Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Western University (4)
- City University of New York (CUNY) (3)
- New Jersey Institute of Technology (3)
- San Jose State University (3)
- Singapore Management University (3)
-
- University of Louisville (3)
- University of Massachusetts Amherst (3)
- University of Texas at Arlington (2)
- Bard College (1)
- Boise State University (1)
- Brigham Young University (1)
- Marquette University (1)
- Oberlin (1)
- Old Dominion University (1)
- University of Montana (1)
- University of Nevada, Las Vegas (1)
- University of Texas at El Paso (1)
- Utah State University (1)
- Washington University in St. Louis (1)
- Publication
-
- Electronic Thesis and Dissertation Repository (4)
- Doctoral Dissertations (3)
- Electronic Theses and Dissertations (3)
- Master's Projects (3)
- Dissertations (2)
-
- Dissertations and Theses Collection (Open Access) (2)
- Dissertations, Theses, and Capstone Projects (2)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Boise State University Theses and Dissertations (1)
- Computer Science and Engineering Dissertations (1)
- Computer Science and Engineering Theses (1)
- Dissertations (1934 -) (1)
- Dissertations and Theses Collection (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Graduate Student Theses, Dissertations, & Professional Papers (1)
- Honors Papers (1)
- McKelvey School of Engineering Theses & Dissertations (1)
- Open Access Theses & Dissertations (1)
- Senior Projects Spring 2017 (1)
- Student Theses (1)
- Theses (1)
- Theses and Dissertations (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
Articles 31 - 35 of 35
Full-Text Articles in Physical Sciences and Mathematics
Malware Detection Using The Index Of Coincidence, Bhavna Gurnani
Malware Detection Using The Index Of Coincidence, Bhavna Gurnani
Master's Projects
In this research, we apply the Index of Coincidence (IC) to problems in malware analysis. The IC, which is often used in cryptanalysis of classic ciphers, is a technique for measuring the repeat rate in a string of symbols. A score based on the IC is applied to a variety of challenging malware families. We nd that this relatively simple IC score performs surprisingly well, with superior results in comparison to various machine learning based scores, at least in some cases.
Towards A Relative-Pitch Neural Network System For Chorale Composition And Harmonization, Samuel P. Goree
Towards A Relative-Pitch Neural Network System For Chorale Composition And Harmonization, Samuel P. Goree
Honors Papers
Computational creativity researchers interested in applying machine learning to computer composition often use the music of J.S. Bach to train their systems. Working with Bach, though, requires grappling with the conventions of tonal music, which can be difficult for computer systems to learn. In this paper, we propose and implement an alternate approach to composition and harmonization of chorales based on pitch-relative note encodings to avoid tonality altogether. We then evaluate our approach using a survey and expert analysis, and find that pitch-relative encodings do not significantly affect human-comparability, likability or creativity. However, an extension of this model that better …
Mouse Vs. Machine: The Game, Cafferty Aiko Frattarelli
Mouse Vs. Machine: The Game, Cafferty Aiko Frattarelli
Senior Projects Spring 2017
Many modern video games built by big name companies are coded by a group of people together using, and possibly modifying, an already designed game engine. These games usually have another group of people creating the artwork. In this project, I coded and designed a video game from scratch, as well as created all the artwork used in the game. The player controls a mouse character who fights a variety of monsters. In order to create the complexity of the game, I implement basic neural networks as the enemy artificial intelligence, i.e. the decision making process of the enemy. It …
Deep Learning Method Vs. Hand-Crafted Features For Lung Cancer Diagnosis And Breast Cancer Risk Analysis, Wenqing Sun
Deep Learning Method Vs. Hand-Crafted Features For Lung Cancer Diagnosis And Breast Cancer Risk Analysis, Wenqing Sun
Open Access Theses & Dissertations
Breast cancer and lung cancer are two major leading causes of cancer deaths, and researchers have been developing computer aided diagnosis (CAD) system to automatically diagnose them for decades. In recent studies, we found that the techniques in CAD system can also be used for breast cancer risk analysis, like feature design and machine learning. Also we noticed that with the development of deep learning methods, the performance of CAD system can be improved by using computer automatically generated features. To explore these possibilities, we conducted a series of studies: the first two studies focused on transferring the original CAD …
K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler
K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler
Graduate Student Theses, Dissertations, & Professional Papers
Biological sequence datasets are increasing at a prodigious rate. The volume of data in these datasets surpasses what is observed in many other fields of science. New developments wherein metagenomic DNA from complex bacterial communities is recovered and sequenced are producing a new kind of data known as metagenomic data, which is comprised of DNA fragments from many genomes. Developing a utility to analyze such metagenomic data and predict the sample class from which it originated has many possible implications for ecological and medical applications. Within this document is a description of a series of analytical techniques used to process …