Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adversarial learning (1)
- Artificial intelligence (1)
- Breast cancer (1)
- CAD (1)
- Computer vision (1)
-
- Concept drift (1)
- Continuous wavelet transform (1)
- Control (1)
- Cybersecurity (1)
- Deep learning (1)
- Denoising autoencoder (1)
- Local outlier factor (1)
- MEMS (1)
- Machine learning (1)
- Medical imaging (1)
- Microfactory (1)
- Microrobot (1)
- Modeling (1)
- Simulation (1)
- Streaming data (1)
- Wavelet packet transform (1)
- Wavelet scattering transform (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Modeling, Simulation And Control Of Microrobots For The Microfactory., Zhong Yang
Modeling, Simulation And Control Of Microrobots For The Microfactory., Zhong Yang
Electronic Theses and Dissertations
Future assembly technologies will involve higher levels of automation in order to satisfy increased microscale or nanoscale precision requirements. Traditionally, assembly using a top-down robotic approach has been well-studied and applied to the microelectronics and MEMS industries, but less so in nanotechnology. With the boom of nanotechnology since the 1990s, newly designed products with new materials, coatings, and nanoparticles are gradually entering everyone’s lives, while the industry has grown into a billion-dollar volume worldwide. Traditionally, nanotechnology products are assembled using bottom-up methods, such as self-assembly, rather than top-down robotic assembly. This is due to considerations of volume handling of large …
Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche
Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche
Electronic Theses and Dissertations
The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …
Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese
Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese
Electronic Theses and Dissertations
Advancement in technology has led to creative and innovative inventions. One such invention includes unmanned aerial vehicles (UAVs). UAVs (also known as drones) are now an intrinsic part of our society because their application is becoming ubiquitous in every industry ranging from transportation and logistics to environmental monitoring among others. With the numerous benign applications of UAVs, their emergence has added a new dimension to privacy and security issues. There are little or no strict regulations on the people that can purchase or own a UAV. For this reason, nefarious actors can take advantage of these aircraft to intrude into …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …