Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (26)
- Chulalongkorn University (16)
- Air Force Institute of Technology (11)
- Old Dominion University (11)
- University of Arkansas, Fayetteville (8)
-
- California Polytechnic State University, San Luis Obispo (6)
- New Jersey Institute of Technology (6)
- University of South Carolina (5)
- University of Wisconsin Milwaukee (5)
- Washington University in St. Louis (5)
- Missouri University of Science and Technology (4)
- University of Kentucky (4)
- University of Nevada, Las Vegas (4)
- University of South Florida (4)
- Nova Southeastern University (3)
- Louisiana State University (2)
- Northern Illinois University (2)
- Portland State University (2)
- Singapore Management University (2)
- University of Louisville (2)
- University of Massachusetts Amherst (2)
- University of New Orleans (2)
- University of Texas at El Paso (2)
- Walden University (2)
- Wayne State University (2)
- West Virginia University (2)
- Brigham Young University (1)
- Chapman University (1)
- Eastern Washington University (1)
- Grand Valley State University (1)
- Keyword
-
- Department of Computer Science and Engineering (26)
- Computer Science (21)
- Cybersecurity (10)
- Machine learning (10)
- Computer Engineering (9)
-
- Machine Learning (8)
- Center_CCR (6)
- Blockchain (5)
- Deep learning (5)
- Security (5)
- Robotics (4)
- Artificial intelligence (3)
- Automation (3)
- Classification (3)
- Deep Learning (3)
- Information Technology (3)
- Virtual Reality (3)
- Artificial Intelligence (2)
- Autonomous (2)
- Cloud Computing (2)
- Computer vision (2)
- Convolutional (2)
- Convolutional Neural Networks (2)
- FPGA (2)
- Geolocation (2)
- Internet of things (2)
- Matrix factorization (2)
- Neural (2)
- Neural Networks (2)
- Optimization (2)
- Publication
-
- Browse all Theses and Dissertations (26)
- Theses and Dissertations (22)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (16)
- Dissertations (6)
- Doctoral Dissertations (6)
-
- Electronic Theses and Dissertations (6)
- Graduate Theses and Dissertations (6)
- McKelvey School of Engineering Theses & Dissertations (5)
- Computer Engineering (4)
- Electrical & Computer Engineering Theses & Dissertations (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- USF Tampa Graduate Theses and Dissertations (4)
- CCE Theses and Dissertations (3)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Civil & Environmental Engineering Theses & Dissertations (2)
- Dissertations and Theses (2)
- Dissertations and Theses Collection (Open Access) (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Graduate Research Theses & Dissertations (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Honors Theses (2)
- Master's Theses (2)
- Masters Theses (2)
- Open Access Theses & Dissertations (2)
- Theses and Dissertations--Computer Science (2)
- University of New Orleans Theses and Dissertations (2)
- Walden Dissertations and Doctoral Studies (2)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- Chemical and Biological Engineering ETDs (1)
- Computational and Data Sciences (PhD) Dissertations (1)
Articles 1 - 30 of 157
Full-Text Articles in Engineering
Quantitative Metrics For Mutation Testing, Amani M. Ayad
Quantitative Metrics For Mutation Testing, Amani M. Ayad
Dissertations
Program mutation is the process of generating versions of a base program by applying elementary syntactic modifications; this technique has been used in program testing in a variety of applications, most notably to assess the quality of a test data set. A good test set will discover the difference between the original program and mutant except if the mutant is semantically equivalent to the original program, despite being syntactically distinct.
