Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Deep learning

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 75

Full-Text Articles in Engineering

A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek Dec 2020

A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek

Dissertations

The introduction of deep learning and big data analytics may significantly elevate the performance of traffic speed prediction. Work zones become one of the most critical factors causing congestion impact, which reduces the mobility as well as traffic safety. A comprehensive literature review on existing work zone delay prediction models (i.e., parametric, simulation and non-parametric models) is conducted in this research. The research shows the limitations of each model. Moreover, most previous modeling approaches did not consider user delay for connected freeways when predicting traffic speed under work zone conditions. This research proposes Deep Artificial Neural Network (Deep ANN) and …


Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue Dec 2020

Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue

Theses

In the past decades, Human Activity Recognition (HAR) grabbed considerable research attentions from a wide range of pattern recognition and human–computer interaction researchers due to its prominent applications such as smart home health care. The wealth of information requires efficient classification and analysis methods. Deep learning represents a promising technique for large-scale data analytics. There are various ways of using different sensors for human activity recognition in a smartly controlled environment. Among them, physical human activity recognition through wearable sensors provides valuable information about an individual’s degree of functional ability and lifestyle. There is abundant research that works upon real …


An Efficient Deep-Learning-Based Detection And Classification System For Cyber-Attacks In Iot Communication Networks, Qasem Abu Al-Haija, Saleh Zein-Sabatto Dec 2020

An Efficient Deep-Learning-Based Detection And Classification System For Cyber-Attacks In Iot Communication Networks, Qasem Abu Al-Haija, Saleh Zein-Sabatto

Electrical and Computer Engineering Faculty Research

With the rapid expansion of intelligent resource-constrained devices and high-speed communication technologies, the Internet of Things (IoT) has earned wide recognition as the primary standard for low-power lossy networks (LLNs). Nevertheless, IoT infrastructures are vulnerable to cyber-attacks due to the constraints in computation, storage, and communication capacity of the endpoint devices. From one side, the majority of newly developed cyber-attacks are formed by slightly mutating formerly established cyber-attacks to produce a new attack that tends to be treated as normal traffic through the IoT network. From the other side, the influence of coupling the deep learning techniques with the cybersecurity …


Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, ‪Alexander Glandon, Khan M. Iftekharuddin Dec 2020

Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, ‪Alexander Glandon, Khan M. Iftekharuddin

Computer Science Faculty Research

This survey presents a review of state-of-the-art deep neural network architectures, algorithms, and systems in speech and vision applications. Recent advances in deep artificial neural network algorithms and architectures have spurred rapid innovation and development of intelligent speech and vision systems. With availability of vast amounts of sensor data and cloud computing for processing and training of deep neural networks, and with increased sophistication in mobile and embedded technology, the next-generation intelligent systems are poised to revolutionize personal and commercial computing. This survey begins by providing background and evolution of some of the most successful deep learning models for intelligent …


Automated Intelligent Cueing Device To Improve Ambient Gait Behaviors For Patients With Parkinson's Disease, Nader Naghavi Dec 2020

Automated Intelligent Cueing Device To Improve Ambient Gait Behaviors For Patients With Parkinson's Disease, Nader Naghavi

Doctoral Dissertations

Freezing of gait (FoG) is a common motor dysfunction in individuals with Parkinson’s disease (PD). FoG impairs walking and is associated with increased fall risk. Although pharmacological treatments have shown promise during ON-medication periods, FoG remains difficult to treat during medication OFF state and in advanced stages of the disease. External cueing therapy in the forms of visual, auditory, and vibrotactile, has been effective in treating gait deviations. Intelligent (or on-demand) cueing devices are novel systems that analyze gait patterns in real-time and activate cues only at moments when specific gait alterations are detected. In this study we developed methods …


Traffic Time Headway Prediction And Analysis: A Deep Learning Approach, Saumik Sakib Bin Masud Dec 2020

Traffic Time Headway Prediction And Analysis: A Deep Learning Approach, Saumik Sakib Bin Masud

Theses and Dissertations

In the modern world of Intelligent Transportation System (ITS), time headway is a key traffic flow parameter affecting ITS operations and planning. Defined as “the time difference between any two successive vehicles when they cross a given point”, time headway is used in various traffic and transportation engineering research domains, such as capacity analysis, safety studies, car-following, and lane-changing behavior modeling, and level of service evaluation describing stochastic features of traffic flow. Advanced travel and headway information can also help road users avoid traffic congestion through dynamic route planning, for instance. Hence, it is crucial to accurately model headway distribution …


Multiphoton Microscopy And Deep Learning Neural Networks For The Automated Quantification Of In Vivo, Label-Free Optical Biomarkers Of Skin Wound Healing, Jake D. Jones Dec 2020

Multiphoton Microscopy And Deep Learning Neural Networks For The Automated Quantification Of In Vivo, Label-Free Optical Biomarkers Of Skin Wound Healing, Jake D. Jones

Graduate Theses and Dissertations

Non-healing ulcerative wounds that occur frequently in diseases such as diabetes are challenging to diagnose and treat due to numerous possible etiologies and the variable efficacy of wound care products. With advanced age, skin wound healing is often delayed, leaving elderly patients at high risk for developing these chronic injuries. As it is challenging to discriminate age-related delays from disease-related chronicity, there is a critical need to develop new quantitative biomarkers that are sensitive to wound status. Multiphoton microscopy (MPM) techniques are well-suited for 3D imaging of epithelia and are capable of non-invasively detecting metabolic cofactors (NADH and FAD) without …


Deep Learning-Based, Passive Fault Tolerant Control Facilitated By A Taxonomy Of Cyber-Attack Effects, Dean C. Wardell Dec 2020

Deep Learning-Based, Passive Fault Tolerant Control Facilitated By A Taxonomy Of Cyber-Attack Effects, Dean C. Wardell

Theses and Dissertations

In the interest of improving the resilience of cyber-physical control systems to better operate in the presence of various cyber-attacks and/or faults, this dissertation presents a novel controller design based on deep-learning networks. This research lays out a controller design that does not rely on fault or cyber-attack detection. Being passive, the controller’s routine operating process is to take in data from the various components of the physical system, holistically assess the state of the physical system using deep-learning networks and decide the subsequent round of commands from the controller. This use of deep-learning methods in passive fault tolerant control …


A Real-Time And Adaptive-Learning Malware Detection Method Based On Api-Pair Graph, Shaojie Yang, Shanxi Li, Wenbo Chen, Yuhong Liu Nov 2020

A Real-Time And Adaptive-Learning Malware Detection Method Based On Api-Pair Graph, Shaojie Yang, Shanxi Li, Wenbo Chen, Yuhong Liu

Computer Science and Engineering

The detection of malware have developed for many years, and the appearance of new machine learning and deep learning techniques have improved the effect of detectors. However, most of current researches have focused on the general features of malware and ignored the development of the malware themselves, so that the features could be useless with the time passed as well as the advance of malware techniques. Besides, the detection methods based on machine learning are mainly static detection and analysis, while the study of real-time detection of malware is relatively rare. In this article, we proposed a new model that …


A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar Nov 2020

A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar

Library Philosophy and Practice (e-journal)

In the 21st century, clothing fashion has become an inevitable part of every individual human as it is considered a way to express their personality to the outside world. Currently the traditional fashion business models are experiencing a paradigm shift from being an experience-based business strategy implementation to a data driven intelligent business improvisation. Artificial Intelligence is acting as a catalyst to achieve the infusion of data intelligence into the fashion industry which aims at fostering all the business brackets such as supply chain management, trend analysis, fashion recommendation, sales forecasting, digitized shopping experience etc. The field of “Fashion …


Towards Real-Time Reinforcement Learning Control Of A Wave Energy Converter, Enrico Anderlini, Salman Husain, Gordon Parker, Mohammad Abusara, Giles Thomas Nov 2020

Towards Real-Time Reinforcement Learning Control Of A Wave Energy Converter, Enrico Anderlini, Salman Husain, Gordon Parker, Mohammad Abusara, Giles Thomas

Michigan Tech Publications

The levellised cost of energy of wave energy converters (WECs) is not competitive with fossil fuel-powered stations yet. To improve the feasibility of wave energy, it is necessary to develop effective control strategies that maximise energy absorption in mild sea states, whilst limiting motions in high waves. Due to their model-based nature, state-of-the-art control schemes struggle to deal with model uncertainties, adapt to changes in the system dynamics with time, and provide real-time centralised control for large arrays of WECs. Here, an alternative solution is introduced to address these challenges, applying deep reinforcement learning (DRL) to the control of WECs …


A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade Oct 2020

A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade

Library Philosophy and Practice (e-journal)

Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of implementation and accuracy provides it with a broader scope. The face recognition systems are vulnerable to some extent and are attacked by performing different types of attacks using a variety of techniques. The term used to describe the measures taken to prevent these types of attacks is known as face anti spoofing. Research has been carried on since decades to design systems that are robust against these attacks. The focus of the work in this paper is to explore the area of face …


