Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Physical Sciences and Mathematics

Session 8: Machine Learning Based Behavior Of Non-Opec Global Supply In Crude Oil Price Determinism, Mofe Jeje Feb 2024

Session 8: Machine Learning Based Behavior Of Non-Opec Global Supply In Crude Oil Price Determinism, Mofe Jeje

SDSU Data Science Symposium

Abstract

While studies on global oil price variability, occasioned by OPEC crude oil supply, is well documented in energy literature; the impact assessment of non-OPEC global oil supply on price variability, on the other hand, has not received commensurate attention. Given this gap, the primary objective of this study, therefore, is to estimate the magnitude of oil price determinism that is explained by the share of non-OPEC’s global crude oil supply. Using secondary sources of data collection method, data for target variable will be collected from the US Federal Reserve, as it relates to annual crude oil price variability, while …


Session11: Skip-Gcn : A Framework For Hierarchical Graph Representation Learning, Jackson Cates, Justin Lewis, Randy Hoover, Kyle Caudle Feb 2023

Session11: Skip-Gcn : A Framework For Hierarchical Graph Representation Learning, Jackson Cates, Justin Lewis, Randy Hoover, Kyle Caudle

SDSU Data Science Symposium

Recently there has been high demand for the representation learning of graphs. Graphs are a complex data structure that contains both topology and features. There are first several domains for graphs, such as infectious disease contact tracing and social media network communications interactions. The literature describes several methods developed that work to represent nodes in an embedding space, allowing for classical techniques to perform node classification and prediction. One such method is the graph convolutional neural network that aggregates the node neighbor’s features to create the embedding. Another method, Walklets, takes advantage of the topological information stored in a graph …


Temporal Tensor Factorization For Multidimensional Forecasting, Jackson Cates, Karissa Scipke, Randy Hoover, Kyle Caudle Feb 2023

Temporal Tensor Factorization For Multidimensional Forecasting, Jackson Cates, Karissa Scipke, Randy Hoover, Kyle Caudle

SDSU Data Science Symposium

In the era of big data, there is a need for forecasting high-dimensional time series that might be incomplete, sparse, and/or nonstationary. The current research aims to solve this problem for two-dimensional data through a combination of temporal matrix factorization (TMF) and low-rank tensor factorization. From this method, we propose an expansion of TMF to two-dimensional data: temporal tensor factorization (TTF). The current research aims to interpolate missing values via low-rank tensor factorization, which produces a latent space of the original multilinear time series. We then can perform forecasting in the latent space. We present experimental results of the proposed …


Session 2: The Effect Of Boom Leveling On Spray Dispersion, Travis A. Burgers, Miguel Bustamante, Juan F. Vivanco Feb 2023

Session 2: The Effect Of Boom Leveling On Spray Dispersion, Travis A. Burgers, Miguel Bustamante, Juan F. Vivanco

SDSU Data Science Symposium

Self-propelled sprayers are commonly used in agriculture to disperse agrichemicals. These sprayers commonly have two boom wings with dozens of nozzles that disperse the chemicals. Automatic boom height systems reduce the variability of agricultural sprayer boom height, which is important to reduce uneven spray dispersion if the boom is not at the target height.

A computational model was created to simulate the spray dispersion under the following conditions: a) one stationary nozzle based on the measured spray pattern from one nozzle, b) one stationary model due to an angled boom, c) superposition of multiple stationary nozzles due an angled boom, …


A Class Of Regression Models For Pairwise Comparisons Of Forensic Handwriting Comparison Systems, Cami M. Fuglsby Jan 2023

A Class Of Regression Models For Pairwise Comparisons Of Forensic Handwriting Comparison Systems, Cami M. Fuglsby

Electronic Theses and Dissertations

Handwriting analysis is a complex field largely living in forensic science and the legal realm. One task of a forensic document examiner (FDE) may be to determine the writer(s) of handwritten documents. Automated identification systems (AIS) were built to aid FDEs in their examinations. Part of the uses of these AIS (such as FISH[5] [7],WANDA [6], CEDAR-FOX [17], and FLASHID®2) are tomeasure features about a handwriting sample and to provide the user with a numeric value of the evidence. These systems use their own algorithms and definitions of features to quantify the writing and can be considered a black-box. The …


A Study Of The Local Deep Galerkin Method For The Modified Cahn Hilliard Equation, Shi Wen Wong Jan 2023

A Study Of The Local Deep Galerkin Method For The Modified Cahn Hilliard Equation, Shi Wen Wong

Electronic Theses and Dissertations

Solving higher order partial differential equations (PDEs) can often prove to be a challenging task due to the involvement of higher-order derivatives of the unknown function, particularly for complex problems. The higher the order of the PDE, the more challenging it becomes to obtain an analytical solution. In such cases, alternative numerical methods are often used, such as finite element method or finite difference method. However, these methods can be computationally expensive and require a significant amount of mathematical expertise to implement. In recent times, there has been significant progress in applying neural networks to various fields, including the solution …


Session 5: Equipment Finance Credit Risk Modeling - A Case Study In Creative Model Development & Nimble Data Engineering, Edward Krueger, Landon Thompson, Josh Moore Feb 2022

Session 5: Equipment Finance Credit Risk Modeling - A Case Study In Creative Model Development & Nimble Data Engineering, Edward Krueger, Landon Thompson, Josh Moore

SDSU Data Science Symposium

This presentation will focus first on providing an overview of Channel and the Risk Analytics team that performed this case study. Given that context, we’ll then dive into our approach for building the modeling development data set, techniques and tools used to develop and implement the model into a production environment, and some of the challenges faced upon launch. Then, the presentation will pivot to the data engineering pipeline. During this portion, we will explore the application process and what happens to the data we collect. This will include how we extract & store the data along with how it …


Study On Performance Of Pruned Cnn-Based Classification Models, Mengling Deng Jan 2022

Study On Performance Of Pruned Cnn-Based Classification Models, Mengling Deng

Electronic Theses and Dissertations

Convolutional Neural Network (CNN) is a neural network developed for processing image data. CNNs have been studied extensively and have been used in numerous computer vision tasks such as image classification and segmentation, object detection and recognition, etc. [1] Although, the CNNs-based approaches showed humanlevel performances in these tasks [2], they require heavy computation in both training and inference stages, and the models consist of millions of parameters. This hinders the development and deployment of CNN-based models for real world applications. Neural Network Pruning and Compression techniques have been proposed [3, 4] to reduce the computation complexity of trained CNNs …


Sentiment Without Sentiment Analysis: Using The Recommendation Outcome Of Steam Game Reviews As Sentiment Predictor, Anqi Zhang Jan 2022

Sentiment Without Sentiment Analysis: Using The Recommendation Outcome Of Steam Game Reviews As Sentiment Predictor, Anqi Zhang

Electronic Theses and Dissertations

This paper presents and explores a novel way to determine the sentiment of a Steam game review based on the predicted recommendation of the review, testing different regression models on a combination of Term Frequency-Inverse Document Frequency (TF-IDF) and Latent Dirichlet Allocation (LDA) features. A dataset of Steam game reviews extracted from the Programming games genre consisting of 21 games along with other significant features such as the number of helpful likes on the recommendation, number of hours played, and others. Based on the features, they are grouped into three datasets: 1) either having keyword features only, 2) keyword features …


Using Long Short-Term Memory Networks To Make And Train Neural Network Based Pseudo Random Number Generator, Aditya Harshvardhan Jan 2022

Using Long Short-Term Memory Networks To Make And Train Neural Network Based Pseudo Random Number Generator, Aditya Harshvardhan

Electronic Theses and Dissertations

Neural Networks have been used in many decision-making models and been employed in computer vision, and natural language processing. Several works have also used Neural Networks for developing Pseudo-Random Number Generators [2, 4, 5, 7, 8]. However, despite great performance in the National Institute of Standards and Technology (NIST) statistical test suite for randomness, they fail to discuss how the complexity of a neural network affects such statistical results. This work introduces: 1) a series of new Long Short- Term Memory Network (LSTM) based and Fully Connected Neural Network (FCNN – baseline [2] + variations) Pseudo Random Number Generators (PRNG) …


