Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3264)
- TÜBİTAK (2998)
- Wright State University (1893)
- Singapore Management University (784)
- Washington University in St. Louis (720)
-
- Embry-Riddle Aeronautical University (534)
- Old Dominion University (532)
- Air Force Institute of Technology (303)
- Selected Works (299)
- University of Nebraska - Lincoln (235)
- Missouri University of Science and Technology (220)
- University of Central Florida (186)
- Portland State University (150)
- Chulalongkorn University (144)
- SelectedWorks (137)
- University of Nevada, Las Vegas (131)
- Purdue University (113)
- University of Arkansas, Fayetteville (106)
- University for Business and Technology in Kosovo (105)
- University of South Carolina (99)
- Technological University Dublin (96)
- University of Kentucky (90)
- Chapman University (80)
- University of South Florida (80)
- Western University (74)
- University of New Haven (73)
- California Polytechnic State University, San Luis Obispo (68)
- Loyola University Chicago (49)
- University of Massachusetts Amherst (48)
- Edith Cowan University (47)
- Keyword
-
- Computer Science (287)
- Machine learning (271)
- Deep learning (222)
- Department of Computer Science and Engineering (220)
- Simulation (210)
-
- Engineering (176)
- Technical writing (158)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Machine Learning (156)
- Optimization (148)
- Classification (115)
- Genetic algorithm (105)
- Artificial intelligence (101)
- Security (101)
- Cybersecurity (87)
- Particle swarm optimization (84)
- Deep Learning (80)
- Clustering (74)
- Robotics (73)
- Computer vision (70)
- Modeling (68)
- Neural networks (68)
- Algorithms (66)
- Virtual reality (65)
- Visualization (61)
- Feature extraction (60)
- Reinforcement learning (60)
- Wireless sensor networks (59)
- Publication Year
- Publication
-
- Journal of System Simulation (3264)
- Turkish Journal of Electrical Engineering and Computer Sciences (2998)
- Computer Science & Engineering Syllabi (1312)
- Research Collection School Of Computing and Information Systems (759)
- All Computer Science and Engineering Research (683)
-
- Theses and Dissertations (397)
- Journal of Digital Forensics, Security and Law (300)
- Electronic Theses and Dissertations (254)
- Browse all Theses and Dissertations (243)
- Computer Science and Engineering Faculty Publications (180)
- Annual ADFSL Conference on Digital Forensics, Security and Law (174)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (144)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (139)
- Faculty Publications (108)
- Electrical and Computer Engineering Faculty Research & Creative Works (107)
- Doctoral Dissertations (101)
- Dissertations (97)
- Computer Science Faculty Publications and Presentations (85)
- Electrical & Computer Engineering Faculty Publications (84)
- Computer Science Faculty Publications (81)
- USF Tampa Graduate Theses and Dissertations (75)
- UBT International Conference (73)
- Electrical & Computer Engineering and Computer Science Faculty Publications (68)
- Engineering Faculty Articles and Research (68)
- Jeremy Straub (66)
- Graduate Theses and Dissertations (64)
- Computer Science: Faculty Publications and Other Works (49)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (49)
- Computer Science Theses & Dissertations (47)
Articles 1 - 30 of 15000
Full-Text Articles in Engineering
An Adaptive Large Neighborhood Search For The Multi-Vehicle Profitable Tour Problem With Flexible Compartments And Mandatory Customers, Vincent F. Yu, Nabila Yuraisyah Salsabila, Aldy Gunawan, Anggun Nurfitriani Handoko
An Adaptive Large Neighborhood Search For The Multi-Vehicle Profitable Tour Problem With Flexible Compartments And Mandatory Customers, Vincent F. Yu, Nabila Yuraisyah Salsabila, Aldy Gunawan, Anggun Nurfitriani Handoko
Research Collection School Of Computing and Information Systems
The home-refill delivery system is a business model that addresses the concerns of plastic waste and its impact on the environment. It allows customers to pick up their household goods at their doorsteps and refill them into their own containers. However, the difficulty in accessing customers’ locations and product consolidations are undeniable challenges. To overcome these issues, we introduce a new variant of the Profitable Tour Problem, named the multi-vehicle profitable tour problem with flexible compartments and mandatory customers (MVPTPFC-MC). The objective is to maximize the difference between the total collected profit and the traveling cost. We model the proposed …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Campus Research Day
This paper is a proposed solution to the problem of memory safety using machine learning. Memory overload and corruption cause undesirable behaviors in a system that are addressed by memory safety implementations. This project uses machine learning models to classify different states of system memory from a dataset collected from a Raspberry Pi System. These models can then be used to classify real run time memory data and increase memory safety overall in a system.