Organ Segmentation Of Pediatric Computed Tomography (Ct) With Generative Adversarial Networks, Chi Nok Enoch Kan Oct 2020

Organ Segmentation Of Pediatric Computed Tomography (Ct) With Generative Adversarial Networks, Chi Nok Enoch Kan

Master's Theses (2009 -)

Accurately segmenting organs in abdominal computed tomography (CT) is crucial for many clinical applications such as organ-specific dose estimation. With the recent emergence of deep learning techniques for computer vision, many powerful frameworks are proposed for organ segmentation in abdominal CT images. A major problem with these state-of-the-art methods is that they depend on large amounts of training data to achieve high segmentation accuracy. Pediatric abdominal CTs are particularly hard to obtain since these children are much more sensitive to ionizing radiation than adults. It is extremely challenging to train automatic segmentation algorithms on pediatric CT volumes. To address these …


Deep Learning For Quantitative Susceptibility Mapping Reconstruction, Juan Liu Oct 2020

Deep Learning For Quantitative Susceptibility Mapping Reconstruction, Juan Liu

Dissertations (1934 -)

Quantitative susceptibility mapping (QSM) is a magnetic resonance imaging (MRI) technique that estimates tissue magnetic susceptibility from Larmor frequency offset measurements. The generation of QSM requires solving ill-posed background field removal (BFR) and field-to-source inversion problems. Incorrect BFR often introduces erroneous local field outputs and subsequently affects susceptibility quantification accuracy. Inaccurate field-to-source inversion often causes large susceptibility estimation errors that appear as streaking artifacts in the QSM, especially in massive hemorrhagic regions. Because current QSM techniques struggle to generate reliable QSM, the clinical translation of QSM is greatly hindered. Recently, deep learning (DL) has achieved state-of-the-art performance in many computer …


Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel Sep 2020

Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel

Theses and Dissertations

The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …


Material Evaluation And Structural Monitoring Of Early-Age Masonry Structures, Kyle Dunphy Aug 2020

Material Evaluation And Structural Monitoring Of Early-Age Masonry Structures, Kyle Dunphy

Electronic Thesis and Dissertation Repository

During the initial construction period, “early-age” masonry walls are susceptible to lateral loads induced by wind or earthquake, which may result in damages or catastrophic failures. To mitigate such consequences at construction sites, temporary bracings are adopted to provide lateral support to masonry walls until they are matured enough to serve as the inherent lateral system of the structure. However, current temporary bracing guidelines provide oversimplified design due to the lack of available information on the material properties of early-age masonry. Moreover, there are no existing techniques for monitoring masonry walls to detect cracks due to construction activities. …


Exploring The Efficacy Of Transfer Learning In Mining Image‑Based Software Artifacts, Natalie Best, Jordan Ott, Erik J. Linstead Aug 2020

Exploring The Efficacy Of Transfer Learning In Mining Image‑Based Software Artifacts, Natalie Best, Jordan Ott, Erik J. Linstead

Engineering Faculty Articles and Research

Background

Transfer learning allows us to train deep architectures requiring a large number of learned parameters, even if the amount of available data is limited, by leveraging existing models previously trained for another task. In previous attempts to classify image-based software artifacts in the absence of big data, it was noted that standard off-the-shelf deep architectures such as VGG could not be utilized due to their large parameter space and therefore had to be replaced by customized architectures with fewer layers. This proves to be challenging to empirical software engineers who would like to make use of existing architectures without …


Graphical Convolution Network Based Semi-Supervised Methods For Detecting Pmu Data Manipulation Attacks, Wenyu Wang Aug 2020

Graphical Convolution Network Based Semi-Supervised Methods For Detecting Pmu Data Manipulation Attacks, Wenyu Wang

Theses and Dissertations

With the integration of information and communications technologies (ICTs) into the power grid, electricity infrastructures are gradually transformed towards smart grid and power systems become more open to and accessible from outside networks. With ubiquitous sensors, computers and communication networks, modern power systems have become complicated cyber-physical systems. The cyber security issues and the impact of potential attacks on the smart grid have become an important issue. Among these attacks, false data injection attack (FDIA) becomes a growing concern because of its varied types and impacts. Several detection algorithms have been developed in the last few years, which were model-based, …


