Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Tennessee, Knoxville (4)
- Western University (3)
- Kennesaw State University (2)
- University of Louisville (2)
- Virginia Commonwealth University (2)
-
- American University in Cairo (1)
- Boise State University (1)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- Clemson University (1)
- Georgia Southern University (1)
- Louisiana State University (1)
- The Texas Medical Center Library (1)
- The University of Southern Mississippi (1)
- University of Arkansas, Fayetteville (1)
- West Virginia University (1)
- Publication
-
- Doctoral Dissertations (4)
- Electronic Theses and Dissertations (3)
- Electronic Thesis and Dissertation Repository (3)
- Theses and Dissertations (3)
- Master of Science in Computer Science Theses (2)
-
- All Dissertations (1)
- Boise State University Theses and Dissertations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations & Theses (Open Access) (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electronic Theses, Projects, and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- LSU Doctoral Dissertations (1)
- Master's Theses (1)
Articles 1 - 24 of 24
Full-Text Articles in Engineering
Deep Learning Based Power System Stability Assessment For Reduced Wecc System, Yinfeng Zhao
Deep Learning Based Power System Stability Assessment For Reduced Wecc System, Yinfeng Zhao
Doctoral Dissertations
Power system stability is the ability of power system, for a giving initial operating condition, to reach a new operation condition with most of the system variables bounded in normal range after subjecting to a short or long disturbance. Traditional power system stability mainly uses time-domain simulation which is very time consuming and only appropriate for offline assessment.
Nowadays, with increasing penetration of inverter based renewable, large-scale distributed energy storage integration and operation uncertainty brought by weather and electricity market, system dynamic and operating condition is more dramatic, and traditional power system stability assessment based on scheduling may not be …
Automatic Classification And Segmentation Of Patterned Martian Ground Using Deep Learning Techniques, Ruthy Brito
Automatic Classification And Segmentation Of Patterned Martian Ground Using Deep Learning Techniques, Ruthy Brito
Electronic Thesis and Dissertation Repository
Science autonomy onboard spacecraft can optimize image return by prioritizing downlink of meaningful data. Martian polygonally cracked ground is actively studied by planetary geologists and may be indicative of subsurface water. Filtering images containing these polygonal features can be used as a case study for science autonomy and to reduce the overhead associated with parsing through Martian surface images. This thesis demonstrates the use of deep learning techniques in the classification of Martian polygonally patterned ground from HiRISE images. Three tasks are considered, a binary classification to identify images containing polygons, multiclass classification distinguishing different polygon types and semantic segmentation …
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Master of Science in Computer Science Theses
The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …
A Long-Term Funds Predictor Based On Deep Learning, Shuiyi Kuang
A Long-Term Funds Predictor Based On Deep Learning, Shuiyi Kuang
Electronic Theses, Projects, and Dissertations
Numerous neural network models have been created to predict the rise or fall of stocks since deep learning has gained popularity, and many of them have performed quite well. However, since the share market is hugely influenced by various policy changes or unexpected news, it is challenging for investors to use such short-term predictions as a guide. In this paper, we try to find a suitable long-term predictor for the funds market by testing different kinds of neural network models, including the Long Short-Term Memory(LSTM) model with different layers, the Gated Recurrent Units(GRU) model with different layers, and the combination …
Machine Learning Models To Automate Radiotherapy Structure Name Standardization, Priyankar Bose
Machine Learning Models To Automate Radiotherapy Structure Name Standardization, Priyankar Bose
Theses and Dissertations
Structure name standardization is a critical problem in Radiotherapy planning systems to correctly identify the various Organs-at-Risk, Planning Target Volumes and `Other' organs for monitoring present and future medications. Physicians often label anatomical structure sets in Digital Imaging and Communications in Medicine (DICOM) images with nonstandard random names. Hence, the standardization of these names for the Organs at Risk (OARs), Planning Target Volumes (PTVs), and `Other' organs is a vital problem. Prior works considered traditional machine learning approaches on structure sets with moderate success. We compare both traditional methods and deep neural network-based approaches on the multimodal vision-language prostate cancer …
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Electronic Theses and Dissertations
Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Dissertations, Theses, and Capstone Projects
With the increase of deception and misinformation especially in social media, it has become crucial to develop machine learning methods to automatically identify deception. In this dissertation, we identify key challenges underlying text-based deception detection in a cross-domain setting, where we do not have training data in the target domain. We analyze the differences between domains and as a result develop methods to improve cross-domain deception detection. We additionally develop approaches that take advantage of cross-lingual properties to support deception detection across languages. This involves the usage of either multilingual NLP models or translation models. Finally, to better understand multi-modal …
Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile
Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile
Electronic Thesis and Dissertation Repository
Corporate networks are constantly bombarded by malicious actors trying to gain access. The current state of the art in protecting networks is deep learning-based intrusion detection systems (IDS). However, for an IDS to be effective it needs to be trained on a good dataset. The best datasets for training an IDS are real data captured from large corporate networks. Unfortunately, companies cannot release their network data due to privacy concerns creating a lack of public cybersecurity data. In this thesis I take a novel approach to network dataset anonymization using character-level LSTM models to learn the characteristics of a dataset; …
Learning With Limited Labeled Data For Image And Video Understanding, Razieh Kaviani Baghbaderani
Learning With Limited Labeled Data For Image And Video Understanding, Razieh Kaviani Baghbaderani
Doctoral Dissertations
Deep learning-based algorithms have remarkably improved the performance in many computer vision tasks. However, deep networks often demand a large-scale and carefully annotated dataset and sufficient sample coverage of every training category. However, it is not practical in many real-world applications where only a few examples may be available, or the data annotation is costly and require expert knowledge. To mitigate this issue, learning with limited data has gained considerable attention and is investigated thorough different learning methods, including few-shot learning, weakly/semi supervised learning, open-set learning, etc.