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
ATU Research Symposium
Abstract:
Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
A Case Study Of The Crashoverride Malware, Its Effects And Possible Countermeasures, Samuel Rector
Cybersecurity Undergraduate Research Showcase
CRASHOVERRIDE is a modular malware tailor-made for electric grid Industrial Control System (ICS) equipment and was deployed by a group named ELECTRUM in a Ukrainian substation. The malware would launch a protocol exploit to flip breakers and would then wipe the system of ICS files. Finally, it would execute a Denial Of Service (DOS) attack on protective relays. In effect, months of damage and thousands out of power. However, due to oversights the malware only caused a brief power outage. Though the implications of the malware are cause for researching and implementing countermeasures against others to come. The CISA recommends …
Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler
MS in Computer Science Project Reports
In the last two decades various human language learning applications, spaced repetition software, online dictionaries, and artificial intelligent chat agents have been developed. However, there is no solution to cohesively combine these technologies into a comprehensive language learning application including skills such as speaking, typing, listening, and reading. Our contribution is to provide an immersive language learning web application to the end user which combines spaced repetition, a study technique used to review information at systematic intervals, and active recall, the process of purposely retrieving information from memory during a review session, with an artificial intelligent conversational chat agent both …
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia
Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia
Research Collection School Of Computing and Information Systems
The proliferation of smart personal devices and mobile internet access has fueled numerous advancements in on-demand transportation services. These services are facilitated by online digital platforms and range from providing rides to delivering products. Their influence is transforming transportation systems and leaving a mark on changing individual mobility, activity patterns, and consumption behaviors. For instance, on-demand transportation companies such as Uber, Lyft, Grab, and DiDi have become increasingly vital for meeting urban transportation needs by connecting available drivers with passengers in real time. The recent surge in door-to-door food delivery (e.g., Uber Eats, DoorDash, Meituan); grocery delivery (e.g., Amazon Fresh, …
Convolutional Spiking Neural Networks For Intent Detection Based On Anticipatory Brain Potentials Using Electroencephalogram, Nathan Lutes, V. Sriram Siddhardh Nadendla, K. Krishnamurthy
Convolutional Spiking Neural Networks For Intent Detection Based On Anticipatory Brain Potentials Using Electroencephalogram, Nathan Lutes, V. Sriram Siddhardh Nadendla, K. Krishnamurthy
Computer Science Faculty Research & Creative Works
Spiking neural networks (SNNs) are receiving increased attention because they mimic synaptic connections in biological systems and produce spike trains, which can be approximated by binary values for computational efficiency. Recently, the addition of convolutional layers to combine the feature extraction power of convolutional networks with the computational efficiency of SNNs has been introduced. This paper studies the feasibility of using a convolutional spiking neural network (CSNN) to detect anticipatory slow cortical potentials (SCPs) related to braking intention in human participants using an electroencephalogram (EEG). Data was collected during an experiment wherein participants operated a remote-controlled vehicle on a testbed …
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Masters Theses
Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
Lrs: Enhancing Adversarial Transferability Through Lipschitz Regularized Surrogate, Tao Wu, Tony Tie Luo, Donald C. Wunsch
Lrs: Enhancing Adversarial Transferability Through Lipschitz Regularized Surrogate, Tao Wu, Tony Tie Luo, Donald C. Wunsch
Computer Science Faculty Research & Creative Works
The Transferability of Adversarial Examples is of Central Importance to Transfer-Based Black-Box Adversarial Attacks. Previous Works for Generating Transferable Adversarial Examples Focus on Attacking Given Pretrained Surrogate Models While the Connections between Surrogate Models and Adversarial Trasferability Have Been overlooked. in This Paper, We Propose Lipschitz Regularized Surrogate (LRS) for Transfer-Based Black-Box Attacks, a Novel Approach that Transforms Surrogate Models towards Favorable Adversarial Transferability. using Such Transformed Surrogate Models, Any Existing Transfer-Based Black-Box Attack Can Run Without Any Change, Yet Achieving Much Better Performance. Specifically, We Impose Lipschitz Regularization on the Loss Landscape of Surrogate Models to Enable a Smoother …
