Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

PDF

Series

Machine learning

Discipline
Institution
Publication

Articles 1 - 30 of 38

Full-Text Articles in Engineering

Self-Driving Toy Car Using Deep Learning, Fahim Ahmed, Suleyman Turac, Mubtasem Ali Dec 2019

Self-Driving Toy Car Using Deep Learning, Fahim Ahmed, Suleyman Turac, Mubtasem Ali

Publications and Research

Our research focuses on building a student affordable platform for scale model self-driving cars. The goal of this project is to explore current developments of Open Source hardware and software to build a low-cost platform consisting of the car chassis/framework, sensors, and software for the autopilot. Our research will allow other students with low budget to enter into the world of Deep Learning, self-driving cars, and autonomous cars racing competitions.


Application Of Artificial Neural Networks In The Drilling Processes: Can Equivalent Circulation Density Be Estimated Prior To Drilling?, Husam Hasan Alkinani, Abo Taleb Al-Hameedi, Shari Dunn-Norman, David Lian Dec 2019

Application Of Artificial Neural Networks In The Drilling Processes: Can Equivalent Circulation Density Be Estimated Prior To Drilling?, Husam Hasan Alkinani, Abo Taleb Al-Hameedi, Shari Dunn-Norman, David Lian

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

As the drilling environment became more challenging nowadays, managing equivalent circulating density (ECD) is a key factor to minimize non-productive time (NPT) due to many drilling obstacles such as stuck pipe, formation fracturing, and lost circulation. The goal of this work was to predict ECD prior to drilling by using artificial neural network (ANN). Once ECD is recognized, the crucial drilling variables impact ECD can be modified to control ECD within the acceptable ranges. Data from over 2000 wells collected worldwide were used in this study to create an ANN to predict ECD prior to drilling. Into training, validation, and …


Machine Learning Predictions Electronic Couplings For Charge Transport Calculations Of P3ht, Evan D. Miller, Matthew L. Jones, Mike M. Henry, Bryan Stanfill, Eric Jankowski Dec 2019

Machine Learning Predictions Electronic Couplings For Charge Transport Calculations Of P3ht, Evan D. Miller, Matthew L. Jones, Mike M. Henry, Bryan Stanfill, Eric Jankowski

Materials Science and Engineering Faculty Publications and Presentations

The purpose of this work is to lower the computational cost of predicting charge mobilities in organic semiconductors, which will benefit the screening of candidates for inexpensive solar power generation. We characterize efforts to minimize the number of expensive quantum chemical calculations we perform by training machines to predict electronic couplings between monomers of poly-(3-hexylthiophene). We test five machine learning techniques and identify random forests as the most accurate, information-dense, and easy-to-implement approach for this problem, achieving mean-absolute-error of 0.02 [× 1.6 × 10−19 J], R2 = 0.986, predicting electronic couplings 390 times faster than quantum chemical calculations, …


Pixel-Level Deep Multi-Dimensional Embeddings For Homogeneous Multiple Object Tracking, Mateusz Mittek Dec 2019

Pixel-Level Deep Multi-Dimensional Embeddings For Homogeneous Multiple Object Tracking, Mateusz Mittek

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The goal of Multiple Object Tracking (MOT) is to locate multiple objects and keep track of their individual identities and trajectories given a sequence of (video) frames. A popular approach to MOT is tracking by detection consisting of two processing components: detection (identification of objects of interest in individual frames) and data association (connecting data from multiple frames). This work addresses the detection component by introducing a method based on semantic instance segmentation, i.e., assigning labels to all visible pixels such that they are unique among different instances. Modern tracking methods often built around Convolutional Neural Networks (CNNs) and additional, …


Domain Adaptation In Unmanned Aerial Vehicles Landing Using Reinforcement Learning, Pedro Lucas Franca Albuquerque Dec 2019

Domain Adaptation In Unmanned Aerial Vehicles Landing Using Reinforcement Learning, Pedro Lucas Franca Albuquerque

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Landing an unmanned aerial vehicle (UAV) on a moving platform is a challenging task that often requires exact models of the UAV dynamics, platform characteristics, and environmental conditions. In this thesis, we present and investigate three different machine learning approaches with varying levels of domain knowledge: dynamics randomization, universal policy with system identification, and reinforcement learning with no parameter variation. We first train the policies in simulation, then perform experiments both in simulation, making variations of the system dynamics with wind and friction coefficient, then perform experiments in a real robot system with wind variation. We initially expected that providing …


Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan Nov 2019

Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan

FIU Electronic Theses and Dissertations

Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.

Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …


Machine Learning And Image Processing For Noise Removal And Robust Edge Detection In The Presence Of Mixed Noise, Mehdi Mafi Oct 2019

Machine Learning And Image Processing For Noise Removal And Robust Edge Detection In The Presence Of Mixed Noise, Mehdi Mafi

FIU Electronic Theses and Dissertations

The central goal of this dissertation is to design and model a smoothing filter based on the random single and mixed noise distribution that would attenuate the effect of noise while preserving edge details. Only then could robust, integrated and resilient edge detection methods be deployed to overcome the ubiquitous presence of random noise in images. Random noise effects are modeled as those that could emanate from impulse noise, Gaussian noise and speckle noise.

In the first step, evaluation of methods is performed based on an exhaustive review on the different types of denoising methods which focus on impulse noise, …


Asap: A Source Code Authorship Program, Matthew F. Tennyson Phd Aug 2019

Asap: A Source Code Authorship Program, Matthew F. Tennyson Phd

Faculty & Staff Research and Creative Activity

Source code authorship attribution is the task of determining who wrote a computer program, based on its source code, usually when the author is either unknown or under dispute. Areas where this can be applied include software forensics, cases of software copyright infringement, and detecting plagiarism. Numerous methods of source code authorship attribution have been proposed and studied. However, there are no known easily accessible and user-friendly programs that perform this task. Instead, researchers typically develop software in an ad hoc manner for use in their studies, and the software is rarely made publicly available. In this paper, we present …


Machine Learning Methodology Review For Computational Electromagnetics, He Ming Yao, Lijun Jiang, Huan Huan Zhang, Wei E.I. Sha Aug 2019

Machine Learning Methodology Review For Computational Electromagnetics, He Ming Yao, Lijun Jiang, Huan Huan Zhang, Wei E.I. Sha

Electrical and Computer Engineering Faculty Research & Creative Works

While machine learning is revolutionizing every corner of modern technologies, we have been attempting to explore whether machine learning methods could be used in computational electromagnetic (CEM). In this paper, five efforts in line with this direction are reviewed. They include forward methods such as the method of moments (MoM) solved by the artificial neural network training process, FDTD PML (perfectly matched layer) using the hyperbolic tangent basis function (HTBF), etc. There are also inverse problems that use the deep ConvNets for the effective source reconstruction and subwavelength imaging in the far-field. Benchmarks are provided to demonstrate the feasibility of …


Evaluating Machine Learning Performance In Predicting Injury Severity In Agribusiness Industries, Fatemeh Davoudi Kakhki, Steven Freeman, Gretchen Mosher Aug 2019

Evaluating Machine Learning Performance In Predicting Injury Severity In Agribusiness Industries, Fatemeh Davoudi Kakhki, Steven Freeman, Gretchen Mosher

Faculty Publications

Although machine learning methods have been used as an outcome prediction tool in many fields, their utilization in predicting incident outcome in occupational safety is relatively new. This study tests the performance of machine learning techniques in modeling and predicting occupational incidents severity with respect to accessible information of injured workers in agribusiness industries using workers’ compensation claims. More than 33,000 incidents within agribusiness industries in the Midwest of the United States for 2008–2016 were analyzed. The total cost of incidents was extracted and classified from workers’ compensation claims. Supervised machine learning algorithms for classification (support vector machines with linear, …


Computational Studies Of Thermal Properties And Desalination Performance Of Low-Dimensional Materials, Yang Hong Aug 2019

Computational Studies Of Thermal Properties And Desalination Performance Of Low-Dimensional Materials, Yang Hong

Department of Chemistry: Dissertations, Theses, and Student Research

During the last 30 years, microelectronic devices have been continuously designed and developed with smaller size and yet more functionalities. Today, hundreds of millions of transistors and complementary metal-oxide-semiconductor cells can be designed and integrated on a single microchip through 3D packaging and chip stacking technology. A large amount of heat will be generated in a limited space during the operation of microchips. Moreover, there is a high possibility of hot spots due to non-uniform integrated circuit design patterns as some core parts of a microchip work harder than other memory parts. This issue becomes acute as stacked microchips get …


