Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Other Computer Engineering (4)
- Computer Sciences (3)
- Physical Sciences and Mathematics (3)
- Artificial Intelligence and Robotics (2)
- Chemical Engineering (1)
-
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Electrical and Computer Engineering (1)
- Engineering Science and Materials (1)
- Information Security (1)
- Materials Science and Engineering (1)
- Other Chemical Engineering (1)
- Other Engineering Science and Materials (1)
- Other Materials Science and Engineering (1)
- Robotics (1)
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
LSU Doctoral Dissertations
The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't guarantee …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee
Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee
Electrical & Computer Engineering Theses & Dissertations
Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a …
A Data-Driven Approach To Cubesat Health Monitoring, Serbinder Singh
A Data-Driven Approach To Cubesat Health Monitoring, Serbinder Singh
Master's Theses
Spacecraft health monitoring is essential to ensure that a spacecraft is operating properly and has no anomalies that could jeopardize its mission. Many of the current methods of monitoring system health are difficult to use as the complexity of spacecraft increase, and are in many cases impractical on CubeSat satellites which have strict size and resource limitations. To overcome these problems, new data-driven techniques such as Inductive Monitoring System (IMS), use data mining and machine learning on archived system telemetry to create models that characterize nominal system behavior. The models that IMS creates are in the form of clusters that …
Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour
Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour
Electronic Theses and Dissertations
Nowadays, algorithmic systems for making decisions are widely used to facilitate decisions in a variety of fields such as medicine, banking, applying for universities or network security. However, many machine learning algorithms are well-known for their complex mathematical internal workings which turn them into black boxes and makes their decision-making process usually difficult to understand even for experts. In this thesis, we try to develop a methodology to explain why a certain exceptional machine learned decision was made incorrectly by using the interpretability of the decision tree classifier. Our approach can provide insights about potential flaws in feature definition or …
Models For Pedestrian Trajectory Prediction And Navigation In Dynamic Environments, Jeremy N. Kerfs
Models For Pedestrian Trajectory Prediction And Navigation In Dynamic Environments, Jeremy N. Kerfs
Master's Theses
Robots are no longer constrained to cages in factories and are increasingly taking on roles alongside humans. Before robots can accomplish their tasks in these dynamic environments, they must be able to navigate while avoiding collisions with pedestrians or other robots. Humans are able to move through crowds by anticipating the movements of other pedestrians and how their actions will influence others; developing a method for predicting pedestrian trajectories is a critical component of a robust robot navigation system. A current state-of-the-art approach for predicting pedestrian trajectories is Social-LSTM, which is a recurrent neural network that incorporates information about neighboring …
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Electronic Theses and Dissertations
The high pace of nowadays industrial evolution is creating an urgent need to design new cost efficient materials that can satisfy both current and future demands. However, with the increase of structural and functional complexity of materials, the ability to rationally design new materials with a precise set of properties has become increasingly challenging. This basic observation has triggered the idea of applying machine learning techniques in the field, which was further encouraged by the launch of the Materials Genome Initiative (MGI) by the US government since 2011. In this work, we present a novel approach to apply machine learning …
Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani
Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani
Electronic Theses and Dissertations
This study analyzed fMRI responses to fear and anxiety using a Multi Variate Pattern Analysis (MVPA) approach. Compared to conventional univariate methods which only represent regions of activation, MVPA provides us with more detailed patterns of voxels. We successfully found different patterns for fear and anxiety through separate classification attempts in each subject’s representational space. Further, we transformed all the individual models into a standard space to do group analysis. Results showed that subjects share a more common fear response. Also, the amygdala and hippocampus areas are more important for differentiating fear than anxiety.