Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Engineering

Triphlapan: Predicting Hla Molecules Binding Peptides Based On Triple Coding Matrix And Transfer Learning, Meng Wang, Chuqi Lei, Jianxin Wang, Yaohang Li, Min Li Jan 2024

Triphlapan: Predicting Hla Molecules Binding Peptides Based On Triple Coding Matrix And Transfer Learning, Meng Wang, Chuqi Lei, Jianxin Wang, Yaohang Li, Min Li

Computer Science Faculty Publications

Human leukocyte antigen (HLA) recognizes foreign threats and triggers immune responses by presenting peptides to T cells. Computationally modeling the binding patterns between peptide and HLA is very important for the development of tumor vaccines. However, it is still a big challenge to accurately predict HLA molecules binding peptides. In this paper, we develop a new model TripHLApan for predicting HLA molecules binding peptides by integrating triple coding matrix, BiGRU + Attention models, and transfer learning strategy. We have found the main interaction site regions between HLA molecules and peptides, as well as the correlation between HLA encoding and binding …


Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong Jan 2024

Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong

School of Cybersecurity Faculty Publications

Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, including the pervasive use of cyber-physical systems to increase efficiency, reduce waste, and increase responsiveness. A new domain that intersects supply chain management and cybersecurity emerges as many processes as possible of the enterprise require the convergence and synchronizing of resources and information flows in data-driven environments to support planning and execution activities. Protecting the information becomes imperative as big data flows must be parsed and translated into actions …


A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari Jan 2024

A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari

Computer Science Faculty Publications

Large deep learning models are impressive, but they struggle when real-time data is not available. Few-shot class-incremental learning (FSCIL) poses a significant challenge for deep neural networks to learn new tasks from just a few labeled samples without forgetting the previously learned ones. This setup can easily leads to catastrophic forgetting and overfitting problems, severely affecting model performance. Studying FSCIL helps overcome deep learning model limitations on data volume and acquisition time, while improving practicality and adaptability of machine learning models. This paper provides a comprehensive survey on FSCIL. Unlike previous surveys, we aim to synthesize few-shot learning and incremental …


Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …


Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty Jan 2023

Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty

VMASC Publications

Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and …


Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal Jan 2023

Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal

Mechanical & Aerospace Engineering Faculty Publications

This paper expands the authors’ prior work[1], which focuses on developing a convolutional neural network (CNN) model capable of mapping time-averaged, unsteady Reynold’s-averaged Navier-Stokes (URANS) simulations to higher resolution results informed by time-averaged detached eddy simulations (DES). The authors present improvements over the prior CNN autoencoder model that result from hyperparameter optimization, increased data set augmentation through the adoption of a patch-wise training approach, and the predictions of primitive variables rather than vorticity magnitude. The training of the CNN model developed in this study uses the same URANS and DES simulations of a transonic flow around several NACA 4-digit airfoils …


Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur Jan 2023

Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur

Mechanical & Aerospace Engineering Faculty Publications

The present paper culminates several investigations into the use of convolutional neural networks (CNNs) as a post-processing step to improve the accuracy of unsteady Reynolds-averaged Navier–Stokes (URANS) simulations for subsonic flows over airfoils at low angles of attack. Time-averaged detached eddy simulation (DES)-generated flow fields serve as the target data for creating and training CNN models. CNN post-processing generates flow-field data comparable to DES resolution, but after using only URANS-level resources and properly training CNN models. This document outlines the underlying theory and progress toward the goal of improving URANS simulations by looking at flow predictions for a class of …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette Jan 2023

Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette

Electrical & Computer Engineering Faculty Publications

Real-time fall detection using a wearable sensor remains a challenging problem due to high gait variability. Furthermore, finding the type of sensor to use and the optimal location of the sensors are also essential factors for real-time fall-detection systems. This work presents real-time fall-detection methods using deep learning models. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. First, we developed and compared different data-segmentation techniques for sliding windows. Next, we implemented various techniques to balance the datasets because collecting fall datasets in the real-time setting has …


Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.) Jan 2023

Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.)

Electrical & Computer Engineering Faculty Publications

This work is a review and extension of our ongoing research in human recognition analysis using multimodality motion sensor data. We review our work on hand crafted feature engineering for motion capture skeleton (MoCap) data, from the Air Force Research Lab for human gender followed by depth scan based skeleton extraction using LIDAR data from the Army Night Vision Lab for person identification. We then build on these works to demonstrate a transfer learning sensor fusion approach for using the larger MoCap and smaller LIDAR data for gender classification.


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Opioid Use Disorder Prediction Using Machine Learning Of Fmri Data, A. Temtam, Liangsuo Ma, F. Gerard Moeller, M. S. Sadique, K. M. Iftekharuddin, Khan M. Iftekharuddin (Ed.), Weijie Chen (Ed.) Jan 2023

Opioid Use Disorder Prediction Using Machine Learning Of Fmri Data, A. Temtam, Liangsuo Ma, F. Gerard Moeller, M. S. Sadique, K. M. Iftekharuddin, Khan M. Iftekharuddin (Ed.), Weijie Chen (Ed.)

Electrical & Computer Engineering Faculty Publications

According to the Centers for Disease Control and Prevention (CDC) more than 932,000 people in the US have died since 1999 from a drug overdose. Just about 75% of drug overdose deaths in 2020 involved Opioid, which suggests that the US is in an Opioid overdose epidemic. Identifying individuals likely to develop Opioid use disorder (OUD) can help public health in planning effective prevention, intervention, drug overdose and recovery policies. Further, a better understanding of prediction of overdose leading to the neurobiology of OUD may lead to new therapeutics. In recent years, very limited work has been done using statistical …


Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner Jan 2023

Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner

Electrical & Computer Engineering Faculty Publications

This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …


Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina Jun 2022

Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.


Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng Jan 2022

Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng

Engineering Management & Systems Engineering Faculty Publications

A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …


Facial Landmark Feature Fusion In Transfer Learning Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Norou Diawara, Khan M. Iftekharuddin Jan 2022

Facial Landmark Feature Fusion In Transfer Learning Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Norou Diawara, Khan M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

Automatic classification of child facial expressions is challenging due to the scarcity of image samples with annotations. Transfer learning of deep convolutional neural networks (CNNs), pretrained on adult facial expressions, can be effectively finetuned for child facial expression classification using limited facial images of children. Recent work inspired by facial age estimation and age-invariant face recognition proposes a fusion of facial landmark features with deep representation learning to augment facial expression classification performance. We hypothesize that deep transfer learning of child facial expressions may also benefit from fusing facial landmark features. Our proposed model architecture integrates two input branches: a …


Security Concerns On Machine Learning Solutions For 6g Networks In Mmwave Beam Prediction, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal Jan 2022

Security Concerns On Machine Learning Solutions For 6g Networks In Mmwave Beam Prediction, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal

Engineering Technology Faculty Publications

6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such as healthcare, transportation, energy, autonomous cars, and many more. Those algorithms have also been used in communication technologies to improve the system performance in terms of frequency spectrum usage, latency, and security. With the rapid developments of ML techniques, especially deep learning (DL), it is critical to consider the security concern when applying the algorithms. While ML algorithms offer significant advantages for 6G networks, security concerns on artificial …


Continuity Of Chen-Fliess Series For Applications In System Identification And Machine Learning, Rafael Dahmen, W. Steven Gray, Alexander Schmeding Jan 2021

Continuity Of Chen-Fliess Series For Applications In System Identification And Machine Learning, Rafael Dahmen, W. Steven Gray, Alexander Schmeding

Electrical & Computer Engineering Faculty Publications

Model continuity plays an important role in applications like system identification, adaptive control, and machine learning. This paper provides sufficient conditions under which input-output systems represented by locally convergent Chen-Fliess series are jointly continuous with respect to their generating series and as operators mapping a ball in an Lp-space to a ball in an Lq-space, where p and q are conjugate exponents. The starting point is to introduce a class of topological vector spaces known as Silva spaces to frame the problem and then to employ the concept of a direct limit to describe convergence. The proof of the main …


Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe Jan 2020

Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Special information has a significant role in disaster management. Land cover mapping can detect short- and long-term changes and monitor the vulnerable habitats. It is an effective evaluation to be included in the disaster management system to protect the conservation areas. The critical visual and statistical information presented to the decision-makers can help in mitigation or adaption before crossing a threshold. This paper aims to contribute in the academic and the practice aspects by offering a potential solution to enhance the disaster data source effectiveness. The key research question that the authors try to answer in this paper is how …


Superconducting Radio-Frequency Cavity Fault Classification Using Machine Learning At Jefferson Laboratory, Chris Tennant, Adam Carpenter, Tom Powers, Anna Shabalina Solopova, Lasitha Vidyaratne, Khan Iftekharuddin Jan 2020

Superconducting Radio-Frequency Cavity Fault Classification Using Machine Learning At Jefferson Laboratory, Chris Tennant, Adam Carpenter, Tom Powers, Anna Shabalina Solopova, Lasitha Vidyaratne, Khan Iftekharuddin

Electrical & Computer Engineering Faculty Publications

We report on the development of machine learning models for classifying C100 superconducting radio-frequency (SRF) cavity faults in the Continuous Electron Beam Accelerator Facility (CEBAF) at Jefferson Lab. CEBAF is a continuous-wave recirculating linac utilizing 418 SRF cavities to accelerate electrons up to 12 GeV through five passes. Of these, 96 cavities (12 cryomodules) are designed with a digital low-level rf system configured such that a cavity fault triggers waveform recordings of 17 rf signals for each of the eight cavities in the cryomodule. Subject matter experts are able to analyze the collected time-series data and identify which of the …


Special Section Guest Editorial: Machine Learning In Optics, Jonathan Howe, Travis Axtell, Khan Iftekharuddin Jan 2020

Special Section Guest Editorial: Machine Learning In Optics, Jonathan Howe, Travis Axtell, Khan Iftekharuddin

Electrical & Computer Engineering Faculty Publications

This guest editorial summarizes the Special Section on Machine Learning in Optics.


Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin Jan 2019

Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

As machine-learning algorithms continue to expand their scope and approach more ambiguous goals, they may be required to make decisions based on data that is often incomplete, imprecise, and uncertain. The capabilities of these models must, in turn, evolve to meet the increasingly complex challenges associated with the deployment and integration of intelligent systems into modern society. Historical variability in the performance of traditional machine-learning models in dynamic environments leads to ambiguity of trust in decisions made by such algorithms. Consequently, the objective of this work is to develop a novel computational model that effectively quantifies the reliability of autonomous …


Transfer Learning Approach To Multiclass Classification Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Khan M. Iftekharuddin Jan 2019

Transfer Learning Approach To Multiclass Classification Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Khan M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

The classification of facial expression has been extensively studied using adult facial images which are not appropriate ground truths for classifying facial expressions in children. The state-of-the-art deep learning approaches have been successful in the classification of facial expressions in adults. A deep learning model may be better able to learn the subtle but important features underlying child facial expressions and improve upon the performance of traditional machine learning and feature extraction methods. However, unlike adult data, only a limited number of ground truth images exist for training and validating models for child facial expression classification and there is a …


A Comparative Study Of Two Prediction Models For Brain Tumor Progression, Deqi Zhou, Loc Tran, Jihong Wang, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.) Jan 2015

A Comparative Study Of Two Prediction Models For Brain Tumor Progression, Deqi Zhou, Loc Tran, Jihong Wang, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.)

Electrical & Computer Engineering Faculty Publications

MR diffusion tensor imaging (DTI) technique together with traditional T1 or T2 weighted MRI scans supplies rich information sources for brain cancer diagnoses. These images form large-scale, high-dimensional data sets. Due to the fact that significant correlations exist among these images, we assume low-dimensional geometry data structures (manifolds) are embedded in the high-dimensional space. Those manifolds might be hidden from radiologists because it is challenging for human experts to interpret high-dimensional data. Identification of the manifold is a critical step for successfully analyzing multimodal MR images.

We have developed various manifold learning algorithms (Tran et al. 2011; Tran et al. …


Prediction Of Brain Tumor Progression Using Multiple Histogram Matched Mri Scans, Debrup Banerjee, Loc Tran, Jiang Li, Yuzhong Shen, Frederic Mckenzie, Jihong Wang, Ronald M. Summers (Ed.), Bram Van Ginneken (Ed.) Jan 2011

Prediction Of Brain Tumor Progression Using Multiple Histogram Matched Mri Scans, Debrup Banerjee, Loc Tran, Jiang Li, Yuzhong Shen, Frederic Mckenzie, Jihong Wang, Ronald M. Summers (Ed.), Bram Van Ginneken (Ed.)

Electrical & Computer Engineering Faculty Publications

In a recent study [1], we investigated the feasibility of predicting brain tumor progression based on multiple MRI series and we tested our methods on seven patients' MRI images scanned at three consecutive visits A, B and C. Experimental results showed that it is feasible to predict tumor progression from visit A to visit C using a model trained by the information from visit A to visit B. However, the trained model failed when we tried to predict tumor progression from visit B to visit C, though it is clinically more important. Upon a closer look at the MRI scans …


Prediction Of Brain Tumor Progression Using A Machine Learning Technique, Yuzhong Shen, Debrup Banerjee, Jiang Li, Adam Chandler, Yufei Shen, Frederic D. Mckenzie, Jihong Wang, Nico Karssemeijer (Ed.), Ronald M. Summers (Ed.) Jan 2010

Prediction Of Brain Tumor Progression Using A Machine Learning Technique, Yuzhong Shen, Debrup Banerjee, Jiang Li, Adam Chandler, Yufei Shen, Frederic D. Mckenzie, Jihong Wang, Nico Karssemeijer (Ed.), Ronald M. Summers (Ed.)

Electrical & Computer Engineering Faculty Publications

A machine learning technique is presented for assessing brain tumor progression by exploring six patients' complete MRI records scanned during their visits in the past two years. There are ten MRI series, including diffusion tensor image (DTI), for each visit. After registering all series to the corresponding DTI scan at the first visit, annotated normal and tumor regions were overlaid. Intensity value of each pixel inside the annotated regions were then extracted across all of the ten MRI series to compose a 10 dimensional vector. Each feature vector falls into one of three categories:normal, tumor, and normal but progressed to …