Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (13)
- Engineering (8)
- Computer Engineering (5)
- Graphics and Human Computer Interfaces (5)
- Other Computer Sciences (5)
-
- Life Sciences (4)
- Bioinformatics (3)
- Numerical Analysis and Scientific Computing (3)
- Psychology (3)
- Social and Behavioral Sciences (3)
- Statistics and Probability (3)
- Mathematics (2)
- Medicine and Health Sciences (2)
- OS and Networks (2)
- Animal Sciences (1)
- Applied Behavior Analysis (1)
- Applied Mathematics (1)
- Arts and Humanities (1)
- Biostatistics (1)
- Business (1)
- Civil and Environmental Engineering (1)
- Clinical Psychology (1)
- Computational Biology (1)
- Computational Linguistics (1)
- Condensed Matter Physics (1)
- Congenital, Hereditary, and Neonatal Diseases and Abnormalities (1)
- Databases and Information Systems (1)
- Diseases (1)
- Institution
-
- University of Arkansas, Fayetteville (4)
- University of South Florida (4)
- Bard College (2)
- California Polytechnic State University, San Luis Obispo (2)
- City University of New York (CUNY) (2)
-
- Kennesaw State University (2)
- Missouri University of Science and Technology (2)
- Nova Southeastern University (2)
- University of Kentucky (2)
- University of Nevada, Las Vegas (2)
- Wright State University (2)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- Michigan Technological University (1)
- Singapore Management University (1)
- The College of Wooster (1)
- University of New Orleans (1)
- University of South Carolina (1)
- University of Texas at El Paso (1)
- University of Vermont (1)
- Utah State University (1)
- Wayne State University (1)
- Western University (1)
- Publication
-
- Graduate Theses and Dissertations (4)
- USF Tampa Graduate Theses and Dissertations (4)
- Browse all Theses and Dissertations (2)
- CCE Theses and Dissertations (2)
- Dissertations, Theses, and Capstone Projects (2)
-
- Master of Science in Computer Science Theses (2)
- Master's Theses (2)
- Senior Projects Spring 2018 (2)
- Theses and Dissertations (2)
- Theses and Dissertations--Computer Science (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Dissertations and Theses Collection (Open Access) (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Graduate College Dissertations and Theses (1)
- Masters Theses (1)
- Open Access Theses & Dissertations (1)
- Senior Independent Study Theses (1)
- University of New Orleans Theses and Dissertations (1)
- Wayne State University Dissertations (1)
Articles 1 - 30 of 38
Full-Text Articles in Computer Sciences
Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie
Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie
Master of Science in Computer Science Theses
The evolution of machine learning and computer vision in technology has driven a lot of
improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …
On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi
On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi
USF Tampa Graduate Theses and Dissertations
Understanding Internet user behavior and Internet usage patterns is fundamental in developing future access networks and services that meet technical as well as Internet user needs. User behavior is routinely studied and measured, but with different methods depending on the research discipline of the investigator, and these disciplines rarely cross. We tackle this challenge by developing frameworks that the Internet usage statistics used as the main features in understanding Internet user behaviors, with the purpose of finding a complete picture of the user behavior and working towards a unified analysis methodology. In this dissertation we collected Internet usage statistics via …
Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang
Improvement Of Decision On Coding Unit Split Mode And Intra-Picture Prediction By Machine Learning, Wenchan Jiang
Master of Science in Computer Science Theses
High efficiency Video Coding (HEVC) has been deemed as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The reference software (i.e., HM) have included the implementations of the guidelines in appliance with the new standard. The software includes both encoder and decoder functionality.
Machine learning (ML) works with data and processes it to discover patterns that can be later used to analyze new trends. ML can play a key role in a wide range of critical applications, such as data mining, natural language processing, image recognition, and expert systems. …
Application Of Machine Learning In Cancer Research, Mandana Bozorgi
Application Of Machine Learning In Cancer Research, Mandana Bozorgi
UNLV Theses, Dissertations, Professional Papers, and Capstones
This dissertation revisits the problem of five-year survivability predictions for breast cancer using machine learning tools. This work is distinguishable from the past experiments based on the size of the training data, the unbalanced distribution of data in minority and majority classes, and modified data cleaning procedures. These experiments are also based on the principles of TIDY data and reproducible research. In order to fine-tune the predictions, a set of experiments were run using naive Bayes, decision trees, and logistic regression.
Of particular interest were strategies to improve the recall level for the minority class, as the cost of misclassification …
Automatic Multimodal Assessment Of Neonatal Pain, Ghada Zamzmi
Automatic Multimodal Assessment Of Neonatal Pain, Ghada Zamzmi
USF Tampa Graduate Theses and Dissertations
For several decades, pediatricians used to believe that neonates do not feel pain. The American Academy of Pediatrics (AAP) recognized neonates' sense of pain in 1987. Since then, there have been many studies reporting a strong association between repeated pain exposure (under-treatment) and alterations in brain structure and function. This association has led to the increased use of anesthetic medications. However, recent studies found that the excessive use of analgesic medications (over-treatment) can cause many side effects. The current standard for assessing neonatal pain is discontinuous and suffers from inter-observer variations, which can lead to over- or under-treatment. Therefore, it …
Machine Learning Methods For Network Intrusion Detection And Intrusion Prevention Systems, Zheni Svetoslavova Stefanova
Machine Learning Methods For Network Intrusion Detection And Intrusion Prevention Systems, Zheni Svetoslavova Stefanova
USF Tampa Graduate Theses and Dissertations
Given the continuing advancement of networking applications and our increased dependence upon software-based systems, there is a pressing need to develop improved security techniques for defending modern information technology (IT) systems from malicious cyber-attacks. Indeed, anyone can be impacted by such activities, including individuals, corporations, and governments. Furthermore, the sustained expansion of the network user base and its associated set of applications is also introducing additional vulnerabilities which can lead to criminal breaches and loss of critical data. As a result, the broader cybersecurity problem area has emerged as a significant concern, with many solution strategies being proposed for both …
Machine Learning For Inspired, Structured, Lyrical Music Composition, Paul Mark Bodily
Machine Learning For Inspired, Structured, Lyrical Music Composition, Paul Mark Bodily
Theses and Dissertations
Computational creativity has been called the "final frontier" of artificial intelligence due to the difficulty inherent in defining and implementing creativity in computational systems. Despite this difficulty computer creativity is becoming a more significant part of our everyday lives, in particular music. This is observed in the prevalence of music recommendation systems, co-creational music software packages, smart playlists, and procedurally-generated video games. Significant progress can be seen in the advances in industrial applications such as Spotify, Pandora, Apple Music, etc., but several problems persist. Of more general interest, however, is the question of whether or not computers can exhibit autonomous …
Similarity Based Large Scale Malware Analysis: Techniques And Implications, Yuping Li
Similarity Based Large Scale Malware Analysis: Techniques And Implications, Yuping Li
USF Tampa Graduate Theses and Dissertations
Malware analysis and detection continues to be one of the central battlefields for cybersecurity industry. For the desktop malware domain, we observed multiple significant ransomware attacks in the past several years, e.g., it was estimated that in 2017 the WannaCry ransomware attack affected more than 200,000 computers across 150 countries with hundreds of millions damages. Similarly, we witnessed the increased impacts of Android malware on global individuals due to the popular smartphone and IoT devices worldwide. In this dissertation, we describe similarity comparison based novel techniques that can be applied to achieve large scale desktop and Android malware analysis, and …
Music Popularity, Diffusion And Recommendation In Social Networks: A Fusion Analytics Approach, Jing Ren
Music Popularity, Diffusion And Recommendation In Social Networks: A Fusion Analytics Approach, Jing Ren
Dissertations and Theses Collection (Open Access)
Streaming music and social networks offer an easy way for people to gain access to a massive amount of music, but there are also challenges for the music industry to design for promotion strategies via the new channels. My dissertation employs a fusion of machine-based methods and explanatory empiricism to explore music popularity, diffusion, and promotion in the social network context.
Detecting Rip Currents From Images, Corey C. Maryan
Detecting Rip Currents From Images, Corey C. Maryan
University of New Orleans Theses and Dissertations
Rip current images are useful for assisting in climate studies but time consuming to manually annotate by hand over thousands of images. Object detection is a possible solution for automatic annotation because of its success and popularity in identifying regions of interest in images, such as human faces. Similarly to faces, rip currents have distinct features that set them apart from other areas of an image, such as more generic patterns of the surf zone. There are many distinct methods of object detection applied in face detection research. In this thesis, the best fit for a rip current object detector …
A Machine Learning Approach To Predict First-Year Student Retention Rates At University Of Nevada, Las Vegas, Aditya Rajuladevi
A Machine Learning Approach To Predict First-Year Student Retention Rates At University Of Nevada, Las Vegas, Aditya Rajuladevi
UNLV Theses, Dissertations, Professional Papers, and Capstones
First-year student retention rates for a four-year institution refers to the percentage of First-time Full-time students from the previous fall who return to the same institution for the following fall. First-year retention rates act as an important indicator of the student satisfaction as well as the performance of the university. Moreover, universities with low retention rates may face a decline in the admissions of talented students with a notable loss of tuition fees and contributions from alumni. Therefore, it is important for universities to formulate strategies to identify students who are at risk of not being retained and take necessary …
Improving Asynchronous Advantage Actor Critic With A More Intelligent Exploration Strategy, James B. Holliday
Improving Asynchronous Advantage Actor Critic With A More Intelligent Exploration Strategy, James B. Holliday
Graduate Theses and Dissertations
We propose a simple and efficient modification to the Asynchronous Advantage Actor Critic (A3C)
algorithm that improves training. In 2016 Google’s DeepMind set a new standard for state-of-theart
reinforcement learning performance with the introduction of the A3C algorithm. The goal of
this research is to show that A3C can be improved by the use of a new novel exploration strategy we
call “Follow then Forage Exploration” (FFE). FFE forces the agents to follow the best known path
at the beginning of a training episode and then later in the episode the agent is forced to “forage”
and explores randomly. In …
Standard Machine Learning Techniques In Audio Beehive Monitoring: Classification Of Audio Samples With Logistic Regression, K-Nearest Neighbor, Random Forest And Support Vector Machine, Prakhar Amlathe
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Honeybees are one of the most important pollinating species in agriculture. Every three out of four crops have honeybee as their sole pollinator. Since 2006 there has been a drastic decrease in the bee population which is attributed to Colony Collapse Disorder (CCD). The bee colonies fail/ die without giving any traditional health symptoms which otherwise could help in alerting the Beekeepers in advance about their situation.
Electronic Beehive Monitoring System has various sensors embedded in it to extract video, audio and temperature data that could provide critical information on colony behavior and health without invasive beehive inspections. Previously, significant …
A Home Security System Based On Smartphone Sensors, Michael Mahler
A Home Security System Based On Smartphone Sensors, Michael Mahler
Graduate Theses and Dissertations
Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured …
Improving The Efficacy Of Context-Aware Applications, Jon C. Hammer
Improving The Efficacy Of Context-Aware Applications, Jon C. Hammer
Graduate Theses and Dissertations
In this dissertation, we explore methods for enhancing the context-awareness capabilities of modern computers, including mobile devices, tablets, wearables, and traditional computers. Advancements include proposed methods for fusing information from multiple logical sensors, localizing nearby objects using depth sensors, and building models to better understand the content of 2D images.
First, we propose a system called Unagi, designed to incorporate multiple logical sensors into a single framework that allows context-aware application developers to easily test new ideas and create novel experiences. Unagi is responsible for collecting data, extracting features, and building personalized models for each individual user. We demonstrate the …
A Continuous Space Generative Model, Erzen Komoni
A Continuous Space Generative Model, Erzen Komoni
Graduate Theses and Dissertations
Generative models are a class of machine learning models capable of producing digital images with plausibly realistic properties. They are useful in such applications as visualizing designs, rendering game scenes, and improving images at higher magnifications. Unfortunately, existing generative models generate only images with a discrete predetermined resolution. This paper presents the Continuous Space Generative Model (CSGM), a novel generative model capable of generating images as a continuous function, rather than as a discrete set of pixel values. Like generative adversarial networks, CSGM trains by alternating between generative and discriminative steps. But unlike generative adversarial networks, CSGM uses only one …
Multimodal Depression Detection: An Investigation Of Features And Fusion Techniques For Automated Systems, Michelle Renee Morales
Multimodal Depression Detection: An Investigation Of Features And Fusion Techniques For Automated Systems, Michelle Renee Morales
Dissertations, Theses, and Capstone Projects
Depression is a serious illness that affects a large portion of the world’s population. Given the large effect it has on society, it is evident that depression is a serious health issue. This thesis evaluates, at length, how technology may aid in assessing depression. We present an in-depth investigation of features and fusion techniques for depression detection systems. We also present OpenMM: a novel tool for multimodal feature extraction. Lastly, we present novel techniques for multimodal fusion. The contributions of this work add considerably to our knowledge of depression detection systems and have the potential to improve future systems by …
Improving Swarm Performance By Applying Machine Learning To A New Dynamic Survey, John Taylor Jackson
Improving Swarm Performance By Applying Machine Learning To A New Dynamic Survey, John Taylor Jackson
Master's Theses
A company, Unanimous AI, has created a software platform that allows individuals to come together as a group or a human swarm to make decisions. These human swarms amplify the decision-making capabilities of both the individuals and the group. One way Unanimous AI increases the swarm’s collective decision-making capabilities is by limiting the swarm to more informed individuals on the given topic. The previous way Unanimous AI selected users to enter the swarm was improved upon by a new methodology that is detailed in this study. This new methodology implements a new type of survey that collects data that is …
Computational Modelling Of Human Transcriptional Regulation By An Information Theory-Based Approach, Ruipeng Lu
Computational Modelling Of Human Transcriptional Regulation By An Information Theory-Based Approach, Ruipeng Lu
Electronic Thesis and Dissertation Repository
ChIP-seq experiments can identify the genome-wide binding site motifs of a transcription factor (TF) and determine its sequence specificity. Multiple algorithms were developed to derive TF binding site (TFBS) motifs from ChIP-seq data, including the entropy minimization-based Bipad that can derive both contiguous and bipartite motifs. Prior studies applying these algorithms to ChIP-seq data only analyzed a small number of top peaks with the highest signal strengths, biasing their resultant position weight matrices (PWMs) towards consensus-like, strong binding sites; nor did they derive bipartite motifs, disabling the accurate modelling of binding behavior of dimeric TFs.