Equivalent mutants are a major nuisance in the practice of mutation testing, because they introduce a significant amount of bias and uncertainty in the analysis of test results; indeed, mutants …
Bio-Inspired Learning And Hardware Acceleration With Emerging Memories, Shruti R. Kulkarni
Bio-Inspired Learning And Hardware Acceleration With Emerging Memories, Shruti R. Kulkarni
Dissertations
Machine Learning has permeated many aspects of engineering, ranging from the Internet of Things (IoT) applications to big data analytics. While computing resources available to implement these algorithms have become more powerful, both in terms of the complexity of problems that can be solved and the overall computing speed, the huge energy costs involved remains a significant challenge. The human brain, which has evolved over millions of years, is widely accepted as the most efficient control and cognitive processing platform. Neuro-biological studies have established that information processing in the human brain relies on impulse like signals emitted by neurons called …
Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin
Finding A Viable Neural Network Architecture For Use With Upper Limb Prosthetics, Maxwell Lavin
Master of Science in Computer Science Theses
This paper attempts to answer the question of if it’s possible to produce a simple, quick, and accurate neural network for the use in upper-limb prosthetics. Through the implementation of convolutional and artificial neural networks and feature extraction on electromyographic data different possible architectures are examined with regards to processing time, complexity, and accuracy. It is found that the most accurate architecture is a multi-entry categorical cross entropy convolutional neural network with 100% accuracy. The issue is that it is also the slowest method requiring 9 minutes to run. The next best method found was a single-entry binary cross entropy …
An Application Of Deep Learning Models To Automate Food Waste Classification, Alejandro Zachary Espinoza
An Application Of Deep Learning Models To Automate Food Waste Classification, Alejandro Zachary Espinoza
Dissertations and Theses
Food wastage is a problem that affects all demographics and regions of the world. Each year, approximately one-third of food produced for human consumption is thrown away. In an effort to track and reduce food waste in the commercial sector, some companies utilize third party devices which collect data to analyze individual contributions to the global problem. These devices track the type of food wasted (such as vegetables, fruit, boneless chicken, pasta) along with the weight. Some devices also allow the user to leave the food in a kitchen container while it is weighed, so the container weight must also …
Image Restoration Using Automatic Damaged Regions Detection And Machine Learning-Based Inpainting Technique, Chloe Martin-King
Image Restoration Using Automatic Damaged Regions Detection And Machine Learning-Based Inpainting Technique, Chloe Martin-King
Computational and Data Sciences (PhD) Dissertations
In this dissertation we propose two novel image restoration schemes. The first pertains to automatic detection of damaged regions in old photographs and digital images of cracked paintings. In cases when inpainting mask generation cannot be completely automatic, our detection algorithm facilitates precise mask creation, particularly useful for images containing damage that is tedious to annotate or difficult to geometrically define. The main contribution of this dissertation is the development and utilization of a new inpainting technique, region hiding, to repair a single image by training a convolutional neural network on various transformations of that image. Region hiding is also …
Evaluating The Resiliency Of Industrial Internet Of Things Process Control Using Protocol Agnostic Attacks, Hector L. Roldan
Evaluating The Resiliency Of Industrial Internet Of Things Process Control Using Protocol Agnostic Attacks, Hector L. Roldan
Theses and Dissertations
Improving and defending our nation's critical infrastructure has been a challenge for quite some time. A malfunctioning or stoppage of any one of these systems could result in hazardous conditions on its supporting populace leading to widespread damage, injury, and even death. The protection of such systems has been mandated by the Office of the President of the United States of America in Presidential Policy Directive Order 21. Current research now focuses on securing and improving the management and efficiency of Industrial Control Systems (ICS). IIoT promises a solution in enhancement of efficiency in ICS. However, the presence of IIoT …
Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha
Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha
Graduate Theses and Dissertations
This thesis develops an approach to extract social networks from literary prose, namely, Jane Austen’s published novels from eighteenth- and nineteenth- century. Dialogue interaction plays a key role while we derive the networks, thus our technique relies upon our ability to determine when two characters are in conversation. Our process involves encoding plain literary text into the Text Encoding Initiative’s (TEI) XML format, character name identification, conversation and co-occurrence detection, and social network construction. Previous work in social network construction for literature have focused on drama, specifically manually TEI-encoded Shakespearean plays in which character interactions are much easier to track …
Scatter Reduction By Exploiting Behaviour Of Convolutional Neural Networks In Frequency Domain, Carlos Ivan Jerez Gonzalez
Scatter Reduction By Exploiting Behaviour Of Convolutional Neural Networks In Frequency Domain, Carlos Ivan Jerez Gonzalez
Theses and Dissertations
In X-ray imaging, scattered radiation can produce a number of artifacts that greatly
undermine the image quality. There are hardware solutions, such as anti-scatter grids.
However, they are costly. A software-based solution is a better option because it is
cheaper and can achieve a higher scatter reduction. Most of the current software-based
approaches are model-based. The main issues with them are the lack of flexibility, expressivity, and the requirement of a model. In consideration of this, we decided to apply
Convolutional Neural Networks (CNNs), since they do not have any of the previously
mentioned issues.
