Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (70)
- University of Massachusetts Amherst (18)
- Western University (8)
- Old Dominion University (7)
- City University of New York (CUNY) (6)
-
- New Jersey Institute of Technology (6)
- CCT College Dublin (5)
- California Polytechnic State University, San Luis Obispo (5)
- University of Kentucky (5)
- Georgia Southern University (4)
- Kennesaw State University (4)
- Missouri University of Science and Technology (4)
- University of Arkansas, Fayetteville (4)
- University of South Florida (4)
- West Virginia University (4)
- Claremont Colleges (3)
- Edith Cowan University (3)
- Louisiana State University (3)
- Northern Illinois University (3)
- University of Missouri, St. Louis (3)
- University of Nevada, Las Vegas (3)
- Air Force Institute of Technology (2)
- Bard College (2)
- Bowdoin College (2)
- Chapman University (2)
- La Salle University (2)
- Loyola Marymount University and Loyola Law School (2)
- Michigan Technological University (2)
- Portland State University (2)
- Southern Methodist University (2)
- Keyword
-
- Machine learning (36)
- Deep learning (29)
- Machine Learning (28)
- Deep Learning (18)
- Artificial intelligence (11)
-
- Computer vision (11)
- Artificial Intelligence (6)
- Classification (6)
- Neural Networks (6)
- Robotics (6)
- CNNs (5)
- Neural networks (5)
- CNN (4)
- Computer Science (4)
- Feature selection (4)
- NLP (4)
- Natural language processing (4)
- Reinforcement learning (4)
- Convolutional Neural Network (3)
- Convolutional Neural Networks (3)
- Convolutional neural network (3)
- Convolutional neural networks (3)
- Cybersecurity (3)
- Human activity recognition (3)
- Image processing (3)
- Neural Network (3)
- Neural network (3)
- Object detection (3)
- Optimization (3)
- Reinforcement Learning (3)
- Publication
-
- Master's Projects (70)
- Doctoral Dissertations (21)
- Electronic Theses and Dissertations (11)
- Electronic Thesis and Dissertation Repository (8)
- Dissertations (7)
-
- Dissertations, Theses, and Capstone Projects (5)
- ICT (5)
- Theses and Dissertations (5)
- Theses and Dissertations--Computer Science (5)
- Graduate Theses, Dissertations, and Problem Reports (4)
- USF Tampa Graduate Theses and Dissertations (4)
- Dissertations and Theses (3)
- Graduate Research Theses & Dissertations (3)
- Honors Theses (3)
- Master of Science in Computer Science Theses (3)
- Master's Theses (3)
- Theses (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- CMC Senior Theses (2)
- Civil & Environmental Engineering Theses & Dissertations (2)
- Computational and Data Sciences (PhD) Dissertations (2)
- Computer Engineering (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Graduate Theses and Dissertations (2)
- Honors Projects (2)
- Honors Thesis (2)
- LSU Doctoral Dissertations (2)
- Legacy Theses & Dissertations (2009 - 2024) (2)
- Masters Theses (2)
Articles 1 - 30 of 231
Full-Text Articles in Physical Sciences and Mathematics
Early Detection Of Fake News On Social Media, Yang Liu
Early Detection Of Fake News On Social Media, Yang Liu
Dissertations
The ever-increasing popularity and convenience of social media enable the rapid widespread of fake news, which can cause a series of negative impacts both on individuals and society. Early detection of fake news is essential to minimize its social harm. Existing machine learning approaches are incapable of detecting a fake news story soon after it starts to spread, because they require certain amounts of data to reach decent effectiveness which take time to accumulate. To solve this problem, this research first analyzes and finds that, on social media, the user characteristics of fake news spreaders distribute significantly differently from those …
Bio-Inspired Learning And Hardware Acceleration With Emerging Memories, Shruti R. Kulkarni
Bio-Inspired Learning And Hardware Acceleration With Emerging Memories, Shruti R. Kulkarni
Dissertations
Machine Learning has permeated many aspects of engineering, ranging from the Internet of Things (IoT) applications to big data analytics. While computing resources available to implement these algorithms have become more powerful, both in terms of the complexity of problems that can be solved and the overall computing speed, the huge energy costs involved remains a significant challenge. The human brain, which has evolved over millions of years, is widely accepted as the most efficient control and cognitive processing platform. Neuro-biological studies have established that information processing in the human brain relies on impulse like signals emitted by neurons called …
Stochastic Orthogonalization And Its Application To Machine Learning, Yu Hong
Stochastic Orthogonalization And Its Application To Machine Learning, Yu Hong
Electrical Engineering Theses and Dissertations
Orthogonal transformations have driven many great achievements in signal processing. They simplify computation and stabilize convergence during parameter training. Researchers have introduced orthogonality to machine learning recently and have obtained some encouraging results. In this thesis, three new orthogonal constraint algorithms based on a stochastic version of an SVD-based cost are proposed, which are suited to training large-scale matrices in convolutional neural networks. We have observed better performance in comparison with other orthogonal algorithms for convolutional neural networks.