This thesis presents a novel …
Detecting Speakers In Video Footage, Michael Williams
Detecting Speakers In Video Footage, Michael Williams
Master's Theses
Facial recognition is a powerful tool for identifying people visually. Yet, when the end goal is more specific than merely identifying the person in a picture problems can arise. Speaker identification is one such task which expects more predictive power out of a facial recognition system than can be provided on its own. Speaker identification is the task of identifying who is speaking in video not simply who is present in the video. This extra requirement introduces numerous false positives into the facial recognition system largely due to one main scenario. The person speaking is not on camera. This paper …
Using Autoencoder To Reduce The Length Of The Autism Diagnostic Observation Schedule (Ados), Sara Hussain Daghustani
Using Autoencoder To Reduce The Length Of The Autism Diagnostic Observation Schedule (Ados), Sara Hussain Daghustani
Electronic Theses, Projects, and Dissertations
This thesis uses autoencoders to explore the possibility of reducing the length of the Autism Diagnostic Observation Schedule (ADOS), which is a series of tests and observations used to diagnose autism spectrum disorders in children, adolescents, and adults of different developmental levels. The length of the ADOS, directly and indirectly, causes barriers to its access for many individuals, which means that individuals who need testing are unable to get it. Reducing the length of the ADOS without significantly sacrificing its accuracy would increase its accessibility. The autoencoders used in this thesis have specific connections between layers that mimic the sectional …
Multimodal Sensing And Data Processing For Speaker And Emotion Recognition Using Deep Learning Models With Audio, Video And Biomedical Sensors, Farnaz Abtahi
Dissertations, Theses, and Capstone Projects
The focus of the thesis is on Deep Learning methods and their applications on multimodal data, with a potential to explore the associations between modalities and replace missing and corrupt ones if necessary. We have chosen two important real-world applications that need to deal with multimodal data: 1) Speaker recognition and identification; 2) Facial expression recognition and emotion detection.
The first part of our work assesses the effectiveness of speech-related sensory data modalities and their combinations in speaker recognition using deep learning models. First, the role of electromyography (EMG) is highlighted as a unique biometric sensor in improving audio-visual speaker …
Integrated Strategies For Sustainable Wastewater-Based Algal Biofuel Production And Environmental Mitigation In The Us, Javad Roostaei
Integrated Strategies For Sustainable Wastewater-Based Algal Biofuel Production And Environmental Mitigation In The Us, Javad Roostaei
Wayne State University Dissertations
Integration of algae cultivation with wastewater treatment has received increasing interest as a cost-effective strategy for biofuel production. However, there has been no full assessment of algal biofuel production with wastewater on macro-scale by taking into account wastewater resources, land availability, CO2 emission resources, and geographic variation. This research addressed and evaluated the use of wastewater for algae cultivation, in terms of modeling and laboratory experiments. The first goal of this research was to develop a spatially explicit lifecycle model, by integrating life cycle assessment (LCA), and Geographic Information Systems (GIS) analysis, for the evaluation of the environmental and economic …
Don't Take This Personally: Sentiment Analysis For Identification Of "Subtweeting" On Twitter, Noah L. Segal-Gould
Don't Take This Personally: Sentiment Analysis For Identification Of "Subtweeting" On Twitter, Noah L. Segal-Gould
Senior Projects Spring 2018
The purpose of this project is to identify subtweets. The Oxford English Dictionary defines "subtweet" as a "[Twitter post] that refers to a particular user without directly mentioning them, typically as a form of furtive mockery or criticism." This paper details a process for gathering a labeled ground truth dataset, training a classifier, and creating a Twitter bot which interacts with subtweets in real time. The Naive Bayes classifier trained in this project classifies tweets as subtweets and non-subtweets with an average F1 score of 72%.
A Framework To Understand Emoji Meaning: Similarity And Sense Disambiguation Of Emoji Using Emojinet, Sanjaya Wijeratne
A Framework To Understand Emoji Meaning: Similarity And Sense Disambiguation Of Emoji Using Emojinet, Sanjaya Wijeratne
Browse all Theses and Dissertations
Pictographs, commonly referred to as `emoji’, have become a popular way to enhance electronic communications. They are an important component of the language used in social media. With their introduction in the late 1990’s, emoji have been widely used to enhance the sentiment, emotion, and sarcasm expressed in social media messages. They are equally popular across many social media sites including Facebook, Instagram, and Twitter. In 2015, Instagram reported that nearly half of the photo comments posted on Instagram contain emoji, and in the same year, Twitter reported that the `face with tears of joy’ emoji has been tweeted 6.6 …
Tracking Topical Evolution In Large Document Collections, Sheikh Motahar Naim
Tracking Topical Evolution In Large Document Collections, Sheikh Motahar Naim
Open Access Theses & Dissertations
A large document collection that builds up over time usually contains a number of different themes. All of these themes or topics are not equally important at the same time. One topic might have high probabilities in some years due to some relevant events, and low probabilities in other years. Analyzing the evolution of such topics has useful applications in a variety of domains, for example, helping researchers to quickly see the changes of research topics in an area, assisting intelligence agents in tracking the activities of a terrorist group, or monitoring damages caused by a natural disaster. In this …
Novelty Detection Of Machinery Using A Non-Parametric Machine Learning Approach, Enrique Angola
Novelty Detection Of Machinery Using A Non-Parametric Machine Learning Approach, Enrique Angola
Graduate College Dissertations and Theses
A novelty detection algorithm inspired by human audio pattern recognition is conceptualized and experimentally tested. This anomaly detection technique can be used to monitor the health of a machine or could also be coupled with a current state of the art system to enhance its fault detection capabilities. Time-domain data obtained from a microphone is processed by applying a short-time FFT, which returns time-frequency patterns. Such patterns are fed to a machine learning algorithm, which is designed to detect novel signals and identify windows in the frequency domain where such novelties occur. The algorithm presented in this paper uses one-dimensional …
Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee
Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee
CCE Theses and Dissertations
Intrusion detection is the practice of examining information from computers and networks to identify cyberattacks. It is an important topic in practice, since the frequency and consequences of cyberattacks continues to increase and affect organizations. It is important for research, since many problems exist for intrusion detection systems. Intrusion detection systems monitor large volumes of data and frequently generate false positives. This results in additional effort for security analysts to review and interpret alerts. After long hours spent reviewing alerts, security analysts become fatigued and make bad decisions. There is currently no approach to intrusion detection that reduces the workload …
Machine Learning Methods For Septic Shock Prediction, Aiman A. Darwiche
Machine Learning Methods For Septic Shock Prediction, Aiman A. Darwiche
CCE Theses and Dissertations
Sepsis is an organ dysfunction life-threatening disease that is caused by a dysregulated body response to infection. Sepsis is difficult to detect at an early stage, and when not detected early, is difficult to treat and results in high mortality rates. Developing improved methods for identifying patients in high risk of suffering septic shock has been the focus of much research in recent years. Building on this body of literature, this dissertation develops an improved method for septic shock prediction. Using the data from the MMIC-III database, an ensemble classifier is trained to identify high-risk patients. A robust prediction model …
A Study Of Neural Networks For The Quantum Many-Body Problem, Liam B. Schramm
A Study Of Neural Networks For The Quantum Many-Body Problem, Liam B. Schramm
Senior Projects Spring 2018
One of the fundamental problems in analytically approaching the quantum many-body problem is that the amount of information needed to describe a quantum state. As the number of particles in a system grows, the amount of information needed for a full description of the system increases exponentially. A great deal of work then has gone into finding efficient approximate representations of these systems. Among the most popular techniques are Tensor Networks and Quantum Monte Carlo methods. However, one new method with a number of promising theoretical guarantees is the Neural Quantum State. This method is an adaptation of the Restricted …