Mid To Late Season Weed Detection In Soybean Production Fields Using Unmanned Aerial Vehicle And Machine Learning, Arun Narenthiran Veeranampalayam Sivakumar Jul 2019

Mid To Late Season Weed Detection In Soybean Production Fields Using Unmanned Aerial Vehicle And Machine Learning, Arun Narenthiran Veeranampalayam Sivakumar

Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research

Mid-late season weeds are those that escape the early season herbicide applications and those that emerge late in the season. They might not affect the crop yield, but if uncontrolled, will produce a large number of seeds causing problems in the subsequent years. In this study, high-resolution aerial imagery of mid-season weeds in soybean fields was captured using an unmanned aerial vehicle (UAV) and the performance of two different automated weed detection approaches – patch-based classification and object detection was studied for site-specific weed management. For the patch-based classification approach, several conventional machine learning models on Haralick texture features were …


Comparative Analysis Of Feature Selection Methods To Identify Biomarkers In A Stroke-Related Dataset, Thomas Clifford, Justin Bruce, Tayo Obafemi-Ajayi, John Matta Jul 2019

Comparative Analysis Of Feature Selection Methods To Identify Biomarkers In A Stroke-Related Dataset, Thomas Clifford, Justin Bruce, Tayo Obafemi-Ajayi, John Matta

Electrical and Computer Engineering Faculty Research & Creative Works

This paper applies machine learning feature selection techniques to the REGARDS stroke-related dataset to identify health-related biomarkers. A data-driven methodological framework is presented to evaluate multiple feature selection methods. In applying the framework, three classifiers are chosen in conjunction with two wrappers, and their performance with diverse classification targets such as Current Smoker, Current Alcohol Use, and Deceased is evaluated. The performance across logistic regression, random forest and naïve Bayes classifier methods, as quantified by the ROC Area Under Curve metric and selected features, was similar. However, significant differences were observed in running time. Performance of the selected features was …


A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney Jun 2019

A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney

FIU Electronic Theses and Dissertations

Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …


High‑Throughput Analysis Of Leaf Physiological And Chemical Traits With Vis–Nir–Swir Spectroscopy: A Case Study With A Maize Diversity Panel, Yufeng Ge, Abbas Atefi, Huichun Zhang, Chenyong Miao, Raghuprakash Kastoori Ramamurthy, Brandi Sigmon, Jinliang Yang, James C. Schnable Jun 2019

High‑Throughput Analysis Of Leaf Physiological And Chemical Traits With Vis–Nir–Swir Spectroscopy: A Case Study With A Maize Diversity Panel, Yufeng Ge, Abbas Atefi, Huichun Zhang, Chenyong Miao, Raghuprakash Kastoori Ramamurthy, Brandi Sigmon, Jinliang Yang, James C. Schnable

Biological Systems Engineering: Papers and Publications

Hyperspectral reflectance data in the visible, near infrared and shortwave infrared range (VIS–NIR– SWIR, 400–2500 nm) are commonly used to nondestructively measure plant leaf properties. We investigated the usefulness of VIS–NIR–SWIR as a high-throughput tool to measure six leaf properties of maize plants including chlorophyll content (CHL), leaf water content (LWC), specific leaf area (SLA), nitrogen (N), phosphorus (P), and potassium (K). This assessment was performed using the lines of the maize diversity panel. Data were collected from plants grown in greenhouse condition, as well as in the field under two nitrogen application regimes. Leaf-level hyperspectral data were collected with …


Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang Jun 2019

Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang

Computer Science and Engineering

The dimension reduction of large scale high-dimensional data is a challenging task, especially the dimension reduction of face data and the accuracy increment of face recognition in the large scale face recognition system, which may cause large storage space and long recognition time. In order to further reduce the recognition time and the storage space in the large scale face recognition systems, on the basis of the general non-negative matrix factorization based on left semi-tensor (GNMFL) without dimension matching constraints proposed in our previous work, we propose a sparse GNMFL/L (SGNMFL/L) to decompose a large number of face data sets …


Data-Driven Integral Reinforcement Learning For Continuous-Time Non-Zero-Sum Games, Yongliang Yang, Liming Wang, Hamidreza Modares, Dawei Ding, Yixin Yin, Donald C. Wunsch Jun 2019