Cr-Sam: Curvature Regularized Sharpness-Aware Minimization, Tao Wu, Tony Tie Luo, Donald C. Wunsch
Cr-Sam: Curvature Regularized Sharpness-Aware Minimization, Tao Wu, Tony Tie Luo, Donald C. Wunsch
Computer Science Faculty Research & Creative Works
The Capacity to Generalize to Future Unseen Data Stands as One of the Utmost Crucial Attributes of Deep Neural Networks. Sharpness-Aware Minimization (SAM) Aims to Enhance the Generalizability by Minimizing Worst-Case Loss using One-Step Gradient Ascent as an Approximation. However, as Training Progresses, the Non-Linearity of the Loss Landscape Increases, Rendering One-Step Gradient Ascent Less Effective. on the Other Hand, Multi-Step Gradient Ascent Will Incur Higher Training Cost. in This Paper, We Introduce a Normalized Hessian Trace to Accurately Measure the Curvature of Loss Landscape on Both Training and Test Sets. in Particular, to Counter Excessive Non-Linearity of Loss Landscape, …
Development Demand, Power Energy Consumption And Green And Low-Carbon Transition For Computing Power In China, Xiaohong Chen, Liaoying Cao, Jiaolong Chen, Jinghui Zhang, Wenzhi Cao, Yangjie Wang
Development Demand, Power Energy Consumption And Green And Low-Carbon Transition For Computing Power In China, Xiaohong Chen, Liaoying Cao, Jiaolong Chen, Jinghui Zhang, Wenzhi Cao, Yangjie Wang
Bulletin of Chinese Academy of Sciences (Chinese Version)
As a critical digital infrastructure, computing power has become the core productivity and a new engine driving economic growth in the digital economy. Nevertheless, the power-hungry nature of computing/data centers, representing the computing infrastructure, consumes a significant amount of electrical energy. Currently, China’s economy is transitioning from high-speed growth to high-quality development. It is imperative to study how to coordinate the development of computing power while ensuring its safety and achieving green and low-carbon goals. Based on an overview of the current status of computing power development, this study predicts the future demand for computing power in China, analyzes the …
Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan
Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan
Turkish Journal of Electrical Engineering and Computer Sciences
This study aims to perform fast fault diagnosis and intelligent protection in an active distribution network (ADN) with high renewable energy penetration. Several time-domain simulations are carried out in EMTP-RV to extract time-synchronized current and voltage data. The Stockwell transform (ST) was used in MATLAB/SIMULINK to preprocess these input datasets to train the adaptive fault diagnosis deep convolutional neural network (AFDDCNN) for fault location identification, fault type identification, and fault phase-detection for different penetration levels. Based on the AFDDCNN output, the intelligent protection scheme (IDOCPS) generates the signal for isolating a faulty section of the ADN. An intelligent fault diagnosis …
Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi
Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi
Turkish Journal of Electrical Engineering and Computer Sciences
Technological developments in industrial areas also impact unmanned aerial vehicles (UAVs). Recent improvements in both software and hardware have significantly increased the use of many UAVs in social and military fields. In particular, the widespread use of these vehicles in social areas such as entertainment, shipping, transportation, and delivery and military areas such as surveillance, tracking, and offensive measures has accelerated the research on swarm systems. This study examined the previous investigations on swarm UAVs and aimed to create a more efficient algorithm. The effectiveness of the proposed algorithm was compared with other leader-based applications. A swarm consisting of 5 …
Lower Data Attacks On Advanced Encryption Standard, Orhun Kara
Lower Data Attacks On Advanced Encryption Standard, Orhun Kara
Turkish Journal of Electrical Engineering and Computer Sciences
The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 2 4 and 2 16 chosen plaintexts (CP) for 6-round and 7-round AES 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) …
Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya
Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya
Turkish Journal of Electrical Engineering and Computer Sciences
The regulation of tie-line electricity flow and frequency of electrical power systems (EPS) is crucial for ensuring their robustness to parameter changes and efficient management of disturbances. To this end, a novel cascade control design approach utilizing a serial Proportional-Integral-Derivative controller with a filter (PIDF) is proposed in this paper. The parameters of the controllers are derived analytically, and it is employed in both loops of the cascade control system to regulate the Load Frequency Control (LFC) of EPS. The implementation of PIDF controllers in both loops is utilized in the cascade control scheme for various power systems featuring different …
Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar
Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents a fast antenna phase optimization scheme to enable microwave power focusing for breast cancer hyperthermia. The power focusing is achieved through the maximization of the deposited electric field on the target malignant tumor tissue. To do so, a malignant breast tumor, the surrounding breast medium, and the skin of the breast are modeled as a cylindrical structure composed of eccentric cylinders, and electric field distribution is computed analytically in terms of cylindrical harmonics. This approach minimized the computational cost and simplified the breast medium model. To ensure applicability across various breast types, the dielectric properties (DPs) of …
Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu
Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
In recent years, developments in quantum sensing, laser, and atomic sensor technologies have also enabled advancement in the field of quantum navigation. Atomic-based gyroscopes have emerged as one of the most critical atomic sensors in this respect. In this review, a brief technology statement of spin exchange relaxation free (SERF) and nuclear magnetic resonance (NMR) type atomic comagnetometer gyroscope (CG) is presented. Related studies in the literature have been gathered, and the fundamental compositions of CGs with technical basics are presented. A comparison of SERF and NMR CGs is provided. A basic simulation of SERF CG was carried out because …
Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu
Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu
Turkish Journal of Electrical Engineering and Computer Sciences
Domain generalization (DG) techniques strive to attain the ability to generalize to an unfamiliar target domain solely based on training data originating from the source domains. Despite the increasing attention given to learning from multiple training domains through the application of various forms of invariance across those domains, the enhancements observed in comparison to ERM are nearly insignificant under specified evaluation rules. In this paper, we demonstrate that the disentanglement of spurious and invariant features is a challenging task in conventional training since ERM simply minimizes the loss and does not exploit invariance among domains. To address this issue, we …
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes
A Machine Learning Model Of Perturb-Seq Data For Use In Space Flight Gene Expression Profile Analysis, Liam F. Johnson, James Casaletto, Lauren Sanders, Sylvain Costes
Graduate Industrial Research Symposium
The genetic perturbations caused by spaceflight on biological systems tend to have a system-wide effect which is often difficult to deconvolute it into individual signals with specific points of origin. Single cell multi-omic data can provide a profile of the perturbational effects, but does not necessarily indicate the initial point of interference within the network. The objective of this project is to take advantage of large scale and genome-wide perturbational datasets by using them to train a tuned machine learning model that is capable of predicting the effects of unseen perturbations in new data. Perturb-Seq datasets are large libraries of …
Relative Vectoring Using Dual Object Detection For Autonomous Aerial Refueling, Derek B. Worth, Jeffrey L. Choate, James Lynch, Scott L. Nykl, Clark N. Taylor
Relative Vectoring Using Dual Object Detection For Autonomous Aerial Refueling, Derek B. Worth, Jeffrey L. Choate, James Lynch, Scott L. Nykl, Clark N. Taylor
Faculty Publications
Once realized, autonomous aerial refueling will revolutionize unmanned aviation by removing current range and endurance limitations. Previous attempts at establishing vision-based solutions have come close but rely heavily on near perfect extrinsic camera calibrations that often change midflight. In this paper, we propose dual object detection, a technique that overcomes such requirement by transforming aerial refueling imagery directly into receiver aircraft reference frame probe-to-drogue vectors regardless of camera position and orientation. These vectors are precisely what autonomous agents need to successfully maneuver the tanker and receiver aircraft in synchronous flight during refueling operations. Our method follows a common 4-stage process …
Analyzing Biomedical Datasets With Symbolic Tree Adaptive Resonance Theory, Sasha Petrenko, Daniel B. Hier, Mary A. Bone, Tayo Obafemi-Ajayi, Erik J. Timpson, William E. Marsh, Michael Speight, Donald C. Wunsch
Analyzing Biomedical Datasets With Symbolic Tree Adaptive Resonance Theory, Sasha Petrenko, Daniel B. Hier, Mary A. Bone, Tayo Obafemi-Ajayi, Erik J. Timpson, William E. Marsh, Michael Speight, Donald C. Wunsch
