Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer Mar 2024

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer

ELAIA

Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …


Learning-Based Ant Colony Optimization Algorithm For Solving A Kind Of Complex 2-Echelon Vehicle Routing Problem, Xue Chen, Rong Hu, Hui Wang, Zuocheng Li, Bin Qian, Yixu Li Nov 2023

Learning-Based Ant Colony Optimization Algorithm For Solving A Kind Of Complex 2-Echelon Vehicle Routing Problem, Xue Chen, Rong Hu, Hui Wang, Zuocheng Li, Bin Qian, Yixu Li

Journal of System Simulation

Abstract: Aiming at green 2-echelon vehicle routing problem with simultaneous pick-up and delivery, a learning-based ant colony optimization algorithm combined with clustering decomposition is proposed. The objective function to be minimized is total transportation cost wherein carbon emission cost is specially considered. Associated with the mutual coupling features of the 2-echelon vehicle routing problem, we propose a distance-based clustering method to decompose the original problem into a set of sub-problems. Then, a learning-based ant colony optimization algorithm is presented to find the solutions of the sub-problems based on which the solution of the original problem can be obtained. In the …


Probing As A Technique To Understand Abstract Spaces, Ashlen A. Plasek Jun 2023

Probing As A Technique To Understand Abstract Spaces, Ashlen A. Plasek

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Machine learning models, while very powerful, have their operation obfuscated behind millions of parameters. This obfuscation can make deriving a human meaningful process from a machine learning model very difficult. However, while the intermediate states of a machine learning model are similarly obfuscated, using probing, we can start to explore looking at possible structure in those intermediate states. Large language models are a prime example of this obfuscation, and probing can begin to allow novel experimentation to be performed.


Towards An Experimental Bibliography Of Hemispheric Reconstruction Newspapers, Joshua Ortiz Baco, Benjamin Charles Germain Lee, Jim Casey, Sarah H. Salter Jun 2023

Towards An Experimental Bibliography Of Hemispheric Reconstruction Newspapers, Joshua Ortiz Baco, Benjamin Charles Germain Lee, Jim Casey, Sarah H. Salter

Criticism

Digital collections of newspapers have drawn broader attention to the fragmented and scattered print histories of minoritized communities. Attempts to survey these histories through bibliography, however, quickly meet with a fundamental problem: the practice of bibliographic description calls for creating a static record of social affiliations. Given the overwhelming scholarly consensus that categories such as race, ethnicity, and language are socially constructed, this article introduces an experimental bibliographic method for mapping the vast landscape of historical newspapers. This method extends the machine learning affordances of a recent project called Newspaper Navigator to enumerate the newspapers in Chronicling America according to …


Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer Mar 2023

Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.


Toward Suicidal Ideation Detection With Lexical Network Features And Machine Learning, Ulya Bayram, William Lee, Daniel Santel, Ali Minai, Peggy Clark, Tracy Glauser, John Pestian Apr 2022

Toward Suicidal Ideation Detection With Lexical Network Features And Machine Learning, Ulya Bayram, William Lee, Daniel Santel, Ali Minai, Peggy Clark, Tracy Glauser, John Pestian

Northeast Journal of Complex Systems (NEJCS)

In this study, we introduce a new network feature for detecting suicidal ideation from clinical texts and conduct various additional experiments to enrich the state of knowledge. We evaluate statistical features with and without stopwords, use lexical networks for feature extraction and classification, and compare the results with standard machine learning methods using a logistic classifier, a neural network, and a deep learning method. We utilize three text collections. The first two contain transcriptions of interviews conducted by experts with suicidal (n=161 patients that experienced severe ideation) and control subjects (n=153). The third collection consists of interviews conducted by experts …


Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard Sep 2021

Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard

James Madison Undergraduate Research Journal (JMURJ)

The dissemination of deep fakes for nefarious purposes poses significant national security risks to the United States, requiring an urgent development of technologies to detect their use and strategies to mitigate their effects. Deep fakes are images and videos created by or with the assistance of AI algorithms in which a person’s likeness, actions, or words have been replaced by someone else’s to deceive an audience. Often created with the help of generative adversarial networks, deep fakes can be used to blackmail, harass, exploit, and intimidate individuals and businesses; in large-scale disinformation campaigns, they can incite political tensions around the …


