Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Machine Learning

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 39

Full-Text Articles in Engineering

Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee Dec 2017

Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

Smart Grids are the next generation electrical grid system that utilizes smart meter-ing devices and sensors to manage the grid operations. Grid management includes the prediction of load and and classification of the load patterns and consumer usage behav-iors. These predictions can be performed using machine learning methods which are often supervised. Supervised machine learning signifies that the algorithm trains the model to efficiently predict decisions based on the previously available data.

Smart grids are employed with numerous smart meters that send user statistics to a central server. The data can be accumulated and processed using data mining and machine …


Threshold Free Detection Of Elliptical Landmarks Using Machine Learning, Lifan Zhang Dec 2017

Threshold Free Detection Of Elliptical Landmarks Using Machine Learning, Lifan Zhang

Theses and Dissertations

Elliptical shape detection is widely used in practical applications. Nearly all classical ellipse detection algorithms require some form of threshold, which can be a major cause of detection failure, especially in the challenging case of Moire Phase Tracking (MPT) target images. To meet the challenge, a threshold free detection algorithm for elliptical landmarks is proposed in this thesis. The proposed Aligned Gradient and Unaligned Gradient (AGUG) algorithm is a Support Vector Machine (SVM)-based classification algorithm, original features are extracted from the gradient information corresponding to the sampled pixels. with proper selection of features, the proposed algorithm has a high accuracy …


Developing Leading And Lagging Indicators To Enhance Equipment Reliability In A Lean System, Dhanush Agara Mallesh Dec 2017

Developing Leading And Lagging Indicators To Enhance Equipment Reliability In A Lean System, Dhanush Agara Mallesh

Masters Theses

With increasing complexity in equipment, the failure rates are becoming a critical metric due to the unplanned maintenance in a production environment. Unplanned maintenance in manufacturing process is created issues with downtimes and decreasing the reliability of equipment. Failures in equipment have resulted in the loss of revenue to organizations encouraging maintenance practitioners to analyze ways to change unplanned to planned maintenance. Efficient failure prediction models are being developed to learn about the failures in advance. With this information, failures predicted can reduce the downtimes in the system and improve the throughput.

The goal of this thesis is to predict …


An Analog Cmos Particle Filter, Trevor Watson Dec 2017

An Analog Cmos Particle Filter, Trevor Watson

Masters Theses

Particle filters are used in a variety of image processing and machine learning applications. Their main use in these applications is to gather information about a system of objects, by using partial or noisy observations collected from sensors. These observations are used to associate points of interest in the observations with objects and maintain this association through a series of observations.

In this paper I will investigate the performance of a particle filter implemented in 130nm analog CMOS hardware. The design goal of the particle filter is low-microwatt power consumption. Using analog hardware, rather than digital ASICs or CPUs I …


Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu Dec 2017

Genealogy Extraction And Tree Generation From Free Form Text, Timothy Sui-Tim Chu

Master's Theses

Genealogical records play a crucial role in helping people to discover their lineage and to understand where they come from. They provide a way for people to celebrate their heritage and to possibly reconnect with family they had never considered. However, genealogical records are hard to come by for ordinary people since their information is not always well established in known databases. There often is free form text that describes a person’s life, but this must be manually read in order to extract the relevant genealogical information. In addition, multiple texts may have to be read in order to create …


Eigenblades: Application Of Computer Vision And Machine Learning For Mode Shape Identification, Alex W. La Dec 2017

Eigenblades: Application Of Computer Vision And Machine Learning For Mode Shape Identification, Alex W. La

Theses and Dissertations

On August 27, 2016, Southwest Airlines flight 3472 from New Orleans to Orlando had to perform an emergency landing when a fan blade separated from the engine hub and destroyed the cowling and punctured the fuselage. Initial findings from the metallurgical examination conducted in the National Transpiration Safety Board Materials Laboratory found that the fracture surface of the missing blade showed curving crack arrest lines consistent with fatigue crack growth. Fatigue is often cause by resonate vibrations. Modal analysis is a method that can model the natural frequencies and bending modes of turbomachinery blades. When performing modal analysis with finite …


Eigenblades: Application Of Computer Vision And Machine Learning For Mode Shape Identification, Alex W. La Dec 2017

Eigenblades: Application Of Computer Vision And Machine Learning For Mode Shape Identification, Alex W. La

Theses and Dissertations

On August 27, 2016, Southwest Airlines flight 3472 from New Orleans to Orlando had to perform an emergency landing when a fan blade separated from the engine hub and destroyed the cowling and punctured the fuselage. Initial findings from the metallurgical examination conducted in the National Transpiration Safety Board Materials Laboratory found that the fracture surface of the missing blade showed curving crack arrest lines consistent with fatigue crack growth. Fatigue is often cause by resonate vibrations. Modal analysis is a method that can model the natural frequencies and bending modes of turbomachinery blades. When performing modal analysis with finite …


Graph-Based Latent Embedding, Annotation And Representation Learning In Neural Networks For Semi-Supervised And Unsupervised Settings, Ismail Ozsel Kilinc Nov 2017

Graph-Based Latent Embedding, Annotation And Representation Learning In Neural Networks For Semi-Supervised And Unsupervised Settings, Ismail Ozsel Kilinc

USF Tampa Graduate Theses and Dissertations

Machine learning has been immensely successful in supervised learning with outstanding examples in major industrial applications such as voice and image recognition. Following these developments, the most recent research has now begun to focus primarily on algorithms which can exploit very large sets of unlabeled examples to reduce the amount of manually labeled data required for existing models to perform well. In this dissertation, we propose graph-based latent embedding/annotation/representation learning techniques in neural networks tailored for semi-supervised and unsupervised learning problems. Specifically, we propose a novel regularization technique called Graph-based Activity Regularization (GAR) and a novel output layer modification called …


Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu Nov 2017

Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu

Doctoral Dissertations

Cyber-physical systems frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant. Most of the time the physical plant is in a state that allows for a lower level of fault-tolerance. Avoiding the continuous deployment of massive fault-tolerance will greatly reduce the workload of CPSs. In this dissertation, we demonstrate a software simulation framework (AdaFT) that can automatically generate the sub-spaces within which our adaptive fault-tolerance can be applied. We also show the theoretical benefits of AdaFT, and …


Machine Learning Based Method Of Moments (Ml-Mom), He Ming Yao, Li (Lijun) Jun Jiang, Yu Wei Qin Oct 2017

Machine Learning Based Method Of Moments (Ml-Mom), He Ming Yao, Li (Lijun) Jun Jiang, Yu Wei Qin

Electrical and Computer Engineering Faculty Research & Creative Works

This paper proposes a novel method by rethinking the method of moments (MoM) solving process into a machine learning training process. Based on the artificial neural network (ANN), the conventional MoM matrix is treated as the training data set, based on which machine learning training process becomes conventional linear algebra MoM solving process. The trained result is the solution of MoM. The multiple linear regression (MLR) is utilized to train the model. Amazon Web Service (AWS) is used as the computations platform to utilize the existing hardware and software resources for machine learning. To verify the feasibility of the proposed …


Information Theoretic Study Of Gaussian Graphical Models And Their Applications, Ali Moharrer Aug 2017

Information Theoretic Study Of Gaussian Graphical Models And Their Applications, Ali Moharrer

LSU Doctoral Dissertations

In many problems we are dealing with characterizing a behavior of a complex stochastic system or its response to a set of particular inputs. Such problems span over several topics such as machine learning, complex networks, e.g., social or communication networks; biology, etc. Probabilistic graphical models (PGMs) are powerful tools that offer a compact modeling of complex systems. They are designed to capture the random behavior, i.e., the joint distribution of the system to the best possible accuracy. Our goal is to study certain algebraic and topological properties of a special class of graphical models, known as Gaussian graphs. First, …


Predictive Power And Validity Of Connectome Predictive Modeling: A Replication And Extension, Michael Wang, Joaquin Goni, Enrico Amico Aug 2017

Predictive Power And Validity Of Connectome Predictive Modeling: A Replication And Extension, Michael Wang, Joaquin Goni, Enrico Amico

The Summer Undergraduate Research Fellowship (SURF) Symposium

Neuroimaging, particularly functional magnetic resonance imaging (fMRI), is a rapidly growing research area and has applications ranging from disease classification to understanding neural development. With new advancements in imaging technology, researchers must employ new techniques to accommodate the influx of high resolution data sets. Here, we replicate a new technique: connectome-based predictive modeling (CPM), which constructs a linear predictive model of brain connectivity and behavior. CPM’s advantages over classic machine learning techniques include its relative ease of implementation and transparency compared to “black box” opaqueness and complexity. Is this method efficient, powerful, and reliable in the prediction of behavioral measures …


Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang Aug 2017

Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang

Dissertations & Theses (Open Access)

The mortality rate of cervical cancer is approximately 266,000 people each year, and 70% of the burden occurs in Low- and Middle- Income Countries (LMICs). Radiation therapy is the primary modality for treatment of locally advanced cervical cancer cases. In the absence of high quality diagnostic imaging needed to identify nodal metastasis, many LMIC sites treat standard pelvic fields, failing to include node metastasis outside of the field and/or to boost lymph nodes in the abdomen and pelvis. The first goal of this project was to create a program which automatically identifies positive cervical cancer lymph nodes on non-contrast daily …


Operating System Identification By Ipv6 Communication Using Machine Learning Ensembles, Adrian Ordorica Aug 2017

Operating System Identification By Ipv6 Communication Using Machine Learning Ensembles, Adrian Ordorica

Graduate Theses and Dissertations

Operating system (OS) identification tools, sometimes called fingerprinting tools, are essential for the reconnaissance phase of penetration testing. While OS identification is traditionally performed by passive or active tools that use fingerprint databases, very little work has focused on using machine learning techniques. Moreover, significantly more work has focused on IPv4 than IPv6. We introduce a collaborative neural network ensemble that uses a unique voting system and a random forest ensemble to deliver accurate predictions. This approach uses IPv6 features as well as packet metadata features for OS identification. Our experiment shows that our approach is valid and we achieve …


Semantic Visualization For Short Texts With Word Embeddings, Van Minh Tuan Le, Hady W. Lauw Aug 2017

Semantic Visualization For Short Texts With Word Embeddings, Van Minh Tuan Le, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Semantic visualization integrates topic modeling and visualization, such that every document is associated with a topic distribution as well as visualization coordinates on a low-dimensional Euclidean space. We address the problem of semantic visualization for short texts. Such documents are increasingly common, including tweets, search snippets, news headlines, or status updates. Due to their short lengths, it is difficult to model semantics as the word co-occurrences in such a corpus are very sparse. Our approach is to incorporate auxiliary information, such as word embeddings from a larger corpus, to supplement the lack of co-occurrences. This requires the development of a …


Bayesian Methods And Machine Learning For Processing Text And Image Data, Yingying Gu Aug 2017

Bayesian Methods And Machine Learning For Processing Text And Image Data, Yingying Gu

Theses and Dissertations

Classification/clustering is an important class of unstructured data processing problems. The classification (supervised, semi-supervised and unsupervised) aims to discover the clusters and group the similar data into categories for information organization and knowledge discovery. My work focuses on using the Bayesian methods and machine learning techniques to classify the free-text and image data, and address how to overcome the limitations of the traditional methods. The Bayesian approach provides a way to allow using more variations(numerical or categorical), and estimate the probabilities instead of explicit rules, which will benefit in the ambiguous cases. The MAP(maximum a posterior) estimation is used to …


Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha Jul 2017

Prediction Of Graduation Delay Based On Student Characterisitics And Performance, Tushar Ojha

Electrical and Computer Engineering ETDs

A college student's success depends on many factors including pre-university characteristics and university student support services. Student graduation rates are often used as an objective metric to measure institutional effectiveness. This work studies the impact of such factors on graduation rates, with a particular focus on delay in graduation. In this work, we used feature selection methods to identify a subset of the pre-institutional features with the highest discriminative power. In particular, Forward Selection with Linear Regression, Backward Elimination with Linear Regression, and Lasso Regression were applied. The feature sets were selected in a multivariate fashion. High school GPA, ACT …


The Scalable And Accountable Binary Code Search And Its Applications, Qian Feng Jun 2017

The Scalable And Accountable Binary Code Search And Its Applications, Qian Feng

Dissertations - ALL

The past decade has been witnessing an explosion of various applications and devices.

This big-data era challenges the existing security technologies: new analysis techniques

should be scalable to handle “big data” scale codebase; They should be become smart

and proactive by using the data to understand what the vulnerable points are and where

they locate; effective protection will be provided for dissemination and analysis of the data

involving sensitive information on an unprecedented scale.

In this dissertation, I argue that the code search techniques can boost existing security

analysis techniques (vulnerability identification and memory analysis) in terms of scalability and …


Predictive Analytics In Cardiac Healthcare And 5g Cellular Networks, Dilranjan S. Wickramasuriya Jun 2017

Predictive Analytics In Cardiac Healthcare And 5g Cellular Networks, Dilranjan S. Wickramasuriya

USF Tampa Graduate Theses and Dissertations

This thesis proposes the use of Machine Learning (ML) to two very distinct, yet compelling, applications – predicting cardiac arrhythmia episodes and predicting base station association in 5G networks comprising of virtual cells. In the first scenario, Support Vector Machines (SVMs) are used to classify features extracted from electrocardiogram (EKG) signals. The second problem requires a different formulation departing from traditional ML classification where the objective is to partition feature space into constituent class regions. Instead, the intention here is to identify temporal patterns in unequal-length sequences. Using Recurrent Neural Networks (RNNs), it is demonstrated that accurate predictions can be …


Machine Learning Offers Predictive Insight Into The Silver Nanomaterial Protein Corona, Matthew Findlay Jun 2017

Machine Learning Offers Predictive Insight Into The Silver Nanomaterial Protein Corona, Matthew Findlay

Bioengineering Senior Theses

The use of engineered nanomaterials (ENMs) in consumer and commercial products is increasing rapidly. The small size and high surface reactivity of ENMs gives them a range of attractive properties, and allows them to be incorporated into various materials. These properties make ENMs very appealing to modern industry, but also make ENMs toxic, causing serious health and environmental concerns. This toxicity is largely driven by the formation of a protein corona on the surface of ENMs. This protein corona is caused by proteins encountered in biological systems that bind to the surface of (ENMs). Despite the importance of the protein …


Real-Time Classification Of Biomedical Signals, Parkinson’S Analytical Model, Abolfazl Saghafi Jun 2017

Real-Time Classification Of Biomedical Signals, Parkinson’S Analytical Model, Abolfazl Saghafi

USF Tampa Graduate Theses and Dissertations

The reach of technological innovation continues to grow, changing all industries as it evolves. In healthcare, technology is increasingly playing a role in almost all processes, from patient registration to data monitoring, from lab tests to self-care tools. The increase in the amount and diversity of generated clinical data requires development of new technologies and procedures capable of integrating and analyzing the BIG generated information as well as providing support in their interpretation.

To that extent, this dissertation focuses on the analysis and processing of biomedical signals, specifically brain and heart signals, using advanced machine learning techniques. That is, the …


Complementary Companion Behavior In Video Games, Gavin Scott Jun 2017

Complementary Companion Behavior In Video Games, Gavin Scott

Master's Theses

Companion characters in are present in many video games across genres, serving the role of the player's partner. Their goal is to support the player's strategy and to immerse the player by providing a believable companion. These companions often only perform rigidly scripted actions and fail to adapt to an individual player's play-style, detracting from their usefulness. Behavior like this can also become frustrating to the player if the companions become more of a hindrance than they are a benefit. Other work, including this project's precursor, focused on building companions that mimic the player. These strategies customize the companion's actions …


Adaptive Region-Based Approaches For Cellular Segmentation Of Bright-Field Microscopy Images, Hady Ahmady Phoulady May 2017

Adaptive Region-Based Approaches For Cellular Segmentation Of Bright-Field Microscopy Images, Hady Ahmady Phoulady

USF Tampa Graduate Theses and Dissertations

Microscopy image processing is an emerging and quickly growing field in medical imaging research area. Recent advancements in technology including higher computation power, larger and cheaper storage modules, and more efficient and faster data acquisition devices such as whole-slide imaging scanners contributed to the recent microscopy image processing research advancement. Most of the methods in this research area either focus on automatically process images and make it easier for pathologists to direct their focus on the important regions in the image, or they aim to automate the whole job of experts including processing and classifying images or tissues that leads …


Classification Of Images Based On Pixels That Represent A Small Part Of The Scene. A Case Applied To Microaneurysms In Fundus Retina Images, Pablo F. Ordonez, Pablo F. Ordonez May 2017

Classification Of Images Based On Pixels That Represent A Small Part Of The Scene. A Case Applied To Microaneurysms In Fundus Retina Images, Pablo F. Ordonez, Pablo F. Ordonez

