Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper Jan 2023

Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper

CCE Theses and Dissertations

No abstract provided.


Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira Jan 2023

Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira

CCE Theses and Dissertations

Cerebral microbleeds (CMB) are small foci of chronic blood products in brain tissues that are critical markers for cerebral amyloid angiopathy. CMB increases the risk of symptomatic intracerebral hemorrhage and ischemic stroke. CMB can also cause structural damage to brain tissues resulting in neurologic dysfunction, cognitive impairment, and dementia. Due to the paramagnetic properties of blood degradation products, CMB can be better visualized via susceptibility-weighted imaging (SWI) than magnetic resonance imaging (MRI).CMB identification and classification have been based mainly on human visual identification of SWI features via shape, size, and intensity information. However, manual interpretation can be biased. Visual screening …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving Jan 2023

Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving

CCE Theses and Dissertations

In cybersecurity, one of most important forensic tools are audit files; they contain a record of cyber events that occur on systems throughout the enterprise. Threats to an enterprise have become one of the top concerns of IT professionals world-wide. Although there are various approaches to detect anomalous insider behavior, these approaches are not always able to detect advanced persistent threats or even exfiltration of sensitive data by insiders. The issue is the volume of network data required to identify this anomalous activity. It has been estimated that an average corporate user creates a minimum of 1.5 MB audit data …