Improved Secure And Low Computation Authentication Protocol For Wireless Body Area Network With Ecc And 2d Hash Chain, Soohyeon Choi Jan 2021

Improved Secure And Low Computation Authentication Protocol For Wireless Body Area Network With Ecc And 2d Hash Chain, Soohyeon Choi

Electronic Theses and Dissertations

Since technologies have been developing rapidly, Wireless Body Area Network (WBAN) has emerged as a promising technique for healthcare systems. People can monitor patients’ body condition and collect data remotely and continuously by using WBAN with small and compact wearable sensors. These sensors can be located in, on, and around the patient’s body and measure the patient’s health condition. Afterwards sensor nodes send the data via short-range wireless communication techniques to an intermediate node. The WBANs deal with critical health data, therefore, secure communication within the WBAN is important. There are important criteria in designing a security protocol for a …


Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang Jan 2021

Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang

Electronic Theses and Dissertations

Damages assessment of bridges is important to derive immediate response after severe events to decide serviceability. Especially, past earthquakes have proven the vulnerability of bridges with insufficient detailing. Due to lack of a national and unified post-earthquake inspection procedure for bridges, conventional damage assessments are performed by sending professional personnel to the onsite, detecting visually and measuring the damage state. To get accurate and fast damage result of bridge condition is important to save not only lives but also costs.
There have been studies using image processing techniques to assess damage of bridge column without sending individual to onsite. Convolutional …


Lightweight Encryption Based Security Package For Wireless Body Area Network, Sangwon Shin Jan 2021

Lightweight Encryption Based Security Package For Wireless Body Area Network, Sangwon Shin

Electronic Theses and Dissertations

As the demand of individual health monitoring rose, Wireless Body Area Networks (WBAN) are becoming highly distinctive within health applications. Nowadays, WBAN is much easier to access then what it used to be. However, due to WBAN’s limitation, properly sophisticated security protocols do not exist. As WBAN devices deal with sensitive data and could be used as a threat to the owner of the data or their family, securing individual devices is highly important. Despite the importance in securing data, existing WBAN security methods are focused on providing light weight security methods. This led to most security methods for WBAN …


Human Activity Recognition Based On Wearable Flex Sensor And Pulse Sensor, Xiaozhu Jin Jan 2021

Human Activity Recognition Based On Wearable Flex Sensor And Pulse Sensor, Xiaozhu Jin

Electronic Theses and Dissertations

In order to fulfill the needs of everyday monitoring for healthcare and emergency advice, many HAR systems have been designed [1]. Based on the healthcare purpose, these systems can be implanted into an astronaut’s spacesuit to provide necessary life movement monitoring and healthcare suggestions. Most of these systems use acceleration data-based data record as human activity representation [2,3]. But this data attribute approach has a limitation that makes it impossible to be used as an activity monitoring system for astronavigation. Because an accelerometer senses acceleration by distinguishing acceleration data based on the earth’s gravity offset [4], the accelerometer cannot read …


An Alternative To The One-Size-Fits-All Approach To Isa Training: A Design Science Approach To Isa Regarding The Adaption To Student Vulnerability Based On Knowledge And Behavior, Thomas Jernejcic Feb 2020

An Alternative To The One-Size-Fits-All Approach To Isa Training: A Design Science Approach To Isa Regarding The Adaption To Student Vulnerability Based On Knowledge And Behavior, Thomas Jernejcic

SDSU Data Science Symposium

Any connection to the university’s network is a conduit that has the potential of being exploited by an attacker, resulting in the possibility of substantial harm to the infrastructure, to the university, and to the student body of whom the university serves. While organizations rightfully “baton down the hatches” by building firewalls, creating proxies, and applying important updates, the most significant vulnerability, that of the student, continues to be an issue due to lack of knowledge, insufficient motivation, and inadequate or misguided training. Utilizing the Design Science Research (DSR) methodology, this research effort seeks to address the latter concern of …


Evaluation Of Text Mining Techniques Using Twitter Data For Hurricane Disaster Resilience, Joshua Eason, Sathish Kumar Feb 2020