In our approach we split …
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Doctoral Dissertations
Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them. In this thesis, I argue that the IoT …
Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh
Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh
Doctoral Dissertations
Society has benefited from the technological revolution and the tremendous growth in computing powered by Moore's law. However, we are fast approaching the ultimate physical limits in terms of both device sizes and the associated energy dissipation. It is important to characterize these limits in a physically grounded and implementation-agnostic manner, in order to capture the fundamental energy dissipation costs associated with performing computing operations with classical information in nano-scale quantum systems. It is also necessary to identify and understand the effect of quantum in-distinguishability, noise, and device variability on these dissipation limits. Identifying these parameters is crucial to designing …
A Gpu-Based Framework For Parallel Spatial Indexing And Query Processing, Zhila Nouri Lewis
A Gpu-Based Framework For Parallel Spatial Indexing And Query Processing, Zhila Nouri Lewis
USF Tampa Graduate Theses and Dissertations
Support for efficient spatial data storage and retrieval have become a vital component in almost all spatial database systems. Previous work has shown the importance of using spatial indexing and parallel computing to speed up such tasks. While GPUs have become a mainstream platform for high-throughput data processing in recent years, exploiting the massively parallel processing power of GPUs is non-trivial. Current approaches that parallelize one query at a time have low work efficiency and cannot make good use of GPU resources. On the other hand, many spatial database applications are busy systems in which a large number of queries …
Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti
Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti
Computational Modeling & Simulation Engineering Theses & Dissertations
The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development …
Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin
Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin
Electrical & Computer Engineering Theses & Dissertations
The feedback interconnection of two systems written in terms of Chen-Fliess series can be described explicitly in terms of the antipode of the output feedback Hopf algebra. At present, there are three known computational approaches to calculating this antipode: the left coproduct method, the right coproduct method, and the derivation method. Each of these algorithms is defined recursively, and thus becomes computationally expensive quite quickly. This motivates the need for a more complete understanding of the algorithmic complexity of these methods, as well as the development of new approaches for determining the Hopf algebra antipode. The main goals of this …
Big-Data Talent Analytics In The Public Sector: A Promotion And Firing Model Of Employees At Federal Agencies, Rabih Neouchi
Big-Data Talent Analytics In The Public Sector: A Promotion And Firing Model Of Employees At Federal Agencies, Rabih Neouchi
Operations Research and Engineering Management Theses and Dissertations
Talent analytics is a relatively new area of focus to researchers working in analytics and data science. Talent Analytics has the potential to help companies make many informed critical decisions around talent acquisition, promotion and retention. This work investigates data science to predict “shiny star” employees in the U.S. public sector, defined as top-notch performers over the years of a given time span. Its scope falls within talent analytics, also called people analytics, a relatively new research area.
We clean a data set made available by the U.S. Office of Personnel Management (OPM) and present two models to predict the …
Challenges In Large-Scale Machine Learning Systems: Security And Correctness, Emad Alsuwat
Challenges In Large-Scale Machine Learning Systems: Security And Correctness, Emad Alsuwat
Theses and Dissertations
In this research, we address the impact of data integrity on machine learning algorithms. We study how an adversary could corrupt Bayesian network structure learning algorithms by inserting contaminated data items. We investigate the resilience of two commonly used Bayesian network structure learning algorithms, namely the PC and LCD algorithms, against data poisoning attacks that aim to corrupt the learned Bayesian network model.