Data-Driven Integral Reinforcement Learning For Continuous-Time Non-Zero-Sum Games, Yongliang Yang, Liming Wang, Hamidreza Modares, Dawei Ding, Yixin Yin, Donald C. Wunsch

Electrical and Computer Engineering Faculty Research & Creative Works

This paper develops an integral value iteration (VI) method to efficiently find online the Nash equilibrium solution of two-player non-zero-sum (NZS) differential games for linear systems with partially unknown dynamics. To guarantee the closed-loop stability about the Nash equilibrium, the explicit upper bound for the discounted factor is given. To show the efficacy of the presented online model-free solution, the integral VI method is compared with the model-based off-line policy iteration method. Moreover, the theoretical analysis of the integral VI algorithm in terms of three aspects, i.e., positive definiteness properties of the updated cost functions, the stability of the closed-loop …


Source Reconstruction Method Based On Machine Learning Algorithms, He Ming Yao, Lijun Jiang, Wei E.I. Sha Jun 2019

Source Reconstruction Method Based On Machine Learning Algorithms, He Ming Yao, Lijun Jiang, Wei E.I. Sha

Electrical and Computer Engineering Faculty Research & Creative Works

This paper proposes a new source reconstruction method (SRM) based on deep learning. The conventional SRM usually requires oversampled measurements data to ensure higher accuracy. Thus, conventional SRM numerical system is usually highly singular. A deep convolutional neural network (ConvNet) is proposed to reconstruct the equivalent sources of the target to overcome difficulty. The deep ConvNet allows us to employ less data samples. Besides, the ill-conditioned numerical system can be effectively avoided. Numerical examples are presented to demonstrate the feasibility and accuracy of the proposed method. Its performance is also compared with the traditional neural network and interpolation method. Moreover, …


Mud Loss Estimation Using Machine Learning Approach, Abo Taleb T. Al-Hameedi, Husam H. Alkinani, Shari Dunn-Norman, Ralph E. Flori, Steven Austin Hilgedick, Ahmed S. Amer, Mortadha Alsaba Jun 2019

Mud Loss Estimation Using Machine Learning Approach, Abo Taleb T. Al-Hameedi, Husam H. Alkinani, Shari Dunn-Norman, Ralph E. Flori, Steven Austin Hilgedick, Ahmed S. Amer, Mortadha Alsaba

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

Lost circulation costs are a significant expense in drilling oil and gas wells. Drilling anywhere in the Rumaila field, one the world's largest oilfields, requires penetrating the Dammam formation, which is notorious for lost circulation issues and thus a great source of information on lost circulation events. This paper presents a new, more precise model to predict lost circulation volumes, equivalent circulation density (ECD), and rate of penetration (ROP) in the Dammam formation. A larger data set, more systematic statistical approach, and a machine-learning algorithm have produced statistical models that give a better prediction of the lost circulation volumes, ECD, …


Estimation Of Soil Moisture At Different Soil Levels Using Machine Learning Techniques And Unmanned Aerial Vehicle (Uav) Multispectral Imagery, Mahyar Aboutalebi, L. Niel Allen, Alfonso F. Torres-Rua, Mac Mckee, Calvin Coopmans May 2019

Estimation Of Soil Moisture At Different Soil Levels Using Machine Learning Techniques And Unmanned Aerial Vehicle (Uav) Multispectral Imagery, Mahyar Aboutalebi, L. Niel Allen, Alfonso F. Torres-Rua, Mac Mckee, Calvin Coopmans

AggieAir Publications

Soil moisture is a key component of water balance models. Physically, it is a nonlinear function of parameters that are not easily measured spatially, such as soil texture and soil type. Thus, several studies have been conducted on the estimation of soil moisture using remotely sensed data and data mining techniques such as artificial neural networks (ANNs) and support vector machines (SVMs). However, all models developed based on these techniques are limited to site-specific applications where they are trained and their parameters are tuned. Moreover, since the system of non-linear equations produced by and conducted in the machine learning process …


Identification And Analysis Of Behavioral Phenotypes In Autism Spectrum Disorder Via Unsupervised Machine Learning, Elizabeth Stevens, Dennis R. Dixon, Marlena N. Novack, Doreen Granpeesheh, Tristram Smith, Erik Linstead May 2019