Evaluation Of Text Mining Techniques Using Twitter Data For Hurricane Disaster Resilience, Joshua Eason, Sathish Kumar

SDSU Data Science Symposium

Data obtained from social media microblogging websites such as Twitter provide the unique ability to collect and analyze conversations of the public in order to gain perspective on the thoughts and feelings of the general public. Sentiment and volume analysis techniques were applied to the dataset in order to gain an understanding of the amount and level of sentiment associated with certain disaster-related tweets, including a topical analysis of specific terms. This study showed that disaster-type events such as a hurricane can cause some strong negative sentiment in the period of time directly preceding the event, but ultimately returns quickly …


Pig Pose Estimation Based On Extracted Data Of Mask R-Cnn With Vgg Neural Network For Classifications, Sang Kwan Lee Jan 2020

Pig Pose Estimation Based On Extracted Data Of Mask R-Cnn With Vgg Neural Network For Classifications, Sang Kwan Lee

Electronic Theses and Dissertations

This paper proposes a pig pose estimation operating with Region Proposal Network (RPN) of Mask Region based Convolutional Neural Network (Mask R-CNN) and Visual Geometry Group (VGG) Neural Network (NN). Object pose estimations generates from the associations of different key points. Key points could be explained as specific location of an object such as different joints of a human body or joints of different object. Hourglass network is one of a NN delivering key points of an object. Associating the different key points with the hourglass network results could be represented as instance-level detection [3]. However, the instance-level detection shows …


Session: 4 Multilinear Subspace Learning And Its Applications To Machine Learning, Randy Hoover, Kyle Caudle Dr., Karen Braman Dr. Feb 2019

Session: 4 Multilinear Subspace Learning And Its Applications To Machine Learning, Randy Hoover, Kyle Caudle Dr., Karen Braman Dr.

SDSU Data Science Symposium

Multi-dimensional data analysis has seen increased interest in recent years. With more and more data arriving as 2-dimensional arrays (images) as opposed to 1-dimensioanl arrays (signals), new methods for dimensionality reduction, data analysis, and machine learning have been pursued. Most notably have been the Canonical Decompositions/Parallel Factors (commonly referred to as CP) and Tucker decompositions (commonly regarded as a high order SVD: HOSVD). In the current research we present an alternate method for computing singular value and eigenvalue decompositions on multi-way data through an algebra of circulants and illustrate their application to two well-known machine learning methods: Multi-Linear Principal Component …


A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen Jan 2019

A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen

Electronic Theses and Dissertations

Microservices architecture is popular for its distributive system styles due to the independent character of each of the services in the architecture. Microservices are built to be single and each service has its running process and interconnecting with a lightweight mechanism that called application programming interface (API). The interaction through microservices needs to communicate internally. Microservices are a service that is likely to become unreachable to its consumers because, in any distributed setup, communication will fail on occasions due to the number of messages passing between services. Failures can occur when the networks are unreliable, and thus the connections can …


Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani Jan 2019

Reducing The Large Class Code Smell By Applying Design Patterns, Bayan Turkistani

Electronic Theses and Dissertations

Software systems need continuous developing to cope and keep up with everchanging requirements. Source code quality affects the software development costs. In software refactoring object-oriented systems, Large Class, in particular, hinder the maintenance of a system by letting it difficult for software developers to understand and perform modifications. Also, it is making the development process labor-intensive and time-wasting. Reducing the Large Class code smell by applying design patterns can make the refactoring process more manageable, ease developing the system and decrease the effort required for the maintaining of software. To guarantee object-oriented software stays clear to read, understand and modify …


Instance Segmentation And Object Detection In Road Scenes Using Inverse Perspective Mapping Of 3d Point Clouds And 2d Images, Chungyup Lee Jan 2019

Instance Segmentation And Object Detection In Road Scenes Using Inverse Perspective Mapping Of 3d Point Clouds And 2d Images, Chungyup Lee

Electronic Theses and Dissertations

The instance segmentation and object detection are important tasks in smart car applications. Recently, a variety of neural network-based approaches have been proposed. One of the challenges is that there are various scales of objects in a scene, and it requires the neural network to have a large receptive field to deal with the scale variations. In other words, the neural network must have deep architectures which slow down computation. In smart car applications, the accuracy of detection and segmentation of vehicle and pedestrian is hugely critical. Besides, 2D images do not have distance information but enough visual appearance. On …


Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri Jan 2018

Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri

Electronic Theses and Dissertations

Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly …


Adaptive Audio Classification Framework For In-Vehicle Environment With Dynamic Noise Characteristics, Haitham Alsaadan Jan 2017

Adaptive Audio Classification Framework For In-Vehicle Environment With Dynamic Noise Characteristics, Haitham Alsaadan

Electronic Theses and Dissertations

With ever-increasing number of car-mounted electric devices that are accessed, managed, and controlled with smartphones, car apps are becoming an important part of the automotive industry. Audio classification is one of the key components of car apps as a front-end technology to enable human-app interactions. Existing approaches for audio classification, however, fall short as the unique and time-varying audio characteristics of car environments are not appropriately taken into account. Leveraging recent advances in mobile sensing technology that allows for an active and accurate driving environment detection, in this thesis, we develop an audio classification framework for mobile apps that categorizes …


Smart Image Search System Using Personalized Semantic Search Method, Fangyu Zhang Jan 2017

Smart Image Search System Using Personalized Semantic Search Method, Fangyu Zhang

Electronic Theses and Dissertations

Due to the emerge in huge numbers of information on the internet nowadays, search technologies are widely used in various fields. Achieving the most relevant search result for the users becomes a big challenge now. While the traditional semantic search technologies seem to achieve the most relevant search result, however, it faces two problems: one is the one-size-fits-all problem, and another is low efficiency. The purpose of this research is to build a Smart Image Search System by using the personalized semantic search method to solve those problems. The personalized semantic search method makes the search system avoids the one-size-fits-all …


Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack Jan 2017

Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack

Electronic Theses and Dissertations

Most recently developed Computer Aided Diagnosis (CAD) systems and their related research is based on medical images that are usually obtained through conventional imaging techniques such as Magnetic Resonance Imaging (MRI), x-ray mammography, and ultrasound. With the development of a new imaging technology called Microwave Tomography Imaging (MTI), it has become inevitable to develop a CAD system that can show promising performance using new format of data. The platform can have a flexibility on its input by adopting Artificial Neural Network (ANN) as a classifier. Among the various phases of CAD system, we have focused on optimizing the classification phase …


Enhanced Breast Cancer Classification With Automatic Thresholding Using Support Vector Machine And Harris Corner Detection, Mohammad Taheri Jan 2017

Enhanced Breast Cancer Classification With Automatic Thresholding Using Support Vector Machine And Harris Corner Detection, Mohammad Taheri

Electronic Theses and Dissertations

Image classification and extracting the characteristics of a tumor are the powerful tools in medical science. In case of breast cancer medical treatment, the breast cancer classification methods can be used to classify input images as benign and malignant classes for better diagnoses and earlier detection with breast tumors. However, classification process can be challenging because of the existence of noise in the images, and complicated structures of the image. Manual classification of the images is timeconsuming, and need to be done only by medical experts. Hence using an automated medical image classification tool is useful and necessary. In addition, …


Similarity Measurement Of Breast Cancer Mammographic Images Using Combination Of Mesh Distance Fourier Transform And Global Features, Ravi Kasaudhan Jan 2016

Similarity Measurement Of Breast Cancer Mammographic Images Using Combination Of Mesh Distance Fourier Transform And Global Features, Ravi Kasaudhan

Electronic Theses and Dissertations

Similarity measurement in breast cancer is an important aspect of determining the vulnerability of detected masses based on the previous cases. It is used to retrieve the most similar image for a given mammographic query image from a collection of previously archived images. By analyzing these results, doctors and radiologists can more accurately diagnose early-stage breast cancer and determine the best treatment. The direct result is better prognoses for breast cancer patients. Similarity measurement in images has always been a challenging task in the field of pattern recognition. A widely-adopted strategy in Content-Based Image Retrieval (CBIR) is comparison of local …


Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo Jan 2016

Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo

Electronic Theses and Dissertations

Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved …


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …