There are not many games designed for all players that provide accommodations for low vision users. This means that low vision users may not get to engage with the gaming community in the same way as their sighted peers. In this thesis, I explore how diegetic sonification can be used as a tool to support these low vision gamers in the typical gaming environment. I asked low vision players to engage with a prototype game level with two diegetic sonification techniques applied, without the use of their corrective lenses. I found that participants had more enjoyment and experienced less difficulty …
Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway
Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway
Master's Theses
During our education at KSU, we have learned about various factors that affect productivity such as schedule, budget, and risks, but those are often controlled outside of what we could learn as software engineering principles, patterns, or practices. On top of that, other off-work factors such as health conditions, emotional distress, or political climate, just to name a few, could drastically affect the productivity of a software engineering team. We see a demarcation between those factors that affect productivity in software engineering but are not inherent to the discipline itself, which we call resistance factors, and the factors that are …
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Master of Science in Computer Science Theses
The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
Master of Science in Software Engineering Theses
Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …
Decentralized Aggregation Design And Study Of Federated Learning, Venkata Naga Surya Sameeraja Malladi
Decentralized Aggregation Design And Study Of Federated Learning, Venkata Naga Surya Sameeraja Malladi
Master of Science in Software Engineering Theses
The advent of machine learning techniques has given rise to modern devices with built-in models for decision making and providing rich content to users. This typically involves processing huge volumes of data in central servers and sending updated models to end-user devices. There are two main concerns on this server architecture, one is the privacy of data that is being transferred to a central server and the other is volumes of data sent over the network for the model update. Federated Learning helps solve these problems by training models on local data within the device and aggregating the model with …
Document Layout Analysis And Recognition Systems, Sai Kosaraju
Document Layout Analysis And Recognition Systems, Sai Kosaraju
Master of Science in Computer Science Theses
Automatic extraction of relevant knowledge to domain-specific questions from Optical Character Recognition (OCR) documents is critical for developing intelligent systems, such as document search engines, sentiment analysis, and information retrieval, since hands-on knowledge extraction by a domain expert with a large volume of documents is intensive, unscalable, and time-consuming. There have been a number of studies that have automatically extracted relevant knowledge from OCR documents, such as ABBY and Sandford Natural Language Processing (NLP). Despite the progress, there are still limitations yet-to-be solved. For instance, NLP often fails to analyze a large document. In this thesis, we propose a knowledge …
Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .
Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .
Master of Science in Software Engineering Theses
In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. But recently, public and permissionless blockchains such as Bitcoin and Ethereum have faced stumbling blocks in the form of scalability. Both Bitcoin and Ethereum process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA that can process approximately 1,700 transactions per second. In realizing this hindrance in the wide range adoption of blockchains for building advanced and large scalable …
Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie
Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie
Master of Science in Computer Science Theses
The evolution of machine learning and computer vision in technology has driven a lot of
improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …
Classification Of Images Based On Pixels That Represent A Small Part Of The Scene. A Case Applied To Microaneurysms In Fundus Retina Images, Pablo F. Ordonez, Pablo F. Ordonez
Classification Of Images Based On Pixels That Represent A Small Part Of The Scene. A Case Applied To Microaneurysms In Fundus Retina Images, Pablo F. Ordonez, Pablo F. Ordonez
Master of Science in Computer Science Theses
Convolutional Neural Networks (CNNs), the state of the art in image classification, have proven to be as effective as an ophthalmologist, when detecting Referable Diabetic Retinopathy (RDR). Having a size of less than 1\% of the total image, microaneurysms are early lesions in DR that are difficult to classify. The purpose of this thesis is to improve the accuracy of detection of microaneurysms using a model that includes two CNNs with different input image sizes, 60x60 and 420x420 pixels. These models were trained using the Kaggle and Messidor datasets and tested independently against the Kaggle dataset, showing a sensitivity of …
Feature Selection And Improving Classification Performance For Malware Detection, Carlos A. Cepeda Mora
Feature Selection And Improving Classification Performance For Malware Detection, Carlos A. Cepeda Mora
Master of Science in Computer Science Theses
The ubiquitous advance of technology has been conducive to the proliferation of cyber threats, resulting in attacks that have grown exponentially. Consequently, researchers have developed models based on machine learning algorithms for detecting malware. However, these methods require significant amount of extracted features for correct malware classification, making that feature extraction, training, and testing take significant time; even more, it has been unexplored which are the most important features for accomplish the correct classification.
In this Thesis, it is created and analyzed a dataset of malware and clean files (goodware) from the static and dynamic features provided by the online …
Comparative Study Of Dimension Reduction Approaches With Respect To Visualization In 3-Dimensional Space, Pooja Chenna
Comparative Study Of Dimension Reduction Approaches With Respect To Visualization In 3-Dimensional Space, Pooja Chenna
Master of Science in Computer Science Theses
In the present big data era, there is a need to process large amounts of unlabeled data and find some patterns in the data to use it further. If data has many dimensions, it is very hard to get any insight of it. It is possible to convert high-dimensional data to low-dimensional data using different techniques, this dimension reduction is important and makes tasks such as classification, visualization, communication and storage much easier. The loss of information should be less while mapping data from high-dimensional space to low-dimensional space. Dimension reduction has been a significant problem in many fields as …