Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (10)
- China Simulation Federation (5)
- University at Albany, State University of New York (3)
- Air Force Institute of Technology (2)
- California Polytechnic State University, San Luis Obispo (2)
-
- Florida International University (2)
- University of Louisville (2)
- University of Nebraska - Lincoln (2)
- University of New Mexico (2)
- University of South Carolina (2)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- Kennesaw State University (1)
- Marquette University (1)
- Missouri University of Science and Technology (1)
- Murray State University (1)
- New Jersey Institute of Technology (1)
- Old Dominion University (1)
- Portland State University (1)
- Santa Clara University (1)
- Technological University Dublin (1)
- Union College (1)
- University of Arkansas, Fayetteville (1)
- University of Connecticut (1)
- University of Kentucky (1)
- University of Pennsylvania Carey Law School (1)
- Western University (1)
- Wright State University (1)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (10)
- Journal of System Simulation (5)
- Legacy Theses & Dissertations (2009 - 2024) (3)
- Theses and Dissertations (3)
- Dissertations (2)
-
- FIU Electronic Theses and Dissertations (2)
- All Faculty Scholarship (1)
- Browse all Theses and Dissertations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer Science and Engineering (1)
- Computer Science and Software Engineering (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Electrical and Computer Engineering ETDs (1)
- Electrical and Computer Engineering Faculty Research and Publications (1)
- Electronic Theses and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Faculty & Staff Research and Creative Activity (1)
- Honors Scholar Theses (1)
- Honors Theses (1)
- Journal of International Technology and Information Management (1)
- MFA Thesis Exhibit Catalogs (1)
- Master of Science in Computer Science Theses (1)
- Master's Theses (1)
- Masters Theses (1)
- Publications (1)
- Publications and Research (1)
- The University of Louisville Journal of Respiratory Infections (1)
- Theses and Dissertations--Computer Science (1)
- Publication Type
Articles 1 - 30 of 50
Full-Text Articles in Engineering
Chaotic Time Series Prediction Based On Gaussian Processes Mixture, Zhenjie Feng, Fan Yu
Chaotic Time Series Prediction Based On Gaussian Processes Mixture, Zhenjie Feng, Fan Yu
Journal of System Simulation
Abstract: Aiming at the problem that the existing learning algorithms of Gaussian processes mixture (GPM) model, such as Markov Chain Monte Carlo (MCMC), variation or leave one out, have high computational complexity, a hidden variables posterior hard-cut iterative training algorithm is proposed, which simplifies the training process of the model. The GPM model based on the proposed algorithm is applied to chaotic time series prediction. The effects of embedding dimension, time delay, learning sample number, and testing sample numbers on predictive ability are discussed. It is demonstrated by the experimental results that the prediction of the GPM model is more …
Characteristic Index Digging Of Combat Sos Capability Based On Machine Learning, Yongli Yang, Xiaofeng Hu, Rong Ming, Xiaojing Yin, Wenxiang Wang
Characteristic Index Digging Of Combat Sos Capability Based On Machine Learning, Yongli Yang, Xiaofeng Hu, Rong Ming, Xiaojing Yin, Wenxiang Wang
Journal of System Simulation
Abstract: Aiming at the two difficulties in characteristic index digging of combat system of systems (CSoS), namely operation data generation and digging method selection, this paper proposes a new digging method, that is, using the simulation testbed to generate operation data, then adopting the machine learning to dig characteristic index. Two methods of characteristic index digging based on machine learning are researched: (1) the method based on network convergence, divides the communities for fundamental indexes based on their relationship, and obtains the characteristic indexes by principal component analysis (PCA); this method is applied to dig the characteristic indexes of …
Self-Driving Toy Car Using Deep Learning, Fahim Ahmed, Suleyman Turac, Mubtasem Ali
Self-Driving Toy Car Using Deep Learning, Fahim Ahmed, Suleyman Turac, Mubtasem Ali
Publications and Research
Our research focuses on building a student affordable platform for scale model self-driving cars. The goal of this project is to explore current developments of Open Source hardware and software to build a low-cost platform consisting of the car chassis/framework, sensors, and software for the autopilot. Our research will allow other students with low budget to enter into the world of Deep Learning, self-driving cars, and autonomous cars racing competitions.