Data poisoning attacks are one of the most important emerging security threats against machine learning systems. These attacks aim to corrupt machine learning models by con- taminating datasets in the training phase. The lack of resilience of …
Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson
Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson
Electrical & Computer Engineering Theses & Dissertations
Raman spectroscopy is a powerful analysis technique that has found applications in fields such as analytical chemistry, planetary sciences, and medical diagnostics. Recent studies have shown that analysis of Raman spectral profiles can be greatly assisted by use of computational models with achievements including high accuracy pure sample classification with imbalanced data sets and detection of ideal sample deviations for pharmaceutical quality control. The adoption of automated methods is a necessary step in streamlining the analysis process as Raman hardware becomes more advanced. Due to limits in the architectures of current machine learning based Raman classification models, transfer from pure …
Feature Space Modeling For Accurate And Efficient Learning From Non-Stationary Data, Ayesha Akter
Feature Space Modeling For Accurate And Efficient Learning From Non-Stationary Data, Ayesha Akter
Doctoral Dissertations
A non-stationary dataset is one whose statistical properties such as the mean, variance, correlation, probability distribution, etc. change over a specific interval of time. On the contrary, a stationary dataset is one whose statistical properties remain constant over time. Apart from the volatile statistical properties, non-stationary data poses other challenges such as time and memory management due to the limitation of computational resources mostly caused by the recent advancements in data collection technologies which generate a variety of data at an alarming pace and volume. Additionally, when the collected data is complex, managing data complexity, emerging from its dimensionality and …
Stacked Modelling Framework, Kareem Abdelfatah
Stacked Modelling Framework, Kareem Abdelfatah
Theses and Dissertations
The thesis develops a predictive modeling framework based on stacked Gaussian processes and applies it to two main applications in environmental and chemical en- gineering. First, a network of independently trained Gaussian processes (StackedGP) is introduced to obtain analytical predictions of quantities of interest (model out- puts) with quantified uncertainties. StackedGP framework supports component- based modeling in different fields such as environmental and chemical science, en- hances predictions of quantities of interest through a cascade of intermediate predic- tions usually addressed by cokriging, and propagates uncertainties through emulated dynamical systems driven by uncertain forcing variables. By using analytical first and …
Properties, Learning Algorithms, And Applications Of Chain Graphs And Bayesian Hypergraphs, Mohammad Ali Javidian
Properties, Learning Algorithms, And Applications Of Chain Graphs And Bayesian Hypergraphs, Mohammad Ali Javidian
Theses and Dissertations
Probabilistic graphical models (PGMs) use graphs, either undirected, directed, or mixed, to represent possible dependencies among the variables of a multivariate probability distri- bution. PGMs, such as Bayesian networks and Markov networks, are now widely accepted as a powerful and mature framework for reasoning and decision making under uncertainty in knowledge-based systems. With the increase of their popularity, the range of graphical models being investigated and used has also expanded. Several types of graphs with dif- ferent conditional independence interpretations - also known as Markov properties - have been proposed and used in graphical models.
The graphical structure of a …
Cybersecurity Issues In The Context Of Cryptographic Shuffling Algorithms And Concept Drift: Challenges And Solutions, Hatim Alsuwat
Cybersecurity Issues In The Context Of Cryptographic Shuffling Algorithms And Concept Drift: Challenges And Solutions, Hatim Alsuwat
Theses and Dissertations
In this dissertation, we investigate and address two kinds of data integrity threats. We first study the limitations of secure cryptographic shuffling algorithms regarding preservation of data dependencies. We then study the limitations of machine learning models regarding concept drift detection. We propose solutions to address these threats.
Shuffling Algorithms have been used to protect the confidentiality of sensitive data. However, these algorithms may not preserve data dependencies, such as functional de- pendencies and data-driven associations. We present two solutions for addressing these shortcomings: (1) Functional dependencies preserving shuffle, and (2) Data-driven asso- ciations preserving shuffle. For preserving functional dependencies, …
Person Identification With Convolutional Neural Networks, Kang Zheng
Person Identification With Convolutional Neural Networks, Kang Zheng
Theses and Dissertations
Person identification aims at matching persons across images or videos captured by different cameras, without requiring the presence of persons’ faces. It is an important problem in computer vision community and has many important real-world applica- tions, such as person search, security surveillance, and no-checkout stores. However, this problem is very challenging due to various factors, such as illumination varia- tion, view changes, human pose deformation, and occlusion. Traditional approaches generally focus on hand-crafting features and/or learning distance metrics for match- ing to tackle these challenges. With Convolutional Neural Networks (CNNs), feature extraction and metric learning can be combined in …
Preference Learning And Similarity Learning Perspectives On Personalized Recommendation, Duy Dung Le
Preference Learning And Similarity Learning Perspectives On Personalized Recommendation, Duy Dung Le
Dissertations and Theses Collection (Open Access)
