Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Auto-regressive process (1)
- Avatar Animation (1)
- Beatuty Understanding (1)
- Beautification (1)
- Biomarker Discovery (1)
-
- Blockchain (1)
- Boolean Implication Networks (1)
- Burg estimation method (1)
- Cryptocurrency (1)
- Data Driven (1)
- Drug Repositioning (1)
- Effort Prediction (1)
- Face Recognition (1)
- Gender Swap (1)
- Generalized likelihood ratio test (1)
- Generative Adversarial Networks (GANs) (1)
- Graph Theory (1)
- Helium (1)
- High-Fidelity (1)
- Image Editing (1)
- Implementation (1)
- Incentives Analysis (1)
- Issue Tracking System (1)
- Java (1)
- Machine Learning (1)
- Morph Attacks (1)
- Morph Generation (1)
- Multi-Omics (1)
- NFTs (1)
- Non-Small Cell Lung Cancer (NSCLC) (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye
A Novel Computational Network Methodology For Discovery Of Biomarkers And Therapeutic Targets, Qing Ye
Graduate Theses, Dissertations, and Problem Reports
Lung cancer has the second highest cancer incidence rate and the top cancer-related mortality worldwide. An estimate from the American Cancer Society shows that, in 2022, there will be about 236,740 lung cancer cases (117,910 men and 118,830 women) in the US. To date, there are no prognostic/predictive biomarkers to select chemotherapy, immunotherapy, and radiotherapy in individual non-small cell lung cancer (NSCLC) patients. There is an unmet clinical need to identify patients with early-stage NSCLC who are likely to develop recurrence and to predict their therapeutic responses. This dissertation developed a novel computational methodology for modeling molecular gene association networks …
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Graduate Theses, Dissertations, and Problem Reports
Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
Graduate Theses, Dissertations, and Problem Reports
An active research topic is the detection of various oscillations that may lead to instability and potential disruption in the operation of a power network. Forced Oscillations (FOs) play a unique role in power system stability among various oscillations. They are perturbances that change the system’s state and are caused for many reasons, including but not limited to persistent load changes and oscillatory load or generation, fault, triplane, and other mechanical anomalies. These factors can hugely affect the power grid by either increasing or decreasing the amplitude, causing corrupt modes leading to blackouts, affecting the equipment involved, delivering poor power …
Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu
Face Representation Learning And Its Applications: From Image Editing To 3d Avatar Animation, Xudong Liu
Graduate Theses, Dissertations, and Problem Reports
Face representation learning is one of the most popular research topics in the computer vision community, as it is the foundation of face recognition and face image generation. Numerous representation learning frameworks have been integrated into applications in daily life, such as face recognition, image editing, and face tracking. Researchers have developed advanced algorithms for face recognition with successful commercial productions, for example, FaceID on the smartphone. The performance record on face recognition is constantly updated and becoming saturated with the help of large-scale datasets and advanced computational resources. Thanks to the robust representation in face recognition, in this dissertation, …
Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy
Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy
Graduate Theses, Dissertations, and Problem Reports
Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.
This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …