Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Physical Sciences and Mathematics
Weakly Labeled Action Recognition And Detection, Waqas Sultani
Weakly Labeled Action Recognition And Detection, Waqas Sultani
Electronic Theses and Dissertations
Research in human action recognition strives to develop increasingly generalized methods that are robust to intra-class variability and inter-class ambiguity. Recent years have seen tremendous strides in improving recognition accuracy on ever larger and complex benchmark datasets, comprising realistic actions "in the wild" videos. Unfortunately, the all-encompassing, dense, global representations that bring about such improvements often benefit from the inherent characteristics, specific to datasets and classes, that do not necessarily reflect knowledge about the entity to be recognized. This results in specific models that perform well within datasets but generalize poorly. Furthermore, training of supervised action recognition and detection methods …
Designing Light Filters To Detect Skin Using A Low-Powered Sensor, Muhammad Uzair Tariq
Designing Light Filters To Detect Skin Using A Low-Powered Sensor, Muhammad Uzair Tariq
Electronic Theses and Dissertations
Detection of nudity in photos and videos, especially prior to uploading to the internet, is vital to solving many problems related to adolescent sexting, the distribution of child pornography, and cyber-bullying. The problem with using nudity detection algorithms as a means to combat these problems is that: 1) it implies that a digitized nude photo of a minor already exists (i.e., child pornography), and 2) there are real ethical and legal concerns around the distribution and processing of child pornography. Once a camera captures an image, that image is no longer secure. Therefore, we need to develop new privacy-preserving solutions …
Exploring The Multi-Touch Interaction Design Space For 3d Virtual Objects To Support Procedural Training Tasks, Sarah Holderness
Exploring The Multi-Touch Interaction Design Space For 3d Virtual Objects To Support Procedural Training Tasks, Sarah Holderness
Electronic Theses and Dissertations
Multi-touch interaction has the potential to be an important input method for realistic training in 3D environments. However, multi-touch interaction has not been explored much in 3D tasks, especially when trying to leverage realistic, real-world interaction paradigms. A systematic inquiry into what realistic gestures look like for 3D environments is required to understand how users translate real-world motions to multi-touch motions. Once those gestures are defined, it is important to see how we can leverage those gestures to enhance training tasks. In order to explore the interaction design space for 3D virtual objects, we began by conducting our first study …
Pervasive Secure Content Delivery Networks Implementation, Hector Lugo-Cordero
Pervasive Secure Content Delivery Networks Implementation, Hector Lugo-Cordero
Electronic Theses and Dissertations
Over the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart phones, smart homes, computers, etc.), which we interact daily are connected and exchanging data among themselves and users. The IoT has become a global goal for companies, researchers, …
Jml Template Generation, Kushal Raghav Poojari
Jml Template Generation, Kushal Raghav Poojari
Electronic Theses and Dissertations
The Java Modeling Language (JML) is a behavioral interface specific language designed to specify Java modules (which are Java classes and interfaces). Specifications are used to describe the intended functionality without considering the way it is implemented. In JML, if a user wants to write specifications for a Java file, he or she must undertake several steps. To help automate the process of creating annotations for method specifications, a tool Jmlspec was created. Jmlspec generated a file that refines the source file and has empty placeholders in which one can write specifications. Although Jmlspec worked with older versions of Java, …
Resource Allocation And Pricing In Secondary Dynamic Spectrum Access Networks, Enas Khairullah
Resource Allocation And Pricing In Secondary Dynamic Spectrum Access Networks, Enas Khairullah
Electronic Theses and Dissertations
The paradigm shift from static spectrum allocation to a dynamic one has opened many challenges that need to be addressed for the true vision of Dynamic Spectrum Access (DSA) to materialize. This dissertation proposes novel solutions that include: spectrum allocation, routing, and scheduling in DSA networks. First, we propose an auction-based spectrum allocation scheme in a multi-channel environment where secondary users (SUs) bid to buy channels from primary users (PUs) based on the signal to interference and noise ratio (SINR). The channels are allocated such that i) the SUs get their preferred channels, ii) channels are re-used, and iii) there …
Learning Robotic Manipulation From User Demonstrations, Rouhollah Rahmatizadeh
Learning Robotic Manipulation From User Demonstrations, Rouhollah Rahmatizadeh
Electronic Theses and Dissertations
Personal robots that help disabled or elderly people in their activities of daily living need to be able to autonomously perform complex manipulation tasks. Traditional approaches to this problem employ task-specific controllers. However, these must to be designed by expert programmers, are focused on a single task, and will perform the task as programmed, not according to the preferences of the user. In this dissertation, we investigate methods that enable an assistive robot to learn to execute tasks as demonstrated by the user. First, we describe a learning from demonstration (LfD) method that learns assistive tasks that need to be …
Visual Saliency Detection And Semantic Segmentation, Nasim Souly
Visual Saliency Detection And Semantic Segmentation, Nasim Souly
Electronic Theses and Dissertations
Visual saliency is the ability to select the most relevant data in the scene and reduce the amount of data that needs to be processed. We propose a novel unsupervised approach to detect visual saliency in videos. For this, we employ a hierarchical segmentation technique to obtain supervoxels of a video, and simultaneously, we build a dictionary from cuboids of the video. Then we create a feature matrix from coefficients of dictionary elements. Next, we decompose this matrix into sparse and redundant parts and obtain salient regions using group lasso. Our experiments provide promising results in terms of predicting eye …
Online, Supervised And Unsupervised Action Localization In Videos, Khurram Soomro
Online, Supervised And Unsupervised Action Localization In Videos, Khurram Soomro
Electronic Theses and Dissertations