Identification And Analysis Of Behavioral Phenotypes In Autism Spectrum Disorder Via Unsupervised Machine Learning, Elizabeth Stevens, Dennis R. Dixon, Marlena N. Novack, Doreen Granpeesheh, Tristram Smith, Erik Linstead

Engineering Faculty Articles and Research

Background and objective: Autism spectrum disorder (ASD) is a heterogeneous disorder. Research has explored potential ASD subgroups with preliminary evidence supporting the existence of behaviorally and genetically distinct subgroups; however, research has yet to leverage machine learning to identify phenotypes on a scale large enough to robustly examine treatment response across such subgroups. The purpose of the present study was to apply Gaussian Mixture Models and Hierarchical Clustering to identify behavioral phenotypes of ASD and examine treatment response across the learned phenotypes.

Materials and methods: The present study included a sample of children with ASD (N = 2400), …


Depressiongnn: Depression Prediction Using Graph Neural Network On Smartphone And Wearable Sensors, Param Bidja May 2019

Depressiongnn: Depression Prediction Using Graph Neural Network On Smartphone And Wearable Sensors, Param Bidja

Honors Scholar Theses

Depression prediction is a complicated classification problem because depression diagnosis involves many different social, physical, and mental signals. Traditional classification algorithms can only reach an accuracy of no more than 70% given the complexities of depression. However, a novel approach using Graph Neural Networks (GNN) can be used to reach over 80% accuracy, if a graph can represent the depression data set to capture differentiating features. Building such a graph requires 1) the definition of node features, which must be highly correlated with depression, and 2) the definition for edge metrics, which must also be highly correlated with depression. In …


Seeing Eye To Eye: A Machine Learning Approach To Automated Saccade Analysis, Maigh Attre May 2019

Seeing Eye To Eye: A Machine Learning Approach To Automated Saccade Analysis, Maigh Attre

Honors Scholar Theses

Abnormal ocular motility is a common manifestation of many underlying pathologies particularly those that are neurological. Dynamics of saccades, when the eye rapidly changes its point of fixation, have been characterized for many neurological disorders including concussions, traumatic brain injuries (TBI), and Parkinson’s disease. However, widespread saccade analysis for diagnostic and research purposes requires the recognition of certain eye movement parameters. Key information such as velocity and duration must be determined from data based on a wide set of patients’ characteristics that may range in eye shapes and iris, hair and skin pigmentation [36]. Previous work on saccade analysis has …


Intelligent Machine Learning: Tailor-Making Macromolecules, Yousef Mohammadi, Mohammad Reza Saeb, Alexander Penlidis, Esmaiel Jabbari, Florian J. Stadler, Philippe Zinck, Krzysztof Matyjaszewski Apr 2019

Intelligent Machine Learning: Tailor-Making Macromolecules, Yousef Mohammadi, Mohammad Reza Saeb, Alexander Penlidis, Esmaiel Jabbari, Florian J. Stadler, Philippe Zinck, Krzysztof Matyjaszewski

Faculty Publications

Nowadays, polymer reaction engineers seek robust and effective tools to synthesize complex macromolecules with well-defined and desirable microstructural and architectural characteristics. Over the past few decades, several promising approaches, such as controlled living (co)polymerization systems and chain-shuttling reactions have been proposed and widely applied to synthesize rather complex macromolecules with controlled monomer sequences. Despite the unique potential of the newly developed techniques, tailor-making the microstructure of macromolecules by suggesting the most appropriate polymerization recipe still remains a very challenging task. In the current work, two versatile and powerful tools capable of effectively addressing the aforementioned questions have been proposed and …


Intelligent Machine Learning: Tailor-Making Macromolecules, Yousef Mohammadi, Mohammad Reza Saeb, Alexander Penlidis, Esmaiel Jabbari, Florian J. Stadler, Philippe Zinck, Krzysztof Matyjaszewski Apr 2019

Intelligent Machine Learning: Tailor-Making Macromolecules, Yousef Mohammadi, Mohammad Reza Saeb, Alexander Penlidis, Esmaiel Jabbari, Florian J. Stadler, Philippe Zinck, Krzysztof Matyjaszewski