In this work, the classification problem is investigated under an open-world assumption to …
Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan
Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan
All Dissertations
Contract documents are a critical legal component of a construction project that specify all wishes and expectations of the owner toward the design, construction, and handover of a project. A single contract package, especially of a design-build (DB) project, comprises hundreds of documents including thousands of requirements. Precise comprehension and management of the requirements are critical to ensure that all important explicit and implicit requirements of the project scope are captured, managed, and completed. Since requirements are mainly written in a natural human language, the current manual methods impose a significant burden on practitioners to process and restructure them into …
Extractive Text Summarization On Single Documents Using Deep Learning, Shehab Mostafa Abdel-Salam Mohamed
Extractive Text Summarization On Single Documents Using Deep Learning, Shehab Mostafa Abdel-Salam Mohamed
Theses and Dissertations
The task of summarization can be categorized into two methods, extractive and abstractive summarization. Extractive approach selects highly meaningful sentences to form a summary while the abstractive approach interprets the original document and generates the summary in its own words. The task of generating a summary, whether extractive or abstractive, has been studied with different approaches such as statistical-based, graph-based, and deep-learning based approaches. Deep learning has achieved promising performance in comparison with the classical approaches and with the evolution of neural networks such as the attention network or commonly known as the Transformer architecture, there are potential areas for …
A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi
A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi
Master's Theses
An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.
Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.
In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …
A Fully-Automated, Deep Learning-Based Framework For Ct-Based Localization, Segmentation, Verification And Planning Of Metastatic Vertebrae, Tucker Netherton, Tucker James Netherton
A Fully-Automated, Deep Learning-Based Framework For Ct-Based Localization, Segmentation, Verification And Planning Of Metastatic Vertebrae, Tucker Netherton, Tucker James Netherton
Dissertations & Theses (Open Access)
Palliative radiotherapy is an effective treatment for the palliation of symptoms caused by vertebral metastases. Visible evidence of disease is localized on medical images as part of the treatment planning process. However, complicating factors such as time pressures, anatomic variants in the spine, and similarities in adjacent vertebrae are associated with wrong level treatments of the spine. In addition, erroneous manual contouring of anatomic structures is a major failure mode in radiotherapy treatment planning.
The purpose of this study is to mitigate the challenges associated with treatment planning of the spine by automating the treatment planning process for three-dimensional conformal …
A Deep Learning Approach To Lncrna Subcellular Localization Using Inexact Q-Mer, Weijun Yi
A Deep Learning Approach To Lncrna Subcellular Localization Using Inexact Q-Mer, Weijun Yi
Graduate Theses, Dissertations, and Problem Reports
Long non coding Ribonucleic Acids (lncRNAs) can be localized to different cellular components, such as the nucleus, exosome, cytoplasm, ribosome, etc. Their biological functions can be influenced by the region of the cell they are located. Many of these lncRNAs are associated with different challenging diseases. Thus, it is crucial to study their subcellular localization. However, compared to the vast number of lncRNAs, only relatively few have annotations in terms of their subcellular localization. Conventional computational methods use q-mer profiles from lncRNA sequences and then train machine learning models, such as support vector machines and logistic regression with the profiles. …
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Electronic Theses and Dissertations
White blood cells play important rule in the human body immunity and any change in their count may cause serious diseases. In this study, a system is introduced for white blood cells localization and classification. The dataset used in this study is formed by two components, the first is the annotation dataset that will be used in the localization (364 images), and the second is labeled classes that will be used in the classification (12,444 images). For the localization, two approaches will be discussed, a classical approach and a deep learning based approach. For the classification, 5 different deep learning …
Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman
Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman
Electronic Theses and Dissertations
Machine learning, data mining, and deep learning has become the methodology of choice for analyzing medical data and images. In this study, we implemented three different machine learning techniques to medical data and image analysis. Our first study was to implement different log base entropy for a decision tree algorithm. Our results suggested that using a higher log base for the dataset with mostly categorical attributes with three or more categories for each attribute can obtain a higher accuracy. For the second study, we analyzed mental health data tuning the parameters of the decision tree (splitting method, depth and entropy). …
Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian
Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian
Electronic Thesis and Dissertation Repository
Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building/group to predict future consumption for that same building/group. With hundreds of thousands of smart meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Cluster-Based Chained Transfer Learning (CBCTL), an approach for building neural network-based models for many meters by taking advantage of already trained models through …
Multiple Face Detection And Recognition System Design Applying Deep Learning In Web Browsers Using Javascript, Cristhian Gabriel Espinosa Sandoval
Multiple Face Detection And Recognition System Design Applying Deep Learning In Web Browsers Using Javascript, Cristhian Gabriel Espinosa Sandoval
Computer Science and Computer Engineering Undergraduate Honors Theses
Deep learning has advanced progressively in the last years and now demonstrates state-of-the-art performance in various fields. In the era of big data, transformation of data into valuable knowledge has become one of the most important challenges in computing. Therefore, we will review multiple algorithms for face recognition that have been researched for a long time and are maturely developed, and analyze deep learning, presenting examples of current research.
To provide a useful and comprehensive perspective, in this paper we categorize research by deep learning architecture, including neural networks, convolutional neural networks, depthwise Separable Convolutions, densely connected convolutional networks, and …
Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury
Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury
Boise State University Theses and Dissertations
Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.
In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):
RQ1: Is it …
Large-Scale Data Analysis And Deep Learning Using Distributed Cyberinfrastructures And High Performance Computing, Richard Dodge Platania
Large-Scale Data Analysis And Deep Learning Using Distributed Cyberinfrastructures And High Performance Computing, Richard Dodge Platania
LSU Doctoral Dissertations
Data in many research fields continues to grow in both size and complexity. For instance, recent technological advances have caused an increased throughput in data in various biological-related endeavors, such as DNA sequencing, molecular simulations, and medical imaging. In addition, the variance in the types of data (textual, signal, image, etc.) adds an additional complexity in analyzing the data. As such, there is a need for uniquely developed applications that cater towards the type of data. Several considerations must be made when attempting to create a tool for a particular dataset. First, we must consider the type of algorithm required …
Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park
Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park
Theses and Dissertations
Identification of accurate tumor location and shape is highly important in lung cancer radiotherapy, to improve the treatment quality by reducing dose delivery errors. Because a lung tumor moves with the patient's respiration, breathing motion should be correctly analyzed and predicted during the treatment for prevention of tumor miss or undesirable treatment toxicity. Besides, in Image-Guided Radiation Therapy (IGRT), the tumor motion causes difficulties not only in delivering accurate dose, but also in assuring superior quality of imaging techniques such as four-dimensional (4D) Cone Beam Computed Tomography (CBCT) and 4D Magnetic Resonance Imaging (MRI). Specifically, 4D CBCT used in CBCT …
Comparative Study Of Dimension Reduction Approaches With Respect To Visualization In 3-Dimensional Space, Pooja Chenna
Comparative Study Of Dimension Reduction Approaches With Respect To Visualization In 3-Dimensional Space, Pooja Chenna
Master of Science in Computer Science Theses
In the present big data era, there is a need to process large amounts of unlabeled data and find some patterns in the data to use it further. If data has many dimensions, it is very hard to get any insight of it. It is possible to convert high-dimensional data to low-dimensional data using different techniques, this dimension reduction is important and makes tasks such as classification, visualization, communication and storage much easier. The loss of information should be less while mapping data from high-dimensional space to low-dimensional space. Dimension reduction has been a significant problem in many fields as …
Scalable Hardware Efficient Deep Spatio-Temporal Inference Networks, Steven Robert Young
Scalable Hardware Efficient Deep Spatio-Temporal Inference Networks, Steven Robert Young
Doctoral Dissertations
Deep machine learning (DML) is a promising field of research that has enjoyed much success in recent years. Two of the predominant deep learning architectures studied in the literature are Convolutional Neural Networks (CNNs) and Deep Belief Networks (DBNs). Both have been successfully applied to many standard benchmarks with a primary focus on machine vision and speech processing domains.
Many real-world applications involve time-varying signals and, consequently, necessitate models that efficiently represent both temporal and spatial attributes. However, neither DBNs nor CNNs are designed to naturally capture temporal dependencies in observed data, often resulting in the inadequate transformation of spatio-temporal …
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Doctoral Dissertations
Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …