Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Deep Learning (2)
- Machine Learning (2)
- CNN (1)
- Categorized Input (1)
- Chest X-ray (1)
-
- Collocated Paired Coordinates (1)
- Convolutional Neutral Networks (1)
- Coordinate Order Optimizer (1)
- Data conversion. (1)
- Democratized Machine Learning (1)
- FCN (1)
- Fawkes (1)
- Feature Extraction (1)
- Genetic Algorithm. (1)
- Hyper parameter tuning (1)
- Image Processing (1)
- Interactive Data Visualization (1)
- Iterative Visual Logical Classifier (1)
- Knowledge Discovery (1)
- Medical Image (1)
- Non-image data (1)
- Raster Images (1)
- SAR images (1)
- Shifted Paired Coordinates (1)
- Tuberculosis (1)
- Visualization (1)
- Water (1)
Articles 1 - 5 of 5
Full-Text Articles in Computational Engineering
Water Surfaces Detection From Sentinel-1 Sar Images Using Deep Learning, Chao Huang Lin
Water Surfaces Detection From Sentinel-1 Sar Images Using Deep Learning, Chao Huang Lin
All Master's Theses
Nowadays, Synthetic Aperture Radar (SAR) images have been widely used in the industry and the scientific community for different remote sensing applications. The main advantage of SAR technology is that it can acquire images from nighttime since it does not require sunlight. Additionally, it can capture images under the cloud where the traditional optical sensor is limited. It is very convenient to use SAR image for surface water detection because the flatness of the calm water surface reflects off all the energy from the radar and this makes the surface water appears in a SAR image as dark pixels. The …
Bias And Fairness Of Evasion Attacks In Image Perturbation, Sichong Qin
Bias And Fairness Of Evasion Attacks In Image Perturbation, Sichong Qin
All Master's Theses
When talking about protecting privacy of personal images, adversarial attack methods play key roles. These methods are created to protect against the unauthorized usage of personal images. Such methods protect personal privacy by adding some amount of perturbations, otherwise known as "noise", to input images to enhance privacy protection. Fawkes in Clean Attack method is one adversarial machine learning approach aimed at protecting personal privacy against abuse of personal images by unauthorized AI systems. In leveraging the Fawkes in Evasion Attack method and through running additional experiments against the Fawkes system, we were able to prove that the effectiveness of …
Visualization For Solving Non-Image Problems And Saliency Mapping, Divya Chandrika Kalla
Visualization For Solving Non-Image Problems And Saliency Mapping, Divya Chandrika Kalla
All Master's Theses
High-dimensional data play an important role in knowledge discovery and data science. Integration of visualization, visual analytics, machine learning (ML), and data mining (DM) are the key aspects of data science research for high-dimensional data. This thesis is to explore the efficiency of a new algorithm to convert non-images data into raster images by visualizing data using heatmap in the collocated paired coordinates (CPC). These images are called the CPC-R images and the algorithm that produces them is called the CPC-R algorithm. Powerful deep learning methods open an opportunity to solve non-image ML/DM problems by transforming non-image ML problems into …
Interactive Visual Self-Service Data Classification Approach To Democratize Machine Learning, Sridevi Narayana Wagle
Interactive Visual Self-Service Data Classification Approach To Democratize Machine Learning, Sridevi Narayana Wagle
All Master's Theses
Machine learning algorithms often produce models considered as complex black-box models by both end users and developers. Such algorithms fail to explain the model in terms of the domain they are designed for. The proposed Iterative Visual Logical Classifier (IVLC) is an interpretable machine learning algorithm that allows end users to design a model and classify data with more confidence and without having to compromise on the accuracy. Such technique is especially helpful when dealing with sensitive and crucial data like cancer data in the medical domain with high cost of errors. With the help of the proposed interactive and …
Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga
Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga
All Master's Theses
Tuberculosis (TB) is a disease responsible for the deaths of more than one million people worldwide every year. Even though it is preventable and curable, it remains a major threat to humanity that needs to be taken care of. It is often diagnosed in developed countries using approaches such as sputum smear microscopy and culture methods. However, since these approaches are rather expensive, they are not commonly used in poor regions of the globe such as India, Africa, and Bangladesh. Instead, the well known and affordable chest x-ray (CXR) interpretation by radiologists is the technique employed in those places. Nevertheless, …