Pixel-Level Deep Multi-Dimensional Embeddings For Homogeneous Multiple Object Tracking, Mateusz Mittek
Pixel-Level Deep Multi-Dimensional Embeddings For Homogeneous Multiple Object Tracking, Mateusz Mittek
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
The goal of Multiple Object Tracking (MOT) is to locate multiple objects and keep track of their individual identities and trajectories given a sequence of (video) frames. A popular approach to MOT is tracking by detection consisting of two processing components: detection (identification of objects of interest in individual frames) and data association (connecting data from multiple frames). This work addresses the detection component by introducing a method based on semantic instance segmentation, i.e., assigning labels to all visible pixels such that they are unique among different instances. Modern tracking methods often built around Convolutional Neural Networks (CNNs) and additional, …
Domain Adaptation In Unmanned Aerial Vehicles Landing Using Reinforcement Learning, Pedro Lucas Franca Albuquerque
Domain Adaptation In Unmanned Aerial Vehicles Landing Using Reinforcement Learning, Pedro Lucas Franca Albuquerque
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Landing an unmanned aerial vehicle (UAV) on a moving platform is a challenging task that often requires exact models of the UAV dynamics, platform characteristics, and environmental conditions. In this thesis, we present and investigate three different machine learning approaches with varying levels of domain knowledge: dynamics randomization, universal policy with system identification, and reinforcement learning with no parameter variation. We first train the policies in simulation, then perform experiments both in simulation, making variations of the system dynamics with wind and friction coefficient, then perform experiments in a real robot system with wind variation. We initially expected that providing …
Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan
Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan
FIU Electronic Theses and Dissertations
Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.
Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …
Using Uncertainty To Interpret Supervised Machine Learning Predictions, Michael C. Darling
Using Uncertainty To Interpret Supervised Machine Learning Predictions, Michael C. Darling
Electrical and Computer Engineering ETDs
Traditionally, machine learning models are assessed using methods that estimate an average performance against samples drawn from a particular distribution. Examples include the use of cross-validation or hold0out to estimate classification error, F-score, precision, and recall.
While these measures provide valuable information, they do not tell us a model's certainty relative to particular regions of the input space. Typically there are regions where the model can differentiate the classes with certainty, and regions where the model is much less certain about its predictions.
In this dissertation we explore numerous approaches for quantifying uncertainty in the individual predictions made by supervised …
Development Of A National-Scale Big Data Analytics Pipeline To Study The Potential Impacts Of Flooding On Critical Infrastructures And Communities, Nattapon Donratanapat
Development Of A National-Scale Big Data Analytics Pipeline To Study The Potential Impacts Of Flooding On Critical Infrastructures And Communities, Nattapon Donratanapat
Theses and Dissertations
With the rapid development of the Internet of Things (IoT) and Big data infrastructure, crowdsourcing techniques have emerged to facilitate data processing and problem solving particularly for flood emergences purposes. A Flood Analytics Information System (FAIS) has been developed as a Python Web application to gather Big data from multiple servers and analyze flooding impacts during historical and real-time events. The application is smartly designed to integrate crowd intelligence, machine learning (ML), and natural language processing of tweets to provide flood warning with the aim to improve situational awareness for flood risk management and decision making. FAIS allows the user …
Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu
Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu
Dissertations
Recently, some researchers have attempted to find a relationship between the evolution of rare events and temporal-spatial patterns of social media activities. Their studies verify that the relationship exists in both time and spatial domains. However, few of those studies can accurately deduce a time point when social media activities are most highly affected by a rare event because producing an accurate temporal pattern of social media during the evolution of a rare event is very difficult. This work expands the current studies along three directions. Firstly, we focus on the intensity of information volume and propose an innovative clustering …
Asap: A Source Code Authorship Program, Matthew F. Tennyson Phd
Asap: A Source Code Authorship Program, Matthew F. Tennyson Phd
Faculty & Staff Research and Creative Activity
Source code authorship attribution is the task of determining who wrote a computer program, based on its source code, usually when the author is either unknown or under dispute. Areas where this can be applied include software forensics, cases of software copyright infringement, and detecting plagiarism. Numerous methods of source code authorship attribution have been proposed and studied. However, there are no known easily accessible and user-friendly programs that perform this task. Instead, researchers typically develop software in an ad hoc manner for use in their studies, and the software is rarely made publicly available. In this paper, we present …
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
Electronic Theses and Dissertations
Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less …
Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che
Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che
Journal of International Technology and Information Management
In this paper, we outline how recruiting and talent acquisition gained importance within HRM field, then give a brief introduction to the newest tools used by the professionals for recruiting and lastly, describe the Artificial Intelligence-based tools that have started playing an increasingly important role. We also provide further research suggestions for using artificial intelligence-based tools to make recruiting more efficient and cost-effective.
A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney
A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney
FIU Electronic Theses and Dissertations
Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo
Electronic Thesis and Dissertation Repository
The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …
Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang
Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang
Computer Science and Engineering
The dimension reduction of large scale high-dimensional data is a challenging task, especially the dimension reduction of face data and the accuracy increment of face recognition in the large scale face recognition system, which may cause large storage space and long recognition time. In order to further reduce the recognition time and the storage space in the large scale face recognition systems, on the basis of the general non-negative matrix factorization based on left semi-tensor (GNMFL) without dimension matching constraints proposed in our previous work, we propose a sparse GNMFL/L (SGNMFL/L) to decompose a large number of face data sets …
Gold Tree Solar Farm - Machine Learning To Predict Solar Power Generation, Jonathon T. Scott
Gold Tree Solar Farm - Machine Learning To Predict Solar Power Generation, Jonathon T. Scott
Computer Science and Software Engineering
Solar energy causes a strain on the electrical grid because of the uncontrollable nature of the factors that affect power generation. Utilities are often required to balance solar generation facilities to meet consumer demand, which often includes the costly process of activating/deactivating a fossil fuel facility. Therefore, there is considerable interest in increasing the accuracy and the granularity of solar power generation predictions in order to reduce the cost of grid management. This project aims to evaluate how sky imaging technology may contribute to the accuracy of those predictions.
Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji
Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji
Honors Theses
Soft robotics is an emerging field of research due to its potential to explore and operate in unstructured, rugged, and dynamic environments. However, the properties that make soft robots compelling also make them difficult to robustly control. Here at Union, we developed the world’s first wireless soft tensegrity robot. The goal of my thesis is to explore effective and efficient methods to explore the diverse behavior our tensegrity robot. We will achieve that by applying state-of-art machine learning technique and a novelty search algorithm.
Robot Navigation In Cluttered Environments With Deep Reinforcement Learning, Ryan Weideman
Robot Navigation In Cluttered Environments With Deep Reinforcement Learning, Ryan Weideman
Master's Theses
The application of robotics in cluttered and dynamic environments provides a wealth of challenges. This thesis proposes a deep reinforcement learning based system that determines collision free navigation robot velocities directly from a sequence of depth images and a desired direction of travel. The system is designed such that a real robot could be placed in an unmapped, cluttered environment and be able to navigate in a desired direction with no prior knowledge. Deep Q-learning, coupled with the innovations of double Q-learning and dueling Q-networks, is applied. Two modifications of this architecture are presented to incorporate direction heading information that …
Depressiongnn: Depression Prediction Using Graph Neural Network On Smartphone And Wearable Sensors, Param Bidja
Depressiongnn: Depression Prediction Using Graph Neural Network On Smartphone And Wearable Sensors, Param Bidja
Honors Scholar Theses
Depression prediction is a complicated classification problem because depression diagnosis involves many different social, physical, and mental signals. Traditional classification algorithms can only reach an accuracy of no more than 70% given the complexities of depression. However, a novel approach using Graph Neural Networks (GNN) can be used to reach over 80% accuracy, if a graph can represent the depression data set to capture differentiating features. Building such a graph requires 1) the definition of node features, which must be highly correlated with depression, and 2) the definition for edge metrics, which must also be highly correlated with depression. In …
Identifying Fake News Using Emotion Analysis, Brady Gilleran
Identifying Fake News Using Emotion Analysis, Brady Gilleran
Computer Science and Computer Engineering Undergraduate Honors Theses
This paper presents research applying Emotional Analysis to “Fake News” and “Real News” articles to investigate whether or not there is a difference in the emotion used in these two types of news articles. The paper reports on a dataset for Fake and Real News that we created, and the natural language processing techniques employed to process the collected text. We use a lexicon that includes predefined words for eight emotions (anger, anticipation, disgust, fear, surprise, sadness, joy, trust) to measure the emotional impact in each of these eight dimensions. The results of the emotion analysis are used as features …
Machine Learning Models Of C-17 Specific Range Using Flight Recorder Data, Marcus Catchpole
Machine Learning Models Of C-17 Specific Range Using Flight Recorder Data, Marcus Catchpole
Theses and Dissertations
Fuel is a significant expense for the Air Force. The C-17 Globemaster eet accounts for a significant portion. Estimating the range of an aircraft based on its fuel consumption is nearly as old as flight itself. Consideration of operational energy and the related consideration of fuel efficiency is increasing. Meanwhile machine learning and data-mining techniques are on the rise. The old question, "How far can my aircraft y with a given load cargo and fuel?" has given way to "How little fuel can I load into an aircraft and safely arrive at the destination?" Specific range is a measure of …
Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano
Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano
Theses and Dissertations
Cyber defense analysts face the challenge of validating machine generated alerts regarding network-based security threats. Operations tempo and systematic manpower issues have increased the importance of these individual analyst decisions, since they typically are not reviewed or changed. Analysts may not always be confident in their decisions. If confidence can be accurately assessed, then analyst decisions made under low confidence can be independently reviewed and analysts can be offered decision assistance or additional training. This work investigates the utility of using neurophysiological and behavioral correlates of decision confidence to train machine learning models to infer confidence in analyst decisions. Electroencephalography …
Recipe For Disaster, Zac Travis
Recipe For Disaster, Zac Travis
MFA Thesis Exhibit Catalogs
Today’s rapid advances in algorithmic processes are creating and generating predictions through common applications, including speech recognition, natural language (text) generation, search engine prediction, social media personalization, and product recommendations. These algorithmic processes rapidly sort through streams of computational calculations and personal digital footprints to predict, make decisions, translate, and attempt to mimic human cognitive function as closely as possible. This is known as machine learning.