Multi-Agent Narrative Experience Management As Story Graph Pruning, Edward T. Garcia
Multi-Agent Narrative Experience Management As Story Graph Pruning, Edward T. Garcia
University of New Orleans Theses and Dissertations
In this thesis I describe a method where an experience manager chooses actions for non-player characters (NPCs) in intelligent interactive narratives through story graph representation and pruning. The space of all stories can be represented as a story graph where nodes are states and edges are actions. By shaping the domain as a story graph, experience manager decisions can be made by pruning edges. Starting with a full graph, I apply a set of pruning strategies that will allow the narrative to be finishable, NPCs to act believably, and the player to be responsible for how the story unfolds. By …
A Qualitative Representation Of Spatial Scenes In R2 With Regions And Lines, Joshua Lewis
A Qualitative Representation Of Spatial Scenes In R2 With Regions And Lines, Joshua Lewis
Electronic Theses and Dissertations
Regions and lines are common geographic abstractions for geographic objects. Collections of regions, lines, and other representations of spatial objects form a spatial scene, along with their relations. For instance, the states of Maine and New Hampshire can be represented by a pair of regions and related based on their topological properties. These two states are adjacent (i.e., they meet along their shared boundary), whereas Maine and Florida are not adjacent (i.e., they are disjoint).
A detailed model for qualitatively describing spatial scenes should capture the essential properties of a configuration such that a description of the represented objects …
Image-Based Malware Classification With Convolutional Neural Networks And Extreme Learning Machines, Mugdha Jain
Image-Based Malware Classification With Convolutional Neural Networks And Extreme Learning Machines, Mugdha Jain
Master's Projects
Research in the field of malware classification often relies on machine learning models that are trained on high level features, such as opcodes, function calls, and control flow graphs. Extracting such features is costly, since disassembly or code execution is generally required. In this research, we conduct experiments to train and evaluate machine learning models for malware classification, based on features that can be obtained without disassembly or execution of code. Specifically, we visualize malware samples as images and employ image analysis techniques. In this context, we focus on two machine learning models, namely, Convolutional Neural Networks (CNN) and Extreme …
Hot Fusion Vs Cold Fusion For Malware Detection, Snehal Bichkar
Hot Fusion Vs Cold Fusion For Malware Detection, Snehal Bichkar
Master's Projects
A fundamental problem in malware research consists of malware detection, that is, dis- tinguishing malware samples from benign samples. This problem becomes more challeng- ing when we consider multiple malware families. A typical approach to this multi-family detection problem is to train a machine learning model for each malware family and score each sample against all models. The resulting scores are then used for classification. We refer to this approach as “cold fusion,” since we combine previously-trained models—no retraining of these base models is required when additional malware families are considered. An alternative approach is to train a single model …
Detecting Myocardial Infarctions Using Machine Learning Methods, Aniruddh Mathur
Detecting Myocardial Infarctions Using Machine Learning Methods, Aniruddh Mathur
Master's Projects
Myocardial Infarction (MI), commonly known as a heart attack, occurs when one of the three major blood vessels carrying blood to the heart get blocked, causing the death of myocardial (heart) cells. If not treated immediately, MI may cause cardiac arrest, which can ultimately cause death. Risk factors for MI include diabetes, family history, unhealthy diet and lifestyle. Medical treatments include various types of drugs and surgeries which can prove very expensive for patients due to high healthcare costs. Therefore, it is imperative that MI is diagnosed at the right time. Electrocardiography (ECG) is commonly used to detect MI. ECG …
Information Extraction From Biomedical Text Using Machine Learning, Deepti Garg
Information Extraction From Biomedical Text Using Machine Learning, Deepti Garg
Master's Projects
Inadequate drug experimental data and the use of unlicensed drugs may cause adverse drug reactions, especially in pediatric populations. Every year the U.S. Food and Drug Administration approves human prescription drugs for marketing. The labels associated with these drugs include information about clinical trials and drug response in pediatric population. In order for doctors to make an informed decision about the safety and effectiveness of these drugs for children, there is a need to analyze complex and often unstructured drug labels. In this work, first, an exploratory analysis of drug labels using a Natural Language Processing pipeline is performed. Second, …
Assessing Wildfire Damage From High Resolution Satellite Imagery Using Classification Algorithms, Ai-Linh Alten
Assessing Wildfire Damage From High Resolution Satellite Imagery Using Classification Algorithms, Ai-Linh Alten
Master's Projects
Wildfire damage assessments are important information for first responders, govern- ment agencies, and insurance companies to estimate the cost of damages and to help provide relief to those affected by a wildfire. With the help of Earth Observation satellite technology, determining the burn area extent of a fire can be done with traditional remote sensing methods like Normalized Burn Ratio. Using Very High Resolution satellites can help give even more accurate damage assessments but will come with some tradeoffs; these satellites can provide higher spatial and temporal resolution at the expense of better spectral resolution. As a wildfire burn area …
Ordinal Hyperplane Loss, Bob Vanderheyden
Ordinal Hyperplane Loss, Bob Vanderheyden
Doctor of Data Science and Analytics Dissertations
This research presents the development of a new framework for analyzing ordered class data, commonly called “ordinal class” data. The focus of the work is the development of classifiers (predictive models) that predict classes from available data. Ratings scales, medical classification scales, socio-economic scales, meaningful groupings of continuous data, facial emotional intensity and facial age estimation are examples of ordinal data for which data scientists may be asked to develop predictive classifiers. It is possible to treat ordinal classification like any other classification problem that has more than two classes. Specifying a model with this strategy does not fully utilize …
Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin
Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin
Master of Science in Computer Science Theses
This paper attempts to answer the question of if it’s possible to produce a simple, quick, and accurate neural network for the use in upper-limb prosthetics. Through the implementation of convolutional and artificial neural networks and feature extraction on electromyographic data different possible architectures are examined with regards to processing time, complexity, and accuracy. It is found that the most accurate architecture is a multi-entry categorical cross entropy convolutional neural network with 100% accuracy. The issue is that it is also the slowest method requiring 9 minutes to run. The next best method found was a single-entry binary cross entropy …
Graph Deep Learning: Methods And Applications, Muhan Zhang
Graph Deep Learning: Methods And Applications, Muhan Zhang
McKelvey School of Engineering Theses & Dissertations
The past few years have seen the growing prevalence of deep neural networks on various application domains including image processing, computer vision, speech recognition, machine translation, self-driving cars, game playing, social networks, bioinformatics, and healthcare etc. Due to the broad applications and strong performance, deep learning, a subfield of machine learning and artificial intelligence, is changing everyone's life.Graph learning has been another hot field among the machine learning and data mining communities, which learns knowledge from graph-structured data. Examples of graph learning range from social network analysis such as community detection and link prediction, to relational machine learning such as …
An Application Of Deep Learning Models To Automate Food Waste Classification, Alejandro Zachary Espinoza
An Application Of Deep Learning Models To Automate Food Waste Classification, Alejandro Zachary Espinoza
Dissertations and Theses
Food wastage is a problem that affects all demographics and regions of the world. Each year, approximately one-third of food produced for human consumption is thrown away. In an effort to track and reduce food waste in the commercial sector, some companies utilize third party devices which collect data to analyze individual contributions to the global problem. These devices track the type of food wasted (such as vegetables, fruit, boneless chicken, pasta) along with the weight. Some devices also allow the user to leave the food in a kitchen container while it is weighed, so the container weight must also …
Toward Early Detection Of Pancreatic Cancer: An Evidence-Based Approach, Omid Sharagi
Toward Early Detection Of Pancreatic Cancer: An Evidence-Based Approach, Omid Sharagi
Master's Projects
This study observes how an evidential reasoning approach can be used as a diagnostic tool for early detection of pancreatic cancer. The evidential reasoning model combines the output of a linear Support Vector Classifier (SVC) with factors such as smoking history, health history, biopsy location, NGS technology used, and more to predict the likelihood of the disease. The SVC was trained using genomic data of pancreatic cancer patients derived from the National Cancer Institute (NIH) Genomic Data Commons (GDC). To test the evidential reasoning model, a variety of synthetic data was compiled to test the impact of combinations of different …
Image-Based Localization Of User-Interfaces, Riti Gupta
Image-Based Localization Of User-Interfaces, Riti Gupta
Master's Projects
Image localization corresponds to translating the text present in the images from one language to other language. The aim of the project is to develop a methodology to translate the text in image captions from English to Hindi by taking context of the images into account. A lot of work has been done in this field [22], but our aim was to explore if the accuracy can be further improved by consideration of the additional information imparted by the images apart from the text. We have explored Deep Learning using neural networks for this project. In particular, Recurrent Neural Networks …
A Hybrid Approach For Multi-Document Text Summarization, Rashmi Varma
A Hybrid Approach For Multi-Document Text Summarization, Rashmi Varma
Master's Projects
Text summarization has been a long studied topic in the field of natural language processing. There have been various approaches for both extractive text summarization as well as abstractive text summarization. Summarizing texts for a single document is a methodical task. But summarizing multiple documents poses as a greater challenge. This thesis explores the application of Latent Semantic Analysis, Text-Rank, Lex-Rank and Reduction algorithms for single document text summarization and compares it with the proposed approach of creating a hybrid system combining each of the above algorithms, individually, with Restricted Boltzmann Machines for multi-document text summarization and analyzing how all …
3d Shape Prediction On Convolutional Deep Belief Networks, Gregory Y. Enriquez
3d Shape Prediction On Convolutional Deep Belief Networks, Gregory Y. Enriquez
Master's Projects
The field of image recognition software has grown immensely in recent years with the emergence of new deep learning techniques. Deep belief networks inspired by Hinton [11] were one of the earliest methodologies of deep learning in the late 2000s. More recently, convolutional neural networks have been used in deep learning techniques, architecture, and software to identify patterns in imagery in order to make predictions such as classification, image segmentation, etc. Traditional two-dimensional, or 2D, images stored as picture files, typically contain red, green, and blue color data for each individual pixel in the picture. However, more recent commercial 2.5D …
Music Retrieval System Using Query-By-Humming, Parth Patel
Music Retrieval System Using Query-By-Humming, Parth Patel
Master's Projects
Music Information Retrieval (MIR) is a particular research area of great interest because there are various strategies to retrieve music. To retrieve music, it is important to find a similarity between the input query and the matching music. Several solutions have been proposed that are currently being used in the application domain(s) such as Query- by-Example (QBE) which takes a sample of an audio recording playing in the background and retrieves the result. However, there is no efficient approach to solve this problem in a Query-by-Humming (QBH) application. In a Query-by-Humming application, the aim is to retrieve music that is …
Image Restoration Using Automatic Damaged Regions Detection And Machine Learning-Based Inpainting Technique, Chloe Martin-King
Image Restoration Using Automatic Damaged Regions Detection And Machine Learning-Based Inpainting Technique, Chloe Martin-King
Computational and Data Sciences (PhD) Dissertations
In this dissertation we propose two novel image restoration schemes. The first pertains to automatic detection of damaged regions in old photographs and digital images of cracked paintings. In cases when inpainting mask generation cannot be completely automatic, our detection algorithm facilitates precise mask creation, particularly useful for images containing damage that is tedious to annotate or difficult to geometrically define. The main contribution of this dissertation is the development and utilization of a new inpainting technique, region hiding, to repair a single image by training a convolutional neural network on various transformations of that image. Region hiding is also …
Employing Earth Observations And Artificial Intelligence To Address Key Global Environmental Challenges In Service Of The Sdgs, Wenzhao Li
Computational and Data Sciences (PhD) Dissertations
Earth Observation (EO) data provides the capability to integrate data from multiple sources and helps to produce more relevant, frequent, and accurate information about complex processes. EO, empowered by methodologies from Artificial Intelligence (AI), supports various aspects of the UN’s Sustainable Development Goals (SDGs). This dissertation presents author’s major studies using EO to fill in knowledge gaps and develop methodologies and cloud-based applications in selected SDGs, including SDG 6 (Clean Water and Sanitation), SDG 11 (Sustainable Cities and Communities), SDG 14 (Life below Water) and SDG 15 (Life on Land). For SDG 6, the study focuses on spatiotemporal water recharge …
Developing A Computational Framework For A Construction Scheduling Decision Support Web Based Expert System, Feroz Ahmed
Developing A Computational Framework For A Construction Scheduling Decision Support Web Based Expert System, Feroz Ahmed
Dissertations
Decision-making is one of the basic cognitive processes of human behaviors by which a preferred option or a course of action is chosen from among a set of alternatives based on certain criteria. Decision-making is the thought process of selecting a logical choice from the available options. When trying to make a good decision, all the positives and negatives of each option should be evaluated. This decision-making process is particularly challenging during the preparation of a construction schedule, where it is difficult for a human to analyze all possible outcomes of each and every situation because, construction of a project …
Falcon: Framework For Anomaly Detection In Industrial Control Systems, Subin Sapkota
Falcon: Framework For Anomaly Detection In Industrial Control Systems, Subin Sapkota
Boise State University Theses and Dissertations
Industrial Control Systems (ICS) are used to control physical processes in the nation's critical infrastructures. They are composed of subsystems that control physical processes by analyzing the information received from the sensors. Based on the state of the process, the controller issues control commands to the actuators. These systems are utilized in a wide variety of operations such as water treatment plants, power, and manufacturing, etc. While the safety and security of these systems are of high concern, recent reports have shown an increase in targeted attacks that are aimed at manipulating the physical processes to cause catastrophic consequences. This …
Rhetsec_ | Rhetorical Security, Jennifer Mead
Rhetsec_ | Rhetorical Security, Jennifer Mead
Culminating Projects in English
Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …
Deep Reinforcement Learning Pairs Trading, Andrew Brim
Deep Reinforcement Learning Pairs Trading, Andrew Brim
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
This research applies a deep reinforcement learning technique, Deep Q-network, to a stock market pairs trading strategy for profit. Artificial intelligent methods have long since been applied to optimize trading strategies. This work trains and tests a DQN to trade co-integrated stock market prices, in a pairs trading strategy. The results demonstrate the DQN is able to consistently produce positive returns when executing a pairs trading strategy.
Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox
Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox
Computer Science and Computer Engineering Undergraduate Honors Theses
Word embedding is the process of representing words from a corpus of text as real number vectors. These vectors are often derived from frequency statistics from the source corpus. In the GloVe model as proposed by Pennington et al., these vectors are generated using a word-word cooccurrence matrix. However, the GloVe model fails to explicitly take into account the order in which words appear within the contexts of other words. In this paper, multiple methods of incorporating word order in GloVe word embeddings are proposed. The most successful method involves directly concatenating several word vector matrices for each position in …
An Environment For Developing Incremental Learning Applications For Data Streams, Farzin Sarvaramini
An Environment For Developing Incremental Learning Applications For Data Streams, Farzin Sarvaramini
Electronic Thesis and Dissertation Repository
Smart cities look to leverage technology, particularly sensors, and software to provide improved services for its citizenry and enhanced operational efficiencies. Cities look to develop applications that can process data from sensors and other sources to gain insights into operation, enable them to improve operations and inform city leadership. Such applications often need to process streams of data from sensors or other sources to provide city staff with insights into city operations. However, cities are faced with limited budgets and limited staff. The development of applications by third parties can be extremely expensive. One alternative is to identify tools for …
Tools For Tutoring Theoretical Computer Science Topics, Mark Mccartin-Lim
Tools For Tutoring Theoretical Computer Science Topics, Mark Mccartin-Lim
Doctoral Dissertations
This thesis introduces COMPLEXITY TUTOR, a tutoring system to assist in learning abstract proof-based topics, which has been specifically targeted towards the population of computer science students studying theoretical computer science. Existing literature has shown tremendous educational benefits produced by active learning techniques, student-centered pedagogy, gamification and intelligent tutoring systems. However, previously, there had been almost no research on adapting these ideas to the domain of theoretical computer science. As a population, computer science students receive immediate feedback from compilers and debuggers, but receive no similar level of guidance for theoretical coursework. One hypothesis of this thesis is that immediate …
Evaluating Conversation Agent Impact On Student Experience In A Distance Education Course, Grover Walters
Evaluating Conversation Agent Impact On Student Experience In A Distance Education Course, Grover Walters
USF Tampa Graduate Theses and Dissertations
We explore the efficacy of conversation agents operating as an instructional aid in a distance education course. Two aspects of efficacy are considered—conversation agent impact on student perceptions of the experience, and how different design features of the agent affect student perceptions of engagement. Evaluation of the agent is accomplished by collecting data from 24 undergraduate participants separated into random groups. We conduct two rounds of mixedmethod evaluation. Between the two rounds, a modification to the agent occurs based on the outcome of the first evaluation. Findings include limitations related to phrasing and data persistence features of the design that …
Detecting Digitally Forged Faces In Online Videos, Neilesh Sambhu
Detecting Digitally Forged Faces In Online Videos, Neilesh Sambhu
USF Tampa Graduate Theses and Dissertations
We use Rossler’s FaceForensics dataset of 1004 online videos and their corresponding forged counterparts [1] to investigate the ability to distinguish digitally forged facial images from original images automatically with deep learning. The proposed convolutional neural network is much smaller than the current state-of-the-art solutions. Nevertheless, the network maintains a high level of accuracy (99.6%), all while using the entire FaceForensics dataset and not including any temporal information. We implement majority voting and show the impact on accuracy (99.67%), where only 1 video of 300 is misclassified. We examine why the model misclassified this one video. In terms of tuning …