Chemistry Faculty Research & Creative Works
Biomedical Datasets Distill Many Mechanisms Of Human Diseases, Linking Diseases To Genes And Phenotypes (Signs And Symptoms Of Disease), Genetic Mutations To Altered Protein Structures, And Altered Proteins To Changes In Molecular Functions And Biological Processes. It Is Desirable To Gain New Insights From These Data, Especially With Regard To The Uncovering Of Hierarchical Structures Relating Disease Variants. However, Analysis To This End Has Proven Difficult Due To The Complexity Of The Connections Between Multi-Categorical Symbolic Data. This Article Proposes Symbolic Tree Adaptive Resonance Theory (START), With Additional Supervised, Dual-Vigilance (DV-START), And Distributed Dual-Vigilance (DDV-START) Formulations, For The Clustering Of …
Continual Online Learning-Based Optimal Tracking Control Of Nonlinear Strict-Feedback Systems: Application To Unmanned Aerial Vehicles, Irfan Ganie, Sarangapani Jagannathan
Continual Online Learning-Based Optimal Tracking Control Of Nonlinear Strict-Feedback Systems: Application To Unmanned Aerial Vehicles, Irfan Ganie, Sarangapani Jagannathan
Electrical and Computer Engineering Faculty Research & Creative Works
A novel optimal trajectory tracking scheme is introduced for nonlinear continuous-time systems in strict feedback form with uncertain dynamics by using neural networks (NNs). The method employs an actor-critic-based NN back-stepping technique for minimizing a discounted value function along with an identifier to approximate unknown system dynamics that are expressed in augmented form. Novel online weight update laws for the actor and critic NNs are derived by using both the NN identifier and Hamilton-Jacobi-Bellman residual error. A new continual lifelong learning technique utilizing the Fisher Information Matrix via Hamilton-Jacobi-Bellman residual error is introduced to obtain the significance of weights in …
T-Pickseer: Visual Analysis Of Taxi Pick-Up Point Selection Behavior, Shuxian Gu, Yemo Dai, Zezheng Feng, Yong Wang, Haipeng Zeng
T-Pickseer: Visual Analysis Of Taxi Pick-Up Point Selection Behavior, Shuxian Gu, Yemo Dai, Zezheng Feng, Yong Wang, Haipeng Zeng
Research Collection School Of Computing and Information Systems
Taxi drivers often take much time to navigate the streets to look for passengers, which leads to high vacancy rates and wasted resources. Empty taxi cruising remains a big concern for taxi companies. Analyzing the pick-up point selection behavior can solve this problem effectively, providing suggestions for taxi management and dispatch. Many studies have been devoted to analyzing and recommending hotspot regions of pick-up points, which can make it easier for drivers to pick-up passengers. However, the selection of pick-up points is complex and affected by multiple factors, such as convenience and traffic management. Most existing approaches cannot produce satisfactory …
Identification Of Faults In Highways Using Approximation Methods And Algorithms, Khudayberdiyev Khakkulmirzayevich Mirzaakbar, Anvar Asatilloyevich Ravshanov
Identification Of Faults In Highways Using Approximation Methods And Algorithms, Khudayberdiyev Khakkulmirzayevich Mirzaakbar, Anvar Asatilloyevich Ravshanov
Chemical Technology, Control and Management
Many fast Fourier transforms are used to identify defective parts of uneven surfaces on roads and send information to relevant organizations on the road, using the " RAVON YO‘LLAR" application installed on a mobile device during car movement. We determine the uneven parts of the road. Smooth and well-maintained roads reduce the risk of vehicle collisions, skidding and other road-related incidents. Timely measures contribute to overall safety, comfort and economic efficiency.
Brain-Inspired Continual Learning: Robust Feature Distillation And Re-Consolidation For Class Incremental Learning, Hikmat Khan, Nidhal Carla Bouaynaya, Ghulam Rasool
Brain-Inspired Continual Learning: Robust Feature Distillation And Re-Consolidation For Class Incremental Learning, Hikmat Khan, Nidhal Carla Bouaynaya, Ghulam Rasool
Henry M. Rowan College of Engineering Faculty Scholarship
Artificial intelligence and neuroscience have a long and intertwined history. Advancements in neuroscience research have significantly influenced the development of artificial intelligence systems that have the potential to retain knowledge akin to humans. Building upon foundational insights from neuroscience and existing research in adversarial and continual learning fields, we introduce a novel framework that comprises two key concepts: feature distillation and re-consolidation. The framework distills continual learning (CL) robust features and rehearses them while learning the next task, aiming to replicate the mammalian brain's process of consolidating memories through rehearsing the distilled version of the waking experiences. Furthermore, the proposed …