The project Recipe for Disaster was developed by exploring automation in technology, specifically through the use of machine learning and recurrent neural networks. These algorithmic models feed on large amounts of data as a …
American Sign Language Recognition Using Machine Learning And Computer Vision, Kshitij Bantupalli, Ying Xie
American Sign Language Recognition Using Machine Learning And Computer Vision, Kshitij Bantupalli, Ying Xie
Master of Science in Computer Science Theses
Speech impairment is a disability which affects an individual’s ability to communicate using speech and hearing. People who are affected by this use other media of communication such as sign language. Although sign language is ubiquitous in recent times, there remains a challenge for non-sign language speakers to communicate with sign language speakers or signers. With recent advances in deep learning and computer vision there has been promising progress in the fields of motion and gesture recognition using deep learning and computer vision-based techniques. The focus of this work is to create a vision-based application which offers sign language translation …
Clinical Research In Pneumonia: Role Of Artificial Intelligence, Timothy L. Wiemken, Robert R. Kelley, William A. Mattingly, Julio A. Ramirez
Clinical Research In Pneumonia: Role Of Artificial Intelligence, Timothy L. Wiemken, Robert R. Kelley, William A. Mattingly, Julio A. Ramirez
The University of Louisville Journal of Respiratory Infections
No abstract provided.
Intelligent Diagnosis Of Aircraft Electrical Faults Based On Rmbp Neural Network, Lishan Jia, Zhe Liu, Sun Yi
Intelligent Diagnosis Of Aircraft Electrical Faults Based On Rmbp Neural Network, Lishan Jia, Zhe Liu, Sun Yi
Journal of System Simulation
Abstract: To the characteristics of multiple properties, hard to remove and high cost of time and manpower of aircraft electrical faults maintenance in aircraft maintenance of civil aviation, construction of intelligent aircraft electrical faults diagnosis system using RMBP neural network is proposed. RMBP algorithm is used to study sample data in the intelligent faults diagnosis system as it can overcome the faults of long time of convergence and easy to go into local minima of common BP algorithm, and is suitable for training large-scale neural network,. Experience data are collected, samples are made, samples training and experiment are carried out. …
Research Of Nonlinear Time Series Prediction Method For Motion Capture, Tianyu Huang, Yunying Guo
Research Of Nonlinear Time Series Prediction Method For Motion Capture, Tianyu Huang, Yunying Guo
Journal of System Simulation
Abstract: In this paper, we study the nonlinear time series prediction method for action capture. A prediction method based on the capture data is studied and implemented by analyzing human motion data to solve the data loss and correction problem caused by sensor failure. Based on this research purpose, the simulation experiment assumes that a sensor in the sequence of actions fails, then uses eight kinds of machine learning methods, and evaluates them with six indexes. The prediction results of different methods are compared and the predicted motions are visualized. Through the experiments, data prediction accuracy by random forest, decision …
Optimizing Control Of Total Heat Supply Based On Machine Learning, Li Qi, Xingqi Hu, Jianmin Zhao
Optimizing Control Of Total Heat Supply Based On Machine Learning, Li Qi, Xingqi Hu, Jianmin Zhao
Journal of System Simulation
Abstract: The central heating system has complex structure, along with the characteristics of hysteresis, strong coupling and nonlinear. Contraposing the problem that the process is difficult to be identified and controlled by the mechanism modeling, an optimal control method of heat source total heat production based on machine learning is proposed. The heat source model of central heating system is established by BP neural network and long short-term memory neural network. Under the premise of meeting the demand of heating quality, with the total energy consumption as the optimization objective, the optimal control sequence of water supply temperature and water …
Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods
Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods
Undergraduate Research & Mentoring Program
In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the evaluation of …
Analyzing Twitter Feeds To Facilitate Crises Informatics And Disaster Response During Mass Emergencies, Arshdeep Kaur
Analyzing Twitter Feeds To Facilitate Crises Informatics And Disaster Response During Mass Emergencies, Arshdeep Kaur
Dissertations
It is a common practice these days for general public to use various micro-blogging platforms, predominantly Twitter, to share ideas, opinions and information about things and life. Twitter is also being increasingly used as a popular source of information sharing during natural disasters and mass emergencies to update and communicate the extent of the geographic phenomena, report the affected population and casualties, request or provide volunteering services and to share the status of disaster recovery process initiated by humanitarian-aid and disaster-management organizations. Recent research in this area has affirmed the potential use of such social media data for various disaster …