Personalized recommendation, whose objective is to generate a limited list of items (e.g., products on Amazon, movies on Netflix, or pins on Pinterest, etc.) for each user, has gained extensive attention from both researchers and practitioners in the last decade. The necessity of personalized recommendation is driven by the explosion of available options online, which makes it difficult, if not downright impossible, for each user to investigate every option. Product and service providers rely on recommendation algorithms to identify manageable number of the most likely or preferred options to be presented to each user. Also, due to the limited screen …
Optimal Sampling Paths For Autonomous Vehicles In Uncertain Ocean Flows, Andrew J. De Stefan
Optimal Sampling Paths For Autonomous Vehicles In Uncertain Ocean Flows, Andrew J. De Stefan
Dissertations
Despite an extensive history of oceanic observation, researchers have only begun to build a complete picture of oceanic currents. Sparsity of instrumentation has created the need to maximize the information extracted from every source of data in building this picture. Within the last few decades, autonomous vehicles, or AVs, have been employed as tools to aid in this research initiative. Unmanned and self-propelled, AVs are capable of spending weeks, if not months, exploring and monitoring the oceans. However, the quality of data acquired by these vehicles is highly dependent on the paths along which they collect their observational data. The …
Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham
Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham
McKelvey School of Engineering Theses & Dissertations
The power of Information-Centric Networking architectures (ICNs) lies in their abstraction for communication --- the request for named data. This abstraction was popularized by the HyperText Transfer Protocol (HTTP) as an application-layer abstraction, and was extended by ICNs to also serve as their network-layer abstraction. In recent years, network mechanisms for ICNs, such as scalable name-based forwarding, named-data routing and in-network caching, have been widely explored and researched. However, to the best of our knowledge, the impact of this network abstraction on ICN applications has not been explored or well understood. The motivation of this dissertation is to address this …
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Theses and Dissertations
The IT Education Specialist for the USBE, Brandon Jacobson, stated:I feel there is a deficiency of and therefore a need to teach Cybersecurity.Cybersecurity is the “activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation” (NICE, 2018). Practicing cybersecurity can increase awareness of cybersecurity issues, such as theft of sensitive information. Current efforts, including but not limited to, cybersecurity camps, competitions, college courses, and conferences, have been created to better prepare cyber citizens nationwide for such cybersecurity occurrences. In …
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Electronic Theses and Dissertations
This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …
Model Augmented Deep Neural Networks For Medical Image Reconstruction Problems, Hongquan Zuo
Model Augmented Deep Neural Networks For Medical Image Reconstruction Problems, Hongquan Zuo
Theses and Dissertations
Solving an ill-posed inverse problem is difficult because it doesn't have a unique solution. In practice, for some important inverse problems, the conventional methods, e.g. ordinary least squares and iterative methods, cannot provide a good estimate. For example, for single image super-resolution and CT reconstruction, the results of these conventional methods cannot satisfy the requirements of these applications. While having more computational resources and high-quality data, researchers try to use machine-learning-based methods, especially deep learning to solve these ill-posed problems. In this dissertation, a model augmented recursive neural network is proposed as a general inverse problem method to solve these …
Automatic Methods To Enhance The Quality Of Colonoscopy Video, Nidhal Kareem Shukur Azawi
Automatic Methods To Enhance The Quality Of Colonoscopy Video, Nidhal Kareem Shukur Azawi
Graduate Theses and Dissertations
Colonoscopy is a form of endoscopy because it uses colonoscopy device to help the doctor to understand a colon patient. Enhancing the quality of Colonoscopy images is a challenge because of the wet and dynamic environment inside the colon causes many problems even the colonoscope devise has a good quality. Some of these problems are blurriness, specular highlights shiny areas.
In this work, different kinds of techniques have been investigated in order to improve the quality of colonoscopy images. Also, variety of preprocessing approaches (removing bad images, resizing images, median filtration with and without image resizing) have been conducted to …
Developing 5gl Concepts From User Interactions, David Stuckless Meyer
Developing 5gl Concepts From User Interactions, David Stuckless Meyer
Masters Theses
In the fulfilling of the contracts generated in Test Driven Development, a developer could be said to act as a constraint solver, similar to those used by a 5th Generation Language(5GL). This thesis presents the hypothesis that 5GL linguistic mechanics, such as facts, rules and goals, will be emergent in the communications of developer pairs performing Test Driven Development, validating that 5GL syntax is congruent with the ways that practitioners communicate. Along the way, nomenclatures and linguistic patterns may be observed that could inform the design of future 5GL languages.
Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu
Electrical & Computer Engineering Theses & Dissertations
This dissertation presents a computer-aided diagnosis (CAD) system using deep learning approaches for lesion detection and classification on whole-slide images (WSIs) with breast cancer. The deep features being distinguishing in classification from the convolutional neural networks (CNN) are demonstrated in this study to provide comprehensive interpretability for the proposed CAD system using the domain knowledge in pathology. In the experiment, a total of 186 slides of WSIs were collected and classified into three categories: Non-Carcinoma, Ductal Carcinoma in Situ (DCIS), and Invasive Ductal Carcinoma (IDC). Instead of conducting pixel-wise classification (segmentation) into three classes directly, a hierarchical framework with the …