Master of Science in Computer Science Theses

Convolutional Neural Networks (CNNs), the state of the art in image classification, have proven to be as effective as an ophthalmologist, when detecting Referable Diabetic Retinopathy (RDR). Having a size of less than 1\% of the total image, microaneurysms are early lesions in DR that are difficult to classify. The purpose of this thesis is to improve the accuracy of detection of microaneurysms using a model that includes two CNNs with different input image sizes, 60x60 and 420x420 pixels. These models were trained using the Kaggle and Messidor datasets and tested independently against the Kaggle dataset, showing a sensitivity of …


Development And Evaluation Of An Interdisciplinary Periodontal Risk Prediction Tool Using A Machine Learning Approach, Neel Anil Shimpi May 2017

Development And Evaluation Of An Interdisciplinary Periodontal Risk Prediction Tool Using A Machine Learning Approach, Neel Anil Shimpi

Theses and Dissertations

Periodontitis (PD) is a major public health concern which profoundly affects oral health and concomitantly, general health of the population worldwide. Evidence-based research continues to support association between PD and systemic diseases such as diabetes and hypertension, among others. Notably PD also represents a modifiable risk factor that may reduce the onset and progression of some systemic diseases, including diabetes. Due to lack of oral screening in medical settings, this population does not get flagged with the risk of developing PD.

This study sought to develop a PD risk assessment model applicable at clinical point-of-care (POC) by comparing performance of …


Feature Selection And Improving Classification Performance For Malware Detection, Carlos A. Cepeda Mora Apr 2017

Feature Selection And Improving Classification Performance For Malware Detection, Carlos A. Cepeda Mora

Master of Science in Computer Science Theses

The ubiquitous advance of technology has been conducive to the proliferation of cyber threats, resulting in attacks that have grown exponentially. Consequently, researchers have developed models based on machine learning algorithms for detecting malware. However, these methods require significant amount of extracted features for correct malware classification, making that feature extraction, training, and testing take significant time; even more, it has been unexplored which are the most important features for accomplish the correct classification.

In this Thesis, it is created and analyzed a dataset of malware and clean files (goodware) from the static and dynamic features provided by the online …


Machine Learning Based Mom (Ml-Mom) For Parasitic Capacitance Extractions, He Ming Yao, Yu Wei Qin, Li (Lijun) Jun Jiang Apr 2017

Machine Learning Based Mom (Ml-Mom) For Parasitic Capacitance Extractions, He Ming Yao, Yu Wei Qin, Li (Lijun) Jun Jiang

Electrical and Computer Engineering Faculty Research & Creative Works

This paper is a rethinking of the conventional method of moments (MoM) using the modern machine learning (ML) technology. By repositioning the MoM matrix and unknowns in an artificial neural network (ANN), the conventional linear algebra MoM solving is changed into a machine learning training process. The trained result is the solution. As an application, the parasitic capacitance extraction broadly needed by VLSI modeling is solved through the proposed new machine learning based method of moments (ML-MoM). The multiple linear regression (MLR) is employed to train the model. The computations are done on Amazon Web Service (AWS). Benchmarks demonstrated the …


Estimating Short-Term Human Intent For Physical Human-Robot Co-Manipulation, Eric Christopher Townsend Apr 2017

Estimating Short-Term Human Intent For Physical Human-Robot Co-Manipulation, Eric Christopher Townsend

Theses and Dissertations

Robots are increasingly becoming safer and more capable. In the past, the main applications for robots have been in manufacturing, where they perform repetitive, highly accurate tasks with physical barriers that separate them from people. They have also been used in space exploration where people are not around. Due to improvements in sensors, algorithms, and design, robots are beginning to be used in other applications like materials handling, healthcare, and agriculture and will one day be ubiquitous. For this to be possible, they will need to be able to function safely in unmodelled and dynamic environments. This is especially true …


Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan Mar 2017

Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan

Masters Theses

Recent advances in cloud-based big-data technologies now makes data driven solutions feasible for increasing numbers of scientific computing applications. One such data driven solution approach is machine learning where patterns in large data sets are brought to the surface by finding complex mathematical relationships within the data. Nowcasting or short-term prediction of rainfall in a given region is an important problem in meteorology. In this thesis we explore the nowcasting problem through a data driven approach by formulating it as a machine learning problem.

State-of-the-art nowcasting systems today are based on numerical models which describe the physical processes leading to …


Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala Jan 2017

Deep Learning Approach For Intrusion Detection System (Ids) In The Internet Of Things (Iot) Network Using Gated Recurrent Neural Networks (Gru), Manoj Kumar Putchala

Browse all Theses and Dissertations

The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security …