Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Boolean Implication Networks (2)
- Deep Learning (2)
- Java (2)
- Machine Learning (2)
- Adversarial Learning (1)
-
- Architecture Smell (1)
- Architecture Smell Risk (1)
- Architecture Technical Debt (1)
- Artificial Neural Network (1)
- Autism Spectrum Disorder (ASD) (1)
- Autism Trait (1)
- Auto-regressive process (1)
- Automation Testing (1)
- Auxiliary Data (1)
- Avatar Animation (1)
- Beatuty Understanding (1)
- Beautification (1)
- Biomarker Discovery (1)
- Biosensors (1)
- Blockchain (1)
- Botnet (1)
- Burg estimation method (1)
- CACC (1)
- CFS (1)
- CKD (1)
- Classification (1)
- Convolutional Neural Network (1)
- Correction Coefficients (1)
- Cryptocurrency (1)
- CubeSat (1)
Articles 1 - 22 of 22
Full-Text Articles in Engineering
Machine Learning For Biosensors, Gayathri Anapanani
Machine Learning For Biosensors, Gayathri Anapanani
Graduate Theses, Dissertations, and Problem Reports
Biosensors have become increasingly popular as diagnostic tools due to their ability to detect and quantify biological analytes in a wide range of applications. With the growing demand for faster and more reliable biosensing devices, machine learning has become a valuable tool in enhancing biosensor performance. In this report, we review recent progress in the application of machine learning to biosensors. We discuss the potential benefits of using machine learning in biosensors, including improved sensitivity, selectivity, and accuracy. We also discuss the various machine learning techniques that have been applied to biosensors, including data preprocessing, feature extraction, and classification and …
Implementing Test Automation With Selenium Webdriver, Ramana Inturi
Implementing Test Automation With Selenium Webdriver, Ramana Inturi
Graduate Theses, Dissertations, and Problem Reports
Many software programs, such as applications for designing, modeling, simulating, and analyzing systems, are now commonly available as web-based applications. The testing of such sophisticated web applications is highly challenging and can be extremely tedious and error-prone if done manually. Recently automation tools have become increasingly used for testing web-based applications, as they minimize human involvement and repetitive work.
For this problem report project, we have built and implemented an automation testing framework for web applications. The project specifically uses a tool called Selenium WebDriver, which has been used to develop the testing framework. By using this framework, testers may …
Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang
Face Image And Video Analysis In Biometrics And Health Applications, Na Zhang
Graduate Theses, Dissertations, and Problem Reports
Computer Vision (CV) enables computers and systems to derive meaningful information from acquired visual inputs, such as images and videos, and make decisions based on the extracted information. Its goal is to acquire, process, analyze, and understand the information by developing a theoretical and algorithmic model. Biometrics are distinctive and measurable human characteristics used to label or describe individuals by combining computer vision with knowledge of human physiology (e.g., face, iris, fingerprint) and behavior (e.g., gait, gaze, voice). Face is one of the most informative biometric traits. Many studies have investigated the human face from the perspectives of various different …
Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu
Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu
Graduate Theses, Dissertations, and Problem Reports
Face representation learning is one of the most popular research topics in the computer vision community, as it is the foundation of face recognition and face image generation. Numerous representation learning frameworks have been integrated into applications in daily life, such as face recognition, image editing, and face tracking. Researchers have developed advanced algorithms for face recognition with successful commercial productions, for example, FaceID on the smartphone. The performance record on face recognition is constantly updated and becoming saturated with the help of large-scale datasets and advanced computational resources. Thanks to the robust representation in face recognition, in this dissertation, …
Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy
Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy
Graduate Theses, Dissertations, and Problem Reports
Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.
This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Graduate Theses, Dissertations, and Problem Reports
Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
Graduate Theses, Dissertations, and Problem Reports
An active research topic is the detection of various oscillations that may lead to instability and potential disruption in the operation of a power network. Forced Oscillations (FOs) play a unique role in power system stability among various oscillations. They are perturbances that change the system’s state and are caused for many reasons, including but not limited to persistent load changes and oscillatory load or generation, fault, triplane, and other mechanical anomalies. These factors can hugely affect the power grid by either increasing or decreasing the amplitude, causing corrupt modes leading to blackouts, affecting the equipment involved, delivering poor power …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …
A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye
A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye
Graduate Theses, Dissertations, and Problem Reports
Lung cancer has the second highest cancer incidence rate and the top cancer-related mortality worldwide. An estimate from the American Cancer Society shows that, in 2022, there will be about 236,740 lung cancer cases (117,910 men and 118,830 women) in the US. To date, there are no prognostic/predictive biomarkers to select chemotherapy, immunotherapy, and radiotherapy in individual non-small cell lung cancer (NSCLC) patients. There is an unmet clinical need to identify patients with early-stage NSCLC who are likely to develop recurrence and to predict their therapeutic responses. This dissertation developed a novel computational methodology for modeling molecular gene association networks …
Iot Malicious Traffic Classification Using Machine Learning, Michael Austin
Iot Malicious Traffic Classification Using Machine Learning, Michael Austin
Graduate Theses, Dissertations, and Problem Reports
Although desktops and laptops have historically composed the bulk of botnet nodes, Internet of Things (IoT) devices have become more recent targets. Lightbulbs, outdoor cameras, watches, and many other small items are connected to WiFi and each other; and few have well-developed security or hardening. Research on botnets typically leverages honeypots, PCAPs, and network traffic analysis tools to develop detection models. The research questions addressed in this Problem Report are: (1) What machine learning algorithm performs the best in a binary classification task for a representative dataset of malicious and benign IoT traffic; and (2) What features have the most …
Increasing The Reliability Of Software Systems On Small Satellites Using Software-Based Simulation Of The Embedded System, Matthew D. Grubb
Increasing The Reliability Of Software Systems On Small Satellites Using Software-Based Simulation Of The Embedded System, Matthew D. Grubb
Graduate Theses, Dissertations, and Problem Reports
The utility of Small Satellites (SmallSats) for technology demonstrations and scientific research has been proven over the past few decades by governments, universities, and private companies. While the research and technology demonstration objectives that can be provided by these SmallSats are becoming similar to larger spacecraft, their reliability still falls behind. This is in part due to the reduced cost of SmallSat missions in comparison to large spacecraft, which requires cheaper components, rapid development schedules, and accepted risk. In these missions, the importance of the flight software is often overlooked, and the software is rushed through development and not fully …
A Deep Learning Approach To Lncrna Subcellular Localization Using Inexact Q-Mer, Weijun Yi
A Deep Learning Approach To Lncrna Subcellular Localization Using Inexact Q-Mer, Weijun Yi
Graduate Theses, Dissertations, and Problem Reports
Long non coding Ribonucleic Acids (lncRNAs) can be localized to different cellular components, such as the nucleus, exosome, cytoplasm, ribosome, etc. Their biological functions can be influenced by the region of the cell they are located. Many of these lncRNAs are associated with different challenging diseases. Thus, it is crucial to study their subcellular localization. However, compared to the vast number of lncRNAs, only relatively few have annotations in terms of their subcellular localization. Conventional computational methods use q-mer profiles from lncRNA sequences and then train machine learning models, such as support vector machines and logistic regression with the profiles. …
Mitigating Insider Threats In A Cooperative Adaptive Cruise Control System Using Local Intra-Vehicle Data, Alexander Francis Colon
Mitigating Insider Threats In A Cooperative Adaptive Cruise Control System Using Local Intra-Vehicle Data, Alexander Francis Colon
Graduate Theses, Dissertations, and Problem Reports
With the rise of Connected-and-Automated-Vehicle (CAV) technologies on roadways, transportation networks have become increasingly connected through Vehicle-to-Everything (V2X) systems. With access to the additional data from V2X, modern cruise control systems like Adaptive Cruise Control (ACC) are further improved upon to develop systems like Cooperative ACC (CACC) which reduces traffic congestion and increases driver safety and energy efficiency. With that increased connectivity, previously closed vehicle systems are now vulnerable to new security threats which pose new technical challenges. Significant research has been done to strengthen the network against external threats such as denial-of-service attacks (DoS) or passive eavesdropping attacks using …
Touching Light: A Framework For The Facilitation Of Music-Making In Mixed Reality, Ian Thomas Riley
Touching Light: A Framework For The Facilitation Of Music-Making In Mixed Reality, Ian Thomas Riley
Graduate Theses, Dissertations, and Problem Reports
Drawing upon the historical development of analog and digital technologies alongside the proliferation of computer-assisted performance practices, this research seeks to develop a framework for integrating Mixed Reality applications to live musical performance, specifically through the creation of a Microsoft HoloLens 2 Mixed Reality application in order to facilitate a live performance of an original musical composition for percussion and real-time Mixed Reality environment. Mixed Reality enables a performer to interact with virtual (holograms, VSTs, etc.) and physical (vibraphone, tuned drums, microphones, etc.) objects simultaneously. Tandem to the development of the conceptual framework was the composition of an original score …
Deep Learning Architectures For Heterogeneous Face Recognition, Seyed Mehdi Iranmanesh
Deep Learning Architectures For Heterogeneous Face Recognition, Seyed Mehdi Iranmanesh
Graduate Theses, Dissertations, and Problem Reports
Face recognition has been one of the most challenging areas of research in biometrics and computer vision. Many face recognition algorithms are designed to address illumination and pose problems for visible face images. In recent years, there has been significant amount of research in Heterogeneous Face Recognition (HFR). The large modality gap between faces captured in different spectrum as well as lack of training data makes heterogeneous face recognition (HFR) quite a challenging problem. In this work, we present different deep learning frameworks to address the problem of matching non-visible face photos against a gallery of visible faces.
Algorithms for …
Risk Assessment Of Architecture Technical Debt, Mrwan Omar Kh. Ben Idris
Risk Assessment Of Architecture Technical Debt, Mrwan Omar Kh. Ben Idris
Graduate Theses, Dissertations, and Problem Reports
Technical Debt (TD) is a metaphor that refers to short-term solutions in software development that may affect the software development life cycle cost. Researchers have found many TD types. These TD types include but are not limited to code debt (CD), design debt (DD), and architecture technical debt (ATD). Several methods have been used to detect technical debt, such as bad smells, software metrics, and code comments. Although TD has received many researchers’ attention, ATD has received less attention compared with CD and DD. We found a lack of tools to deal with ATD in contrast to CD and DD. …
Deep Learning Based Face Detection And Recognition In Mwir And Visible Bands, Suha Reddy Mokalla
Deep Learning Based Face Detection And Recognition In Mwir And Visible Bands, Suha Reddy Mokalla
Graduate Theses, Dissertations, and Problem Reports
In non-favorable conditions for visible imaging like extreme illumination or nighttime, there is a need to collect images in other spectra, specifically infrared. Mid-Wave infrared (3-5 microm) images can be collected without giving away the location of the sensor in varying illumination conditions. There are many algorithms for face detection, face alignment, face recognition etc. proposed in visible band till date, while the research using MWIR images is highly limited. Face detection is an important pre-processing step for face recognition, which in turn is an important biometric modality. This thesis works towards bridging the gap between MWIR and visible spectrum …
Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami
Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami
Graduate Theses, Dissertations, and Problem Reports
Gender identification is an important technique that can improve the performance of authentication systems by reducing searching space and speeding up the matching process. Several biometric traits have been used to ascertain human gender. Among them, the human palmprint possesses several discriminating features such as principal-lines, wrinkles, ridges, and minutiae features and that offer cues for gender identification. The goal of this work is to develop novel deep-learning techniques to determine gender from palmprint images. PolyU and CASIA palmprint databases with 90,000 and 5502 images respectively were used for training and testing purposes in this research. After ROI extraction and …
Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh
Genet-Cnv: Boolean Implication Networks For Modeling Genome-Wide Co-Occurrence Of Dna Copy Number Variations, Salvi Singh
Graduate Theses, Dissertations, and Problem Reports
Lung cancer is the leading cause of cancer-related death in the world. Lung cancer can be categorized as non-small cell lung cancer (NSCLC) and small cell lung cancer (SCLC). NSCLC makes up about 80% to 85% of lung cancer cases diagnosed, whereas SCLC is responsible for 10% to 15% of the cases. It remains a challenge for physicians to identify patients who shall benefit from chemotherapy. In such a scenario, identifying genes that can facilitate therapeutic target discoveries and better understanding disease mechanisms and their regulation in different stages of lung cancer, remains an important topic of research.
In this …
Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen
Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen
Graduate Theses, Dissertations, and Problem Reports
Chronic Kidney Disease (CKD) is the leading cause for kidney failure. It is a global health problem affecting approximately 10% of the world population and about 15% of US adults. Chronic Kidney Diseases do not generally show any disease specific symptoms in early stages thus it is hard to detect and prevent such diseases. Early detection and classification are the key factors in managing Chronic Kidney Diseases.
In this thesis, we propose a new machine learning technique for Kidney Ailment Prediction. We focus on two key issues in machine learning, especially in its application to disease prediction. One is related …
Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy
Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy
Graduate Theses, Dissertations, and Problem Reports
Exhaust gas flow rate from a vehicle tailpipe has a great influence on emission mass rate calculations, as the emission fractions of individual gases in the exhaust are calculated by using the measured exhaust flow rate. The development of high-end sensor technologies and emission pollutant measurement instruments, which can give instantaneous values of volume concentration of pollutants flowing out of the engine are gaining importance because of their ease of operation. The volume concentrations measured can then be used with the instantaneous exhaust flow rate values to obtain mass flow rates of pollutants.
With the recent promulgation of real world …
Security Bug Report Classification Using Feature Selection, Clustering, And Deep Learning, Tanner D. Gantzer
Security Bug Report Classification Using Feature Selection, Clustering, And Deep Learning, Tanner D. Gantzer
Graduate Theses, Dissertations, and Problem Reports
As the numbers of software vulnerabilities and cybersecurity threats increase, it is becoming more difficult and time consuming to classify bug reports manually. This thesis is focused on exploring techniques that have potential to improve the performance of automated classification of software bug reports as security or non-security related. Using supervised learning, feature selection was used to engineer new feature vectors to be used in machine learning. Feature selection changes the vocabulary used by selecting words with the greatest impact on classification. Feature selection was able to increase the F-Score across the datasets by increasing the precision. We also explored …