Faculty Publications

Nowadays, polymer reaction engineers seek robust and effective tools to synthesize complex macromolecules with well-defined and desirable microstructural and architectural characteristics. Over the past few decades, several promising approaches, such as controlled living (co)polymerization systems and chain-shuttling reactions have been proposed and widely applied to synthesize rather complex macromolecules with controlled monomer sequences. Despite the unique potential of the newly developed techniques, tailor-making the microstructure of macromolecules by suggesting the most appropriate polymerization recipe still remains a very challenging task. In the current work, two versatile and powerful tools capable of effectively addressing the aforementioned questions have been proposed and …


Assessment Of Post-Wildfire Debris Flow Occurrence Using Classifier Tree, Priscilla Addison, Thomas Oommen, Qiuying Sha Jan 2019

Assessment Of Post-Wildfire Debris Flow Occurrence Using Classifier Tree, Priscilla Addison, Thomas Oommen, Qiuying Sha

Michigan Tech Publications

Besides the dangers of an actively burning wildfire, a plethora of other hazardous consequences can occur afterwards. Debris flows are among the most hazardous of these, being known to cause fatalities and extensive damage to infrastructure. Although debris flows are not exclusive to fire affected areas, a wildfire can increase a location’s susceptibility by stripping its protective covers like vegetation and introducing destabilizing factors such as ash filling soil pores to increase runoff potential. Due to the associated dangers, researchers are developing statistical models to isolate susceptible locations. Existing models predominantly employ the logistic regression algorithm; however, previous studies have …


Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods Jan 2019

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods

Undergraduate Research & Mentoring Program

In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the evaluation of …


An Elastic-Net Logistic Regression Approach To Generate Classifiers And Gene Signatures For Types Of Immune Cells And T Helper Cell Subsets, Arezo Torang, Paraag Gupta, David J. Klinke Ii Jan 2019

An Elastic-Net Logistic Regression Approach To Generate Classifiers And Gene Signatures For Types Of Immune Cells And T Helper Cell Subsets, Arezo Torang, Paraag Gupta, David J. Klinke Ii

Faculty & Staff Scholarship

Background: Host immune response is coordinated by a variety of different specialized cell types that vary in time and location. While host immune response can be studied using conventional low-dimensional approaches, advances in transcriptomics analysis may provide a less biased view. Yet, leveraging transcriptomics data to identify immune cell subtypes presents challenges for extracting informative gene signatures hidden within a high dimensional transcriptomics space characterized by low sample numbers with noisy and missing values. To address these challenges, we explore using machine learning methods to select gene subsets and estimate gene coefficients simultaneously. Results: Elastic-net logistic regression, a type of …


Application Of Machine Learning And Artificial Intelligence In Proxy Modeling For Fluid Flow In Porous Media, Shohreh Amini, Shahab Mohaghegh Jan 2019

Application Of Machine Learning And Artificial Intelligence In Proxy Modeling For Fluid Flow In Porous Media, Shohreh Amini, Shahab Mohaghegh

Faculty & Staff Scholarship

Reservoir simulation models are the major tools for studying fluid flow behavior in hydrocarbon reservoirs. These models are constructed based on geological models, which are developed by integrating data from geology, geophysics, and petro-physics. As the complexity of a reservoir simulation model increases, so does the computation time. Therefore, to perform any comprehensive study which involves thousands of simulation runs, a very long period of time is required. Several efforts have been made to develop proxy models that can be used as a substitute for complex reservoir simulation models. These proxy models aim at generating the outputs of the numerical …


Qoe Enhancement In Next Generation Wireless Ecosystems: A Machine Learning Approach, Eva Ibarrola, Mark Davis, Camille Voisin, Ciara Close, Leire Cristobo Jan 2019

Qoe Enhancement In Next Generation Wireless Ecosystems: A Machine Learning Approach, Eva Ibarrola, Mark Davis, Camille Voisin, Ciara Close, Leire Cristobo

Articles

Next-generation wireless ecosystems are expected to comprise heterogeneous technologies and diverse deployment scenarios. Ensuring quality of service (QoS) will be one of the major challenges on account of a variety of factors that are beyond the control of network and service providers in these environments. In this context, ITU-T is working on defining new Recommendations related to QoS and users' quality of experience (QoE) for the 5G era. Considering the new ITU-T QoS framework, we propose a methodology to develop a global QoS management model for next generation wireless ecosystems taking advantage of big data and machine learning (ML). The …