Behavior Modeling For Computer Generated Forces Based On Machine Learning, Zhang Qi, Junjie Zeng, Xu Kai, Qin Long, Quanjun Yin Feb 2021

Behavior Modeling For Computer Generated Forces Based On Machine Learning, Zhang Qi, Junjie Zeng, Xu Kai, Qin Long, Quanjun Yin

Journal of System Simulation

Abstract: With the rapid development of Machine Learning, especially deep learning, it has become an important way of modeling Computer Generated Force (CGF) behavior by ML methods, which can overcome the challenges of traditional methods. The existing research and application of three typical learning methods in CGF behavior modeling are discussed, and the effects of introducing learning into different stages of the typical CGF applications are analyzed, and the function and performance requirements of CGF behavior modeling using machine learning are proposed. Four potential research directions in the field for future are proposed.


Embedded Power Optimization Method Based On User Behavior, Wang Hai, Gao Ling, Dongqi Chen, Ren Jie Sep 2020

Embedded Power Optimization Method Based On User Behavior, Wang Hai, Gao Ling, Dongqi Chen, Ren Jie

Journal of System Simulation

Abstract: In recent years, with the rapid development of embedded device represented by mobile phone and tablet computer, low power technology has been one of the hotspots in the embedded research field. Because the battery capacity of embedded device is limited due to its restricted volume and weight, there are often users suffering the problem that their phone battery being dead. There are many research directions in embedded low power field at present. The relationship between low power and user behavior recognition was aimed, which started with recognizing user behavior using machine learning and then obtains the user’s daily usage …


Gep Automatic Clustering Algorithm With Dynamic Penalty Factors, Chen Yan, Kangshun Li, Yang Lei Jul 2020

Gep Automatic Clustering Algorithm With Dynamic Penalty Factors, Chen Yan, Kangshun Li, Yang Lei

Journal of System Simulation

Abstract: Various problems such as sensitive selection of initial clustering center, easily falling into local optimal solution, and determining numbers of clusters, still exist in the traditional clustering algorithm. A GEP automatic clustering algorithm with dynamic penalty factors was proposed. This algorithm combines penalty factors and GEP clustering algorithm, and doesn't rely on any priori knowledge of the data set. And a dynamic algorithm was proposed to generate the penalty factors according to the distribution characteristics of different data sets, which is a better solution for the impact of isolated points and noise points. According to four dataset, penalty factors' …


Monocular Depth Image Mark-Less Pose Estimation Based On Feature Regression, Chen Ying, Shen Li Feb 2020

Monocular Depth Image Mark-Less Pose Estimation Based On Feature Regression, Chen Ying, Shen Li

Journal of System Simulation

Abstract: Monocular camera mark-less pose estimation system suffers low accuracy, robustness and efficiency due to variety of action, self-occlusion of human body. A method of feature exaction from point clouds was proposed, in which a single-to-multiple (S2M) feature regressor and a joint position regressor were designed to quickly and accurately predict the 3D positions of body joints from a single depth image without any temporal information. Experiment result shows that the estimation accuracy is superior to that of state-of-the-arts and multi-camera based methods.


Chaotic Time Series Prediction Based On Gaussian Processes Mixture, Zhenjie Feng, Fan Yu Dec 2019

Chaotic Time Series Prediction Based On Gaussian Processes Mixture, Zhenjie Feng, Fan Yu

Journal of System Simulation

Abstract: Aiming at the problem that the existing learning algorithms of Gaussian processes mixture (GPM) model, such as Markov Chain Monte Carlo (MCMC), variation or leave one out, have high computational complexity, a hidden variables posterior hard-cut iterative training algorithm is proposed, which simplifies the training process of the model. The GPM model based on the proposed algorithm is applied to chaotic time series prediction. The effects of embedding dimension, time delay, learning sample number, and testing sample numbers on predictive ability are discussed. It is demonstrated by the experimental results that the prediction of the GPM model is more …


Characteristic Index Digging Of Combat Sos Capability Based On Machine Learning, Yongli Yang, Xiaofeng Hu, Rong Ming, Xiaojing Yin, Wenxiang Wang Dec 2019

Characteristic Index Digging Of Combat Sos Capability Based On Machine Learning, Yongli Yang, Xiaofeng Hu, Rong Ming, Xiaojing Yin, Wenxiang Wang

Journal of System Simulation

Abstract: Aiming at the two difficulties in characteristic index digging of combat system of systems (CSoS), namely operation data generation and digging method selection, this paper proposes a new digging method, that is, using the simulation testbed to generate operation data, then adopting the machine learning to dig characteristic index. Two methods of characteristic index digging based on machine learning are researched: (1) the method based on network convergence, divides the communities for fundamental indexes based on their relationship, and obtains the characteristic indexes by principal component analysis (PCA); this method is applied to dig the characteristic indexes of …


“Where’S The I-O?” Artificial Intelligence And Machine Learning In Talent Management Systems, Manuel F. Gonzalez, John F. Capman, Frederick L. Oswald, Evan R. Theys, David L. Tomczak Nov 2019

“Where’S The I-O?” Artificial Intelligence And Machine Learning In Talent Management Systems, Manuel F. Gonzalez, John F. Capman, Frederick L. Oswald, Evan R. Theys, David L. Tomczak

Personnel Assessment and Decisions

Artificial intelligence (AI) and machine learning (ML) have seen widespread adoption by organizations seeking to identify and hire high-quality job applicants. Yet the volume, variety, and velocity of professional involvement among I-O psychologists remains relatively limited when it comes to developing and evaluating AI/ML applications for talent assessment and selection. Furthermore, there is a paucity of empirical research that investigates the reliability, validity, and fairness of AI/ML tools in organizational contexts. To stimulate future involvement and research, we share our review and perspective on the current state of AI/ML in talent assessment as well as its benefits and potential pitfalls; …


Research Of Nonlinear Time Series Prediction Method For Motion Capture, Tianyu Huang, Yunying Guo Jan 2019

Research Of Nonlinear Time Series Prediction Method For Motion Capture, Tianyu Huang, Yunying Guo

Journal of System Simulation

Abstract: In this paper, we study the nonlinear time series prediction method for action capture. A prediction method based on the capture data is studied and implemented by analyzing human motion data to solve the data loss and correction problem caused by sensor failure. Based on this research purpose, the simulation experiment assumes that a sensor in the sequence of actions fails, then uses eight kinds of machine learning methods, and evaluates them with six indexes. The prediction results of different methods are compared and the predicted motions are visualized. Through the experiments, data prediction accuracy by random forest, decision …


Intelligent Diagnosis Of Aircraft Electrical Faults Based On Rmbp Neural Network, Lishan Jia, Zhe Liu, Sun Yi Jan 2019

Intelligent Diagnosis Of Aircraft Electrical Faults Based On Rmbp Neural Network, Lishan Jia, Zhe Liu, Sun Yi

Journal of System Simulation

Abstract: To the characteristics of multiple properties, hard to remove and high cost of time and manpower of aircraft electrical faults maintenance in aircraft maintenance of civil aviation, construction of intelligent aircraft electrical faults diagnosis system using RMBP neural network is proposed. RMBP algorithm is used to study sample data in the intelligent faults diagnosis system as it can overcome the faults of long time of convergence and easy to go into local minima of common BP algorithm, and is suitable for training large-scale neural network,. Experience data are collected, samples are made, samples training and experiment are carried out. …


Optimizing Control Of Total Heat Supply Based On Machine Learning, Li Qi, Xingqi Hu, Jianmin Zhao Jan 2019

Optimizing Control Of Total Heat Supply Based On Machine Learning, Li Qi, Xingqi Hu, Jianmin Zhao

Journal of System Simulation

Abstract: The central heating system has complex structure, along with the characteristics of hysteresis, strong coupling and nonlinear. Contraposing the problem that the process is difficult to be identified and controlled by the mechanism modeling, an optimal control method of heat source total heat production based on machine learning is proposed. The heat source model of central heating system is established by BP neural network and long short-term memory neural network. Under the premise of meeting the demand of heating quality, with the total energy consumption as the optimization objective, the optimal control sequence of water supply temperature and water …


Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi Jul 2018

Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi

SMU Data Science Review

In this paper, we present a tool that provides trading recommendations for cryptocurrency using a stochastic gradient boost classifier trained from a model labeled by technical indicators. The cryptocurrency market is volatile due to its infancy and limited size making it difficult for investors to know when to enter, exit, or stay in the market. Therefore, a tool is needed to provide investment recommendations for investors. We developed such a tool to support one cryptocurrency, Bitcoin, based on its historical price and volume data to recommend a trading decision for today or past days. This tool is 95.50% accurate with …


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels Apr 2018

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short …


Cognitive Virtual Admissions Counselor, Kumar Raja Guvindan Raju, Cory Adams, Raghuram Srinivas Apr 2018

Cognitive Virtual Admissions Counselor, Kumar Raja Guvindan Raju, Cory Adams, Raghuram Srinivas

SMU Data Science Review

Abstract. In this paper, we present a cognitive virtual admissions counselor for the Master of Science in Data Science program at Southern Methodist University. The virtual admissions counselor is a system capable of providing potential students accurate information at the time that they want to know it. After the evaluation of multiple technologies, Amazon’s LEX was selected to serve as the core technology for the virtual counselor chatbot. Student surveys were leveraged to collect and generate training data to deploy the natural language capability. The cognitive virtual admissions counselor platform is currently capable of providing an end-to-end conversational dialog to …


Quantitative Forecasting Of Risk For Ptsd Using Ecological Factors: A Deep Learning Application, Nuriel S. Mor, Kathryn L. Dardeck Jan 2018

Quantitative Forecasting Of Risk For Ptsd Using Ecological Factors: A Deep Learning Application, Nuriel S. Mor, Kathryn L. Dardeck

Journal of Social, Behavioral, and Health Sciences

Forecasting the risk for mental disorders from early ecological information holds benefits for the individual and society. Computational models used in psychological research, however, are barriers to making such predictions at the individual level. Preexposure identification of future soldiers at risk for posttraumatic stress disorder (PTSD) and other individuals, such as humanitarian aid workers and journalists intending to be potentially exposed to traumatic events, is important for guiding decisions about exposure. The purpose of the present study was to evaluate a machine learning approach to identify individuals at risk for PTSD using readily collected ecological risk factors, which makes scanning …


Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd. Dec 2017

Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd.

The Kennesaw Journal of Undergraduate Research

Visual odometry is the process of tracking an agent's motion over time using a visual sensor. The visual odometry problem has only been recently solved using traditional, non-machine learning techniques. Despite the success of neural networks at many related problems such as object recognition, feature detection, and optical flow, visual odometry still has not been solved with a deep learning technique. This paper attempts to implement several Convolutional Neural Networks to solve the visual odometry problem and compare slight variations in data preprocessing. The work presented is a step toward reaching a legitimate neural network solution.


Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers Dec 2016

Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers

Military Cyber Affairs

Today’s defensive cyber sensors are dominated by signature-based analytical methods that require continuous maintenance and lack the ability to detect unknown threats. Anomaly detection offers the ability to detect unknown threats, but despite over 15 years of active research, the operationalization of anomaly detection and machine learning for Defensive Cyber Operations (DCO) is lagging. This article provides an introduction to machine learning concepts with a focus on the unique challenges to using machine learning for DCO. Traditional machine learning evaluation methods are challenged in favor of a value-focused evaluation method that incorporates evaluator-specific weights for classifier and sensitivity threshold selection …


Artificial Intelligence: Myths And Realities, Hugo D'Alarcao Dec 1984

Artificial Intelligence: Myths And Realities, Hugo D'Alarcao

Bridgewater Review

Artificial intelligence the name conjures images of mechanical monsters, the Golem, Dr. Frankenstein’s creation and the rebellious computer Hal. We have always been fascinated by the possibility of creating a machine in our image, but this fascination is often accompanied by apprehension. We fear losing control of our creation and suspect that it might turn against us. It is this duality, this conflict between the desire to create and the fear of the consequences of the creation that has been so successfully exploited by writers. It is also, in part, this fascination that has recently brought the field of Artificial …