A Deep Recurrent Neural Network With Iterative Optimization For Inverse Image Processing Applications, 2021 University of Wisconsin-Milwaukee
A Deep Recurrent Neural Network With Iterative Optimization For Inverse Image Processing Applications, Masaki Ikuta
Theses and Dissertations
Many algorithms and methods have been proposed for inverse image processing applications, such as super-resolution, image de-noising, and image reconstruction, particularly with the recent surge of interest in machine learning and deep learning methods.
As for Computed Tomography (CT) image reconstruction, the most recently proposed methods are limited to image domain processing, where deep learning is used to learn the mapping between a true image data set and a noisy image data set in the image domain. While deep learning-based methods can produce higher quality images than conventional model-based algorithms, these methods have a limitation. Deep learning-based methods used in …
Component Damage Source Identification For Critical Infrastructure Systems, 2021 University of Arkansas, Fayetteville
Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis
Graduate Theses and Dissertations
Cyber-Physical Systems (CPS) are becoming increasingly prevalent for both Critical Infrastructure and the Industry 4.0 initiative. Bad values within components of the software portion of CPS, or the computer systems, have the potential to cause major damage if left unchecked, and so detection and locating of where these occur is vital. We further define features of these computer systems and create a use-based system topology. We then introduce a function to monitor system integrity and the presence of bad values as well as an algorithm to locate them. We then show an improved version, taking advantage of several system properties …
Privacy-Aware And Hardware-Based Accleration Authentication Scheme For Internet Of Drones, 2021 The University of Southern Mississippi
Privacy-Aware And Hardware-Based Accleration Authentication Scheme For Internet Of Drones, Tom Henson
Master's Theses
Drones are becoming increasingly present into today’s society through many different means such as outdoor sports, surveillance, delivery of goods etc. With such a rapid increase, a means of control and monitoring is needed as the drones become more interconnected and readily available. Thus, the idea of Internet of drones (IoD) is formed, an infrastructure in place to do those types of things. However, without an authentication system in place anyone could gain access or control to real time data to multiple drones within an area. This is a problem that I choose to tackle using a Field Programmable Gate …
An Analysis Of Significant Cyber Incidents And The Impact On The Past, Present, And Future, 2021 Old Dominion University
An Analysis Of Significant Cyber Incidents And The Impact On The Past, Present, And Future, Seth E. Smith
Cybersecurity Undergraduate Research Showcase
This report discusses data collected on significant cybersecurity incidents from the early 2000s to present. The first part of the report addresses previously discussed information, data, and literature (e.g. case studies), pertinent to cybersecurity incidents. The findings from this study are framed by scholarly sources and information from the Federal Bureau of Investigation, a number of notable universities, and literature online, of which all support information discussed within this report. The second part of the report discusses data compiled upon analyzing significant cyber incidents and events from the Center for Strategic and International Affairs (CSIS). Finally, the last portion of …
Material Handling With Embodied Loco-Manipulation, 2021 University of Nevada, Las Vegas
Material Handling With Embodied Loco-Manipulation, Jean Chagas Vaz
UNLV Theses, Dissertations, Professional Papers, and Capstones
Material handling is an intrinsic component of disaster response. Typically, first responders, such as firefighters and/or paramedics, must carry, push, pull, and handle objects, facilitating the transportation of goods. For many years, researchers from around the globe have sought to enable full-sized humanoid robots to perform such essential material handling tasks. This work aims to tackle current limitations of humanoids in the realm of interaction with common objects such as carts, wheelbarrows, etc. Throughout this research, many methods will be applied to ensure a stable Zero Moment Point (ZMP) trajectory to allow a robust gait while loco-manipulating a cart. The …
Machine Learning Analysis Of Single Nucleotide Polymorphism (Snp) Data To Predict Bone Mineral Density In African American Women, 2021 University of Nevada, Las Vegas
Machine Learning Analysis Of Single Nucleotide Polymorphism (Snp) Data To Predict Bone Mineral Density In African American Women, Erick Githua Wakayu
UNLV Theses, Dissertations, Professional Papers, and Capstones
Osteoporosis is a debilitating disease in which an individual’s bones weaken, making bones fragile and more susceptible to fracture. While commonly found amongst postmenopausal Caucasian and Asian women based on previous studies, those of African descent (African American/Black) have largely been ignored when it comes to osteoporotic studies, especially when it comes to Genome Wide Association Studies (GWAS). From GWA studies, we gain access to single nucleotide poly-morphisms (SNPs) that may contribute to certain illnesses, such as osteoporosis. With low Bone Mineral Density (BMD) being one of the primary markers of potential osteoporosis, it is prudent that proper research is …
Electronic Evidence Locker: An Ontology For Electronic Evidence, 2021 East Tennessee State University
Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith
Electronic Theses and Dissertations
With the rapid growth of crime data, overwhelming amounts of electronic evidence need to be stored and shared with the relevant agencies. Without addressing this challenge, the sharing of crime data and electronic evidence will be highly inefficient, and the resource requirements for this task will continue to increase. Relational database solutions face size limitations in storing larger amounts of crime data where each instance has unique attributes with unstructured nature.
In this thesis, the Electronic Evidence Locker (EEL) was proposed and developed to address such problems. The EEL was built using a NoSQL database and a C# website for …
Integration Of Information Technology Certifications Into Undergraduate Computing Curriculum, 2021 Singapore Management University
Integration Of Information Technology Certifications Into Undergraduate Computing Curriculum, Eng Lieh Ouh, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
This innovative practice full paper describes our experiences of integrating information technology certifications into an undergraduate computing curriculum. As the technology landscape evolves, a common challenge for educators in computing programs is designing an industry-relevant curriculum. Over the years, industry practitioners have taken technology certifications to validate themselves against a base level of technical knowledge currently in demand in industry. Information technology (IT) certifications can also offer paths for academic computing programs to stay relevant to industry needs. However, identifying relevant IT certifications and integrating it into an academic curriculum requires a careful design approach as substantial efforts are needed …
On Analysing Student Resilience In Higher Education Programs Using A Data-Driven Approach, 2021 Singapore Management University
On Analysing Student Resilience In Higher Education Programs Using A Data-Driven Approach, Audrey Tedja Widjaja, Ee-Peng Lim, Aldy Gunawan
Research Collection School Of Computing and Information Systems
Analysing student resilience is important as research has shown that resilience is related to students’ academic performance and their persistence through academic setbacks. While questionnaires can be conducted to assess student resilience directly, they suffer from human recall errors and deliberate suppression of true responses. In this paper, we propose ACREA, ACademic REsilience Analytics framework which adopts a data-driven approach to analyse student resilient behavior with the use of student-course data. ACREA defines academic setbacks experienced by students and measures how well students overcome such setbacks using a quasi-experimental design. By applying ACREA on a real world student-course dataset, we …
Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, 2021 Zayed University
Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’Raj, Maysam F. Abbod, Munir Majdalawieh
All Works
With the rapid growth of consumer credit and the huge amount of financial data developing effective credit scoring models is very crucial. Researchers have developed complex credit scoring models using statistical and artificial intelligence (AI) techniques to help banks and financial institutions to support their financial decisions. Neural networks are considered as a mostly wide used technique in finance and business applications. Thus, the main aim of this paper is to help bank management in scoring credit card clients using machine learning by modelling and predicting the consumer behaviour with respect to two aspects: the probability of single and consecutive …
Hybrid Feature Selection Approach To Identify Optimal Features Of Profile Metadata To Detect Social Bots In Twitter, 2021 United Arab Emirates University
Hybrid Feature Selection Approach To Identify Optimal Features Of Profile Metadata To Detect Social Bots In Twitter, Eiman Alothali, Kadhim Hayawi, Hany Alashwal
All Works
The last few years have revealed that social bots in social networks have become more sophisticated in design as they adapt their features to avoid detection systems. The deceptive nature of bots to mimic human users is due to the advancement of artificial intelligence and chatbots, where these bots learn and adjust very quickly. Therefore, finding the optimal features needed to detect them is an area for further investigation. In this paper, we propose a hybrid feature selection (FS) method to evaluate profile metadata features to find these optimal features, which are evaluated using random forest, naïve Bayes, support vector …
Estimation And Interpretation Of Machine Learning Models With Customized Surrogate Model, 2021 COMSATS University Islamabad
Estimation And Interpretation Of Machine Learning Models With Customized Surrogate Model, Mudabbir Ali, Asad Masood Khattak, Zain Ali, Bashir Hayat, Muhammad Idrees, Zeeshan Pervez, Kashif Rizwan, Tae Eung Sung, Ki Il Kim
All Works
Machine learning has the potential to predict unseen data and thus improve the productivity and processes of daily life activities. Notwithstanding its adaptiveness, several sensitive applications based on such technology cannot compromise our trust in them; thus, highly accurate machine learning models require reason. Such models are black boxes for end-users. Therefore, the concept of interpretability plays the role if assisting users in a couple of ways. Interpretable models are models that possess the quality of explaining predictions. Different strategies have been proposed for the aforementioned concept but some of these require an excessive amount of effort, lack generalization, are …
Neurolkh: Combining Deep Learning Model With Lin-Kernighan-Helsgaun Heuristic For Solving The Traveling Salesman Problem, 2021 Singapore Management University
Neurolkh: Combining Deep Learning Model With Lin-Kernighan-Helsgaun Heuristic For Solving The Traveling Salesman Problem, Liang Xin, Wen Song, Zhiguang Cao, Jie Zhang
Research Collection School Of Computing and Information Systems
We present NeuroLKH, a novel algorithm that combines deep learning with the strong traditional heuristic Lin-Kernighan-Helsgaun (LKH) for solving Traveling Salesman Problem. Specifically, we train a Sparse Graph Network (SGN) with supervised learning for edge scores and unsupervised learning for node penalties, both of which are critical for improving the performance of LKH. Based on the output of SGN, NeuroLKH creates the edge candidate set and transforms edge distances to guide the searching process of LKH. Extensive experiments firmly demonstrate that, by training one model on a wide range of problem sizes, NeuroLKH significantly outperforms LKH and generalizes well to …
Learning To Iteratively Solve Routing Problems With Dual-Aspect Collaborative Transformer, 2021 Singapore Management University
Learning To Iteratively Solve Routing Problems With Dual-Aspect Collaborative Transformer, Yining Ma, Jingwen Li, Zhiguang Cao, Wen Song, Le Zhang, Zhenghua Chen, Jing Tang
Research Collection School Of Computing and Information Systems
Recently, Transformer has become a prevailing deep architecture for solving vehicle routing problems (VRPs). However, it is less effective in learning improvement models for VRP because its positional encoding (PE) method is not suitable in representing VRP solutions. This paper presents a novel Dual-Aspect Collaborative Transformer (DACT) to learn embeddings for the node and positional features separately, instead of fusing them together as done in existing ones, so as to avoid potential noises and incompatible correlations. Moreover, the positional features are embedded through a novel cyclic positional encoding (CPE) method to allow Transformer to effectively capture the circularity and symmetry …
Fair And Diverse Group Formation Based On Multidimensional Features, 2021 University of Arkansas, Fayetteville
Fair And Diverse Group Formation Based On Multidimensional Features, Mohammed Saad A Alqahtani
Graduate Theses and Dissertations
The goal of group formation is to build a team to accomplish a specific task. Algorithms are being developed to improve the team's effectiveness so formed and the efficiency of the group selection process. However, there is concern that team formation algorithms could be biased against minorities due to the algorithms themselves or the data on which they are trained. Hence, it is essential to build fair team formation systems that incorporate demographic information into the process of building the group. Although there has been extensive work on modeling individuals’ expertise for expert recommendation and/or team formation, there has been …
Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, 2021 University of Nebraska-Lincoln
Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Power systems are getting more complex than ever and are consequently operating close to their limit of stability. Moreover, with the increasing demand of renewable wind generation, and the requirement to maintain a secure power system, the importance of transient stability cannot be overestimated. Considering its significance in power system security, it is important to propose a different approach for enhancing the transient stability, considering uncertainties. Current deterministic industry practices of transient stability assessment ignore the probabilistic nature of variables (fault type, fault location, fault clearing time, etc.). These approaches typically provide a conservative criterion and can result in expensive …
Comparative Analysis Of Kmer Counting And Estimation Tools, 2021 University of Nebraska - Lincoln
Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The rapid development of next-generation sequencing (NGS) technologies for determining the sequence of DNA has revolutionized genome research in recent years. De novo assemblers are the most commonly used tools to perform genome assembly. Most of the assemblers use de Bruijn graphs that break the sequenced reads into smaller sequences (sub-strings), called kmers, where k denotes the length of the sub-strings. The kmer counting and analysis of kmer frequency distribution are important in genome assembly. The main goal of this research is to provide a detailed analysis of the performance of different kmer counting and estimation tools that are currently …
Agent Based Modeling Of The Spread Of Social Unrest Based On Infectious Disease Spread Model, 2021 University of Nebraska-Lincoln
Agent Based Modeling Of The Spread Of Social Unrest Based On Infectious Disease Spread Model, Anup Adhikari
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Social unrest activities are the tools for people to show dissatisfaction, and often people are motivated by similar unrest activities in another region. This causes a spread of unrest activities across space and time. In this thesis, we model the spread of social unrest across time and space. The underlying novel methodology is to model the regions as agents that transition from one state to another based on changes in their environment. The methodology involves (1) creating a region vector for each agent based on socio-demographic, cultural, economic, infrastructural, geographic, and environmental (SCEIGE) factors, (2) formulating neighborhood distance function to …
Explainable Transfer-Learning And Knowledge Distillation For Fast And Accurate Head-Pose Estimation, 2021 Florida Institute of Technology
Explainable Transfer-Learning And Knowledge Distillation For Fast And Accurate Head-Pose Estimation, Nima Aghli
Theses and Dissertations
Head-pose estimation from facial images is an important research topic in computer-vision. It has many applications in detecting the focus of attention, monitoring driver behavior, and human-computer interaction. As with other computer-vision topics, recent research on head-pose estimation has been focused on using deep convolutional neural networks (CNNs). Although deeper networks improve prediction accuracy, they suffer from dependency on expensive hardware such as GPUs to perform real-time inference. As a result, CNN model compression becomes an important concept. In this work, we propose a novel CNN compression method by combing weight pruning and knowledge distillation. Additionally, we improve the state-of-the-art …
An Assessment Of Image-Cloaking Techniques Against Automated Face Recognition For Biometric Privacy, 2021 Florida Institute of Technology
An Assessment Of Image-Cloaking Techniques Against Automated Face Recognition For Biometric Privacy, Brandon Scott Ledford
Theses and Dissertations
Over the past two decades, Americans have aggressively increased the amount of facial data uploaded to the internet primarily via social media. This data is largely unprotected due to the dire lack of existing regulations protecting users from large scale face recognition in the United States, where the value of data trade is in the tens of billions. In its current state, facial privacy in the United States depends on American corporations opting not to collect the public data, an option rarely chosen. Much research has been done in the area of suppressing recognition abilities, giving users the ability to …