Action recognition classifies a given video among a set of action labels, whereas action localization determines the location of an action in addition to its class. The overall aim of this dissertation is action localization. Many of the existing action localization approaches exhaustively search (spatially and temporally) for an action in a video. However, as the search space increases with high resolution and longer duration videos, it becomes impractical to use such sliding window techniques. The first part of this dissertation presents an efficient approach for localizing actions by learning contextual relations between different video regions in training. In testing, …
Adversarial Attacks On Vision Algorithms Using Deep Learning Features, Andy Michel
Adversarial Attacks On Vision Algorithms Using Deep Learning Features, Andy Michel
Electronic Theses and Dissertations
Computer vision algorithms, such as those implementing object detection, are known to be susceptible to adversarial attacks. Small barely perceptible perturbations to the input can cause vision algorithms to incorrectly classify inputs that they would have otherwise classified correctly. A number of approaches have been recently investigated to generate such adversarial examples for deep neural networks. Many of these approaches either require grey-box access to the deep neural net being attacked or rely on adversarial transfer and grey-box access to a surrogate neural network. In this thesis, we present an approach to the synthesis of adversarial examples for computer vision …
Novel Computational Methods For Integrated Circuit Reverse Engineering, Travis Meade
Novel Computational Methods For Integrated Circuit Reverse Engineering, Travis Meade
Electronic Theses and Dissertations
Production of Integrated Circuits (ICs) has been largely strengthened by globalization. System-on-chip providers are capable of utilizing many different providers which can be responsible for a single task. This horizontal structure drastically improves to time-to-market and reduces manufacturing cost. However, untrust of oversea foundries threatens to dismantle the complex economic model currently in place. Many Intellectual Property (IP) consumers become concerned over what potentially malicious or unspecified logic might reside within their application. This logic which is inserted with the intention of causing harm to a consumer has been referred to as a Hardware Trojan (HT). To help IP consumers, …
Super Resolution Of Wavelet-Encoded Images And Videos, Vildan Atalay
Super Resolution Of Wavelet-Encoded Images And Videos, Vildan Atalay
Electronic Theses and Dissertations
In this dissertation, we address the multiframe super resolution reconstruction problem for wavelet-encoded images and videos. The goal of multiframe super resolution is to obtain one or more high resolution images by fusing a sequence of degraded or aliased low resolution images of the same scene. Since the low resolution images may be unaligned, a registration step is required before super resolution reconstruction. Therefore, we first explore in-band (i.e. in the wavelet-domain) image registration; then, investigate super resolution. Our motivation for analyzing the image registration and super resolution problems in the wavelet domain is the growing trend in wavelet-encoded imaging, …
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco
The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco
Libraries' Newsletters
No abstract provided.
Reasoning About Frame Properties In Object-Oriented Programs, Yuyan Bao
Reasoning About Frame Properties In Object-Oriented Programs, Yuyan Bao
Electronic Theses and Dissertations
Framing is important for specification and verification of object-oriented programs. This dissertation develops the local reasoning approach for framing in the presence of data structures with unrestricted sharing and subtyping. It can verify shared data structures specified in a concise way by unifying fine-grained region logic and separation logic. Then the fine-grained region logic is extended to reason about subtyping. First, fine-grained region logic is adapted from region logic to express regions at the granularity of individual fields. Conditional region expressions are introduced; not only does this allow one to specify more precise frame conditions, it also has the ability …
Learning Dynamic Network Models For Complex Social Systems, Alireza Hajibagheri
Learning Dynamic Network Models For Complex Social Systems, Alireza Hajibagheri
Electronic Theses and Dissertations
Human societies are inherently complex and highly dynamic, resulting in rapidly changing social networks, containing multiple types of dyadic interactions. Analyzing these time-varying multiplex networks with approaches developed for static, single layer networks often produces poor results. To address this problem, our approach is to explicitly learn the dynamics of these complex networks. This dissertation focuses on five problems: 1) learning link formation rates; 2) predicting changes in community membership; 3) using time series to predict changes in network structure; 4) modeling coevolution patterns across network layers and 5) extracting information from negative layers of a multiplex network. To study …
Complex Affect Recognition In The Wild, Behnaz Nojavanasghari
Complex Affect Recognition In The Wild, Behnaz Nojavanasghari
Electronic Theses and Dissertations
Artificial social intelligence is a step towards human-like human-computer interaction. One important milestone towards building socially intelligent systems is enabling computers with the ability to process and interpret the social signals of humans in the real world. Social signals include a wide range of emotional responses from a simple smile to expressions of complex affects. This dissertation revolves around computational models for social signal processing in the wild, using multimodal signals with an emphasis on the visual modality. We primarily focus on complex affect recognition with a strong interest in curiosity. In this dissertation,we ?rst present our collected dataset, EmoReact. …
Implementation Of Refining Statements In Openjml And Verification Of Higher Order Methods With Model Program Specifications, Sai Chandesh Gurramkonda
Implementation Of Refining Statements In Openjml And Verification Of Higher Order Methods With Model Program Specifications, Sai Chandesh Gurramkonda
Electronic Theses and Dissertations
The Java Modeling Language (JML) describes the functional behavior of Java classes and methods using pre- and postconditions. However, standard pre- and postcondition specifications cannot verify calls to higher order methods (HOMs). JML uses model program specifications to reason about HOMs. This thesis describes the implementation of model programs in the OpenJML tool. The implementation includes parsing, type checking, and matching of model program specifications against the code.