Deep Learning For Remote Sensing Image Processing, Yan Lu Aug 2020

Deep Learning For Remote Sensing Image Processing, Yan Lu

Computational Modeling & Simulation Engineering Theses & Dissertations

Remote sensing images have many applications such as ground object detection, environmental change monitoring, urban growth monitoring and natural disaster damage assessment. As of 2019, there were roughly 700 satellites listing “earth observation” as their primary application. Both spatial and temporal resolutions of satellite images have improved consistently in recent years and provided opportunities in resolving fine details on the Earth's surface. In the past decade, deep learning techniques have revolutionized many applications in the field of computer vision but have not fully been explored in remote sensing image processing. In this dissertation, several state-of-the-art deep learning models have been …


Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning Aug 2020

Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning

Electrical & Computer Engineering Theses & Dissertations

Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.

First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …


A Survey On Visual Slam Based On Deep Learning, Ruijun Liu, Xiangshang Wang, Zhang Chen, Bohua Zhang Jul 2020

A Survey On Visual Slam Based On Deep Learning, Ruijun Liu, Xiangshang Wang, Zhang Chen, Bohua Zhang

Journal of System Simulation

Abstract: Following the development of computer vision and robotics, visual Simultaneous Localization and Mapping becomes a research focus in the field of unmanned systems. The powerful advantages of deep learning in the image processing offer a huge opportunity to the wide combination of the two fields. The outstanding research achievements of deep learning combined with visual odometry, loop closure detection and semantic Simultaneous Localization and Mapping are summarized. A comparison between the traditional algorithm and method based on deep learning is carried out. The development direction of visual Simultaneous Localization and Mapping based on deep learning is …


Human Depth Maps Restoration Based On Guided Gan, Jingfang Yin, Dengming Zhu, Shi Min, Zhaoqi Wang Jul 2020

Human Depth Maps Restoration Based On Guided Gan, Jingfang Yin, Dengming Zhu, Shi Min, Zhaoqi Wang

Journal of System Simulation

Abstract: The depth maps captured by a small depth camera on mobile devices suffer from the problem of severe holes. The Guided Generative Adversarial Network (Guided GAN) based on deep learning is proposed to restore human depth maps with above problems. The high-precision human segmentation features and depth class features are extracted from the monocular RGB image by the guider based on the stacked hourglass network. The holes in the human depth maps are filled by the special generator under the guidance of the extracted human features. In order to get the more realistic results, the discriminator is introduced …


Noisy Importance Sampling Actor-Critic: An Off-Policy Actor-Critic With Experience Replay, Miriam A M Capretz, Norman Tasfi Jul 2020

Noisy Importance Sampling Actor-Critic: An Off-Policy Actor-Critic With Experience Replay, Miriam A M Capretz, Norman Tasfi

Electrical and Computer Engineering Publications

This paper presents Noisy Importance Sampling Actor-Critic (NISAC), a set of empirically validated modifications to the advantage actor-critic algorithm (A2C), allowing off-policy reinforcement learning and increased performance. NISAC uses additive action space noise, aggressive truncation of importance sample weights, and large batch sizes. We see that additive noise drastically changes how off-sample experience is weighted for policy updates. The modified algorithm achieves an increase in convergence speed and sample efficiency compared to both the on-policy actor-critic A2C and the importance weighted off-policy actor-critic algorithm. In comparison to state-of-the-art (SOTA) methods, such as actor-critic with experience replay (ACER), NISAC nears the …


A Self Controlled Rdp Approach For Feature Extraction In Online Handwriting Recognition Using Deep Learning, Sukhdeep Singh, Vinod Kumar Chauhan, Elisa H. Barney Smith Jul 2020

A Self Controlled Rdp Approach For Feature Extraction In Online Handwriting Recognition Using Deep Learning, Sukhdeep Singh, Vinod Kumar Chauhan, Elisa H. Barney Smith

Electrical and Computer Engineering Faculty Publications and Presentations

The identification of accurate features is the initial task for benchmarked handwriting recognition. For handwriting recognition, the objective of feature computation is to find those characteristics of a handwritten stroke that depict the class of a stroke and make it separable from the rest of the stroke classes. The present study proposes a feature extraction technique for online handwritten strokes based on a self controlled Ramer-Douglas-Peucker (RDP) algorithm. This novel approach prepares a smaller length feature vector for different shaped online handwritten strokes without preprocessing and without any control parameter to RDP. Thus, it also overcomes the shortcomings of the …


Holiday Highway Traffic Flow Prediction Method Based On Deep Learning, Xiaofeng Ji, Yicheng Ge Jun 2020

