Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Sugarmate: Non-Intrusive Blood Glucose Monitoring With Smartphones, Weixi Gu, Yuxun Zhou, Zimu Zhou, Xi Liu, Han Zou, Pei Zhang, Costas J. Spanos, Lin Zhang Sep 2017

Sugarmate: Non-Intrusive Blood Glucose Monitoring With Smartphones, Weixi Gu, Yuxun Zhou, Zimu Zhou, Xi Liu, Han Zou, Pei Zhang, Costas J. Spanos, Lin Zhang

Research Collection School Of Computing and Information Systems

Inferring abnormal glucose events such as hyperglycemia and hypoglycemia is crucial for the health of both diabetic patients and non-diabetic people. However, regular blood glucose monitoring can be invasive and inconvenient in everyday life. We present SugarMate, a first smartphone-based blood glucose inference system as a temporary alternative to continuous blood glucose monitors (CGM) when they are uncomfortable or inconvenient to wear. In addition to the records of food, drug and insulin intake, it leverages smartphone sensors to measure physical activities and sleep quality automatically. Provided with the imbalanced and often limited measurements, a challenge of SugarMate is the inference …


Improving Pure-Tone Audiometry Using Probabilistic Machine Learning Classification, Xinyu Song Aug 2017

Improving Pure-Tone Audiometry Using Probabilistic Machine Learning Classification, Xinyu Song

McKelvey School of Engineering Theses & Dissertations

Hearing loss is a critical public health concern, affecting hundreds millions of people worldwide and dramatically impacting quality of life for affected individuals. While treatment techniques have evolved in recent years, methods for assessing hearing ability have remained relatively unchanged for decades. The standard clinical procedure is the modified Hughson-Westlake procedure, an adaptive pure-tone detection task that is typically performed manually by audiologists, costing millions of collective hours annually among healthcare professionals. In addition to the high burden of labor, the technique provides limited detail about an individual’s hearing ability, estimating only detection thresholds at a handful of pre-defined pure-tone …


Effect Of Label Noise On The Machine-Learned Classification Of Earthquake Damage, Jared Frank, Umaa Rebbapragada, James Bialas, Thomas Oommen, Timothy C. Havens Aug 2017

Effect Of Label Noise On The Machine-Learned Classification Of Earthquake Damage, Jared Frank, Umaa Rebbapragada, James Bialas, Thomas Oommen, Timothy C. Havens

Michigan Tech Publications

Automated classification of earthquake damage in remotely-sensed imagery using machine learning techniques depends on training data, or data examples that are labeled correctly by a human expert as containing damage or not. Mislabeled training data are a major source of classifier error due to the use of imprecise digital labeling tools and crowdsourced volunteers who are not adequately trained on or invested in the task. The spatial nature of remote sensing classification leads to the consistent mislabeling of classes that occur in close proximity to rubble, which is a major byproduct of earthquake damage in urban areas. In this study, …


Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi Aug 2017

Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi

Electronic Theses and Dissertations

While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …


Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee Jul 2017

Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee

Electrical & Computer Engineering Theses & Dissertations

Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a …


Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani May 2017

Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani

Electronic Theses and Dissertations

This study analyzed fMRI responses to fear and anxiety using a Multi Variate Pattern Analysis (MVPA) approach. Compared to conventional univariate methods which only represent regions of activation, MVPA provides us with more detailed patterns of voxels. We successfully found different patterns for fear and anxiety through separate classification attempts in each subject’s representational space. Further, we transformed all the individual models into a standard space to do group analysis. Results showed that subjects share a more common fear response. Also, the amygdala and hippocampus areas are more important for differentiating fear than anxiety.


A Comparison Of Feature Extraction Techniques For Malware Analysis, Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir Jan 2017

A Comparison Of Feature Extraction Techniques For Malware Analysis, Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir

Turkish Journal of Electrical Engineering and Computer Sciences

The manifold growth of malware in recent years has resulted in extensive research being conducted in the domain of malware analysis and detection, and theories from a wide variety of scientific knowledge domains have been applied to solve this problem. The algorithms from the machine learning paradigm have been particularly explored, and many feature extraction methods have been proposed in the literature for representing malware as feature vectors to be used in machine learning algorithms. In this paper we present a comparison of several feature extraction techniques by first applying them on system call logs of real malware, and then …


Late Fusion Of Facial Dynamics For Automatic Expression Recognition, Alessandra Bandrabur, Laura Florea, Cornel Florea, Matei Mancas Jan 2017

Late Fusion Of Facial Dynamics For Automatic Expression Recognition, Alessandra Bandrabur, Laura Florea, Cornel Florea, Matei Mancas

Turkish Journal of Electrical Engineering and Computer Sciences

Installment of a facial expression is associated with contractions and extensions of specific facial muscles. Noting that expression is about changes, we present a model for expression classification based on facial landmarks dynamics. Our model isolates the trajectory of facial fiducial points by wrapping them up in relevant features and discriminating among various alternatives with a machine learning classification system. The used features are geometric and temporal-based and the classification system is represented by a late fusion framework that combines several neural networks with binary responses. The proposed method is robust, being able to handle complex expression classes.


Audio-Based Productivity Forecasting Of Construction Cyclic Activities, Chris A. Sabillon Jan 2017

Audio-Based Productivity Forecasting Of Construction Cyclic Activities, Chris A. Sabillon

Electronic Theses and Dissertations

Due to its high cost, project managers must be able to monitor the performance of construction heavy equipment promptly. This cannot be achieved through traditional management techniques, which are based on direct observation or on estimations from historical data. Some manufacturers have started to integrate their proprietary technologies, but construction contractors are unlikely to have a fleet of entirely new and single manufacturer equipment for this to represent a solution. Third party automated approaches include the use of active sensors such as accelerometers and gyroscopes, passive technologies such as computer vision and image processing, and audio signal processing. Hitherto, most …