Code Park: A New 3d Code Visualization Tool And Ide, Pooya Khaloo
Code Park: A New 3d Code Visualization Tool And Ide, Pooya Khaloo
Electronic Theses and Dissertations
We introduce Code Park, a novel tool for visualizing codebases in a 3D game-like environment. Code Park aims to improve a programmer's understanding of an existing codebase in a manner that is both engaging and fun to be appealing especially for novice users such as students. It achieves these goals by laying out the codebase in a 3D park-like environment. Each class in the codebase is represented as a 3D room-like structure. Constituent parts of the class (variable, member functions, etc.) are laid out on the walls, resembling a syntax-aware "wallpaper". The users can interact with the codebase using an …
Hashing For Multimedia Similarity Modeling And Large-Scale Retrieval, Kai Li
Hashing For Multimedia Similarity Modeling And Large-Scale Retrieval, Kai Li
Electronic Theses and Dissertations
In recent years, the amount of multimedia data such as images, texts, and videos have been growing rapidly on the Internet. Motivated by such trends, this thesis is dedicated to exploiting hashing-based solutions to reveal multimedia data correlations and support intra-media and inter-media similarity search among huge volumes of multimedia data. We start by investigating a hashing-based solution for audio-visual similarity modeling and apply it to the audio-visual sound source localization problem. We show that synchronized signals in audio and visual modalities demonstrate similar temporal changing patterns in certain feature spaces. We propose to use a permutation-based random hashing technique …
Data Representation In Machine Learning Methods With Its Application To Compilation Optimization And Epitope Prediction, Yevgeniy Sher
Data Representation In Machine Learning Methods With Its Application To Compilation Optimization And Epitope Prediction, Yevgeniy Sher
Electronic Theses and Dissertations
In this dissertation we explore the application of machine learning algorithms to compilation phase order optimization, and epitope prediction. The common thread running through these two disparate domains is the type of data being dealt with. In both problem domains we are dealing with categorical data, with its representation playing a significant role in the performance of classification algorithms. We first present a neuroevolutionary approach which orders optimization phases to generate compiled programs with performance superior to those compiled using LLVM's -O3 optimization level. Performance improvements calculated as the speed of the compiled program's execution ranged from 27% for the …
On The Security Of Nosql Cloud Database Services, Mohammad Ahmadian
On The Security Of Nosql Cloud Database Services, Mohammad Ahmadian
Electronic Theses and Dissertations
Processing a vast volume of data generated by web, mobile and Internet-enabled devices, necessitates a scalable and flexible data management system. Database-as-a-Service (DBaaS) is a new cloud computing paradigm, promising a cost-effective and scalable, fully-managed database functionality meeting the requirements of online data processing. Although DBaaS offers many benefits it also introduces new threats and vulnerabilities. While many traditional data processing threats remain, DBaaS introduces new challenges such as confidentiality violation and information leakage in the presence of privileged malicious insiders and adds new dimension to the data security. We address the problem of building a secure DBaaS for a …
Network Partitioning In Distributed Agent-Based Models, Antoniya Petkova
Network Partitioning In Distributed Agent-Based Models, Antoniya Petkova
Electronic Theses and Dissertations
Agent-Based Models (ABMs) are an emerging simulation paradigm for modeling complex systems, comprised of autonomous, possibly heterogeneous, interacting agents. The utility of ABMs lies in their ability to represent such complex systems as self-organizing networks of agents. Modeling and understanding the behavior of complex systems usually occurs at large and representative scales, and often obtaining and visualizing of simulation results in real-time is critical. The real-time requirement necessitates the use of in-memory computing, as it is difficult and challenging to handle the latency and unpredictability of disk accesses. Combining this observation with the scale requirement emphasizes the need to use …