Holiday Highway Traffic Flow Prediction Method Based On Deep Learning, Xiaofeng Ji, Yicheng Ge

Journal of System Simulation

Abstract: Accurately predicting highway traffic holiday flow can provide important data for the emergency management of highway. The LSTM-SVR prediction model is established by using the theoretical framework of deep learning. The BP neural network is used to process the sample data, and the data features captured by LSTM are input into the SVR regression layer to realize the traffic flow prediction. Before and after the “Eleventh” Golden Week, the LSTM-SVR model was verified by using the traffic monitoring data of the intermodulation station in Lijiang City and the prediction results were compared with the others. It is found that …


Action Recognition Using The Motion Taxonomy, Maxat Alibayev Jun 2020

Action Recognition Using The Motion Taxonomy, Maxat Alibayev

USF Tampa Graduate Theses and Dissertations

In the last years, modern action recognition frameworks with deep architectures have achieved impressive results on the large-scale activity datasets. All state-of-the-art models share one common attribute: two-stream architectures. One deep model takes RGB frames, while the other model is fed with pre-computed optical flow vectors. The outputs of both models are combined to be used as a final probability distribution for the action classes. When comparing the results of individual models with the fused model, it is common to see that that latter method is more superior. Researchers explain that phenomena with the fact that optical flow vectors serve …


Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez Jun 2020

Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez

Conference papers

Accurate traffic classification is fundamentally important for various network activities such as fine-grained network management and resource utilisation. Port-based approaches, deep packet inspection and machine learning are widely used techniques to classify and analyze network traffic flows. However, over the past several years, the growth of Internet traffic has been explosive due to the greatly increased number of Internet users. Therefore, both port-based and deep packet inspection approaches have become inefficient due to the exponential growth of the Internet applications that incurs high computational cost. The emerging paradigm of software-defined networking has reshaped the network architecture by detaching the control …


A Cnn Based Cognitive Method To Battlefields Encompassing Situation With Insufficient Samples, Zhu Feng, Xiaofeng Hu, Xiaoyuan He, Yisi Kong, Yang Lu Jun 2020

A Cnn Based Cognitive Method To Battlefields Encompassing Situation With Insufficient Samples, Zhu Feng, Xiaofeng Hu, Xiaoyuan He, Yisi Kong, Yang Lu

Journal of System Simulation

Abstract: To research the issue of how to grasp the commander's cognitive experience successfully and effectively facing to battlefields sight map, Convolution Neural Network (CNN) as a kind of the typical algorithm in deep learning can provide the key ways. However, CNN needs the enough samples for running. These samples are hardly to achieve for the time being. Aimed at these problems, some exploring researches were carried out. The issues of battlefields encompassing situation cognition met generally in the warfare and lacking enough samples were discussed. On the basis of analyzing the image characteristics of battlefields encompassing situation and the …


Travel Time Prediction Of Urban Road Based On Deep Learning, Weiwei Zhang, Ruimin Li, Zhongjiao Xie Jun 2020

Travel Time Prediction Of Urban Road Based On Deep Learning, Weiwei Zhang, Ruimin Li, Zhongjiao Xie

Journal of System Simulation

Abstract: Travel time prediction of urban road is a significant support for urban intelligent transportation system. Four types of LSTM neural network architecture were selected to predict the urban road travel time. The number of nodes in the LSTM hidden layer was fixed to determine the optimal input length of the model. The input length of the model was fixed and the predictive performance of the four LSTM models under different hidden layer nodes and considering spatial correlation were tested respectively. The performance of spatial LSTM model was compared with four traditional models, for example, BP neural network. The results …


Research Of Air Mission Recognition Method Based On Deep Learning, Qingkai Yao, Shaojun Liu, Xiaoyuan He, Ou Wei Jun 2020

Research Of Air Mission Recognition Method Based On Deep Learning, Qingkai Yao, Shaojun Liu, Xiaoyuan He, Ou Wei

Journal of System Simulation

Abstract: In the large-scale simulation of war game, the air mission is the focus of the commander's attention. The rapid, accurate and automatic recognition of air missions is the prerequisite and basis for intelligent decision making. The rapid development of deep learning technology provided a practical and feasible solution for the extraction of complex battlefield posture features, and provided technical support for studying air mission recognition. The research progress of the traditional mission recognition research method and the mission recognition method based on the deep learning was summarized. The three methods of deep learning of Convolution Neural